Overview of Vehicle-to-Everything Technology and Security

Overview of Vehicle-to-Everything Technology and Security

1

Abstract

Vehicle-to-Everything (V2X) technology is an extension of the Internet of Things (IoT) that connects vehicles with external networks to achieve more efficient intelligent traffic management and safe driving. This article reviews the definition and core objectives of V2X technology, detailing the research status of the two main V2X technology routes—Dedicated Short Range Communication (DSRC) and Cellular Vehicle-to-Everything (C-V2X). It focuses on the threats and challenges faced by V2X air interface communication security and analyzes the current technical measures to address these challenges, such as encryption technology, identity authentication, intrusion detection, and defense systems.
Overview of Vehicle-to-Everything Technology and Security

2

Introduction

The concept of V2X originates from the Internet of Things, specifically the vehicle IoT, which focuses on vehicles in motion as objects for information perception. Using next-generation information and communication technology, it achieves network connections between vehicles and everything else (i.e., vehicles with other vehicles, people, roads, and service platforms). The core objectives of V2X include enhancing the overall intelligent driving level of vehicles, providing users with a safer, more comfortable, intelligent, and efficient driving experience and traffic services, as well as improving traffic operation efficiency and promoting the intelligent development of social traffic services. Its core goals include improving traffic safety, optimizing traffic flow, reducing energy consumption, and minimizing environmental pollution.
Internationally, two main V2X technology routes are primarily adopted: DSRC and C-V2X. The United States initially focused on DSRC technology, while China currently leads in C-V2X technology. DSRC, or Dedicated Short Range Communication, has a long development history and is widely accepted in countries like the United States and Japan, forming a complete standard system and industrial layout. C-V2X, or Cellular Vehicle-to-Everything, is based on the rise of cellular mobile networks and is currently in a rapid development phase, receiving significant attention from countries and regions such as China and the European Union.
The DSRC communication system mainly consists of Road Side Units (RSUs), On-Board Units (OBUs), and a control center. RSUs and OBUs exchange information with the control center through roadside networks, utilizing radio frequency identification technology for wireless transmission to ensure secure and reliable information transfer.

Figure 1: Communication System Structure of DSRC V2X Scenario

C-V2X (Cellular Vehicle-to-Everything) is the wireless communication technology for V2X led by China, evolving from 4G/5G cellular network communication technologies and encompassing LTE-V2X (V2X communication based on Long Term Evolution technology) and the future NR-V2X system under 5G networks. C-V2X enables information exchange between vehicles and other vehicles (V2V), vehicles and roads (V2I), vehicles and pedestrians (V2P), and vehicles and networks (V2N) by leveraging existing LTE network infrastructure. It not only allows for a smooth transition to more complex V2X scenarios but also possesses advantages such as high reliability, large bandwidth, and low latency. In the future, C-V2X is expected to play a significant role in intelligent transportation, autonomous driving, and V2X security, providing solid technical support for the intelligence and efficiency of transportation systems.
Overview of Vehicle-to-Everything Technology and Security

Figure 2: Communication System Architecture of C-V2X V2X Scenario

As shown in Figures 1 and 2, RSUs serve as the key hub for information transmission in V2X, connecting vehicles, pedestrians, cloud servers, and MEC servers. In both DSRC and C-V2X architectures, RSUs interact directly with vehicles through V2I communication and extend to V2N communication with the core network in C-V2X. As a core node in the network structure, RSUs are responsible for data collection, distribution, and bridging between different communication technologies, ensuring continuity and wide coverage of information transmission. They exchange data with the on-board units (OBUs) in vehicles through wireless communication technologies (such as DSRC and C-V2X). RSUs relay real-time information about road conditions, traffic signals, and other infrastructure to vehicles while receiving vehicle status information and feeding it back to traffic management systems or other vehicles.
Overview of Vehicle-to-Everything Technology and Security

Figure 3: A Type of RSU

RSUs are usually deployed on the sides of roads or on traffic facilities and possess the following main functions:
  • Data Collection and Distribution: RSUs are responsible for collecting data from vehicles, pedestrians, and other road infrastructure, such as vehicle location, speed, and environmental conditions. This data can be distributed in real-time to other vehicles, traffic management systems, or cloud platforms to provide dynamic traffic information and assist in driving decisions.

  • Information Relay: RSUs act as information relay stations, extending the communication range between vehicles (V2V), vehicles and infrastructure (V2I), and vehicles and cloud platforms (V2C). They help vehicles share and relay information through RSUs when direct communication is not possible, ensuring continuity and coverage of communication.

  • Traffic Management and Control: RSUs assist in implementing traffic management and control measures, such as traffic signal control, traffic flow monitoring, and emergency alerts. They cooperate with traffic management centers or other intelligent transportation systems to adjust traffic signals in real-time, optimize traffic flow, reduce congestion, and enhance road safety.

  • Edge Computing and Real-Time Processing: Some RSUs have edge computing capabilities, allowing them to process and analyze data locally, reducing reliance on central servers. This enables RSUs to make immediate local decisions upon receiving urgent data, such as issuing emergency braking warnings or obstacle avoidance commands, thereby improving response times.

  • Secure Communication and Data Protection: RSUs are responsible for ensuring secure communication with vehicles, other RSUs, and traffic management systems. They implement measures such as data encryption, identity verification, and integrity protection to prevent data from being stolen, tampered with, or interfered with during transmission, safeguarding the entire V2X system’s security.

Overview of Vehicle-to-Everything Technology and Security

3

Air Interface Security

In V2X systems, the air interface refers to the wireless communication link between vehicles and RSUs. The air interface is a critical component of V2X communication, responsible for transmitting various data between vehicles and RSUs, such as vehicle location information, speed, and traffic conditions. Through the air interface, vehicles can obtain real-time dynamic information about road infrastructure and other vehicles, achieving coordination and intelligent management between vehicles and roads as well as among vehicles. The air interface is not only a channel for data transmission but also the core hub for information exchange within the V2X system, ensuring the system’s real-time performance and efficiency. However, air interface security faces numerous threats and challenges:
  • Signal Eavesdropping: Malicious attackers may steal data transmitted between vehicles and infrastructure by passively listening to wireless communication signals. This is typically achieved using wireless listeners or software-defined radio (SDR) devices, which can capture and decode wireless signals. Attackers can obtain sensitive information such as location, speed, and travel routes by decrypting captured data packets (if encryption is insufficient), which can be used to track vehicles, conduct social engineering attacks, or serve as a basis for further attacks.

  • Data Tampering: Attackers can forge or tamper with data transmitted wirelessly, sending false information to vehicles or infrastructure. For example, attackers may use wireless transmitters to inject forged data packets into the network, modifying or falsifying existing data. By implementing man-in-the-middle attacks within the communication link, attackers can insert false information, such as incorrect traffic signals or road conditions.

  • Unauthorized Access: Attackers may gain unauthorized access to the V2X wireless interface, obtaining control over RSUs or vehicles. This illegal access often involves cracking weak authentication mechanisms or exploiting known vulnerabilities to bypass security controls. Once access is obtained, attackers can modify device settings or manipulate communication parameters, disrupting normal communication or data transmission.

  • Identity Forgery: Attackers may impersonate legitimate vehicles or RSUs, conducting false authentication that undermines the system’s trust mechanism. This attack typically involves forging device identities or authentication credentials, allowing attackers to masquerade as legitimate communication nodes to gain unauthorized access. Once the system accepts the forged identity, attackers can send false information or engage in other destructive activities, leading to system vulnerabilities and security risks.

  • Wireless Signal Interference: Environmental sources of wireless interference may affect the quality and stability of V2X communication. For example, electromagnetic interference, signals from other wireless devices, or natural environmental factors (such as wind and rain) may cause signal attenuation or interruption. Such interference can reduce the reliability and security of communication, impacting effective data transmission between RSUs and vehicles.

In response to the aforementioned threats and challenges, many technologies related to air interface security have been proposed:
1) Encryption Technology
  • Symmetric Encryption: Symmetric encryption uses the same key for both data encryption and decryption. Due to its fast encryption and decryption speed, it is suitable for large-scale data transmission. It is commonly used for real-time data transmission between RSUs and vehicles, ensuring the confidentiality and integrity of communication by protecting sensitive information such as location and speed.
  • Asymmetric Encryption: Asymmetric encryption uses a pair of public and private keys for encryption and decryption. Because it requires more complex mathematical computations, it is typically slower than symmetric encryption. It is used for securely exchanging symmetric encryption keys or for identity authentication between RSUs and other devices, ensuring communication security.
  • End-to-End Encryption (E2EE): End-to-end encryption encrypts data at the source end of the transmission link, allowing only the destination end to decrypt it. This ensures that even if an intermediate node is compromised, attackers cannot decrypt the data. This technology is applied to communication between RSUs and vehicles, ensuring that all transmitted data remains encrypted throughout the process.
Overview of Vehicle-to-Everything Technology and Security

Figure 4: Asymmetric Encryption Process

2) Identity Authentication
  • Device Authentication: Device authentication verifies device identity through SIM cards or digital certificates, ensuring that only legitimate devices can connect to RSUs. SIM card authentication ensures the uniqueness of device identity, while digital certificates authenticate device identity through a Public Key Infrastructure (PKI) system, ensuring that communication between RSUs and vehicles is based on a trusted foundation.

  • Two-Factor Authentication (2FA): Two-factor authentication combines different types of verification methods, such as passwords and biometric features or physical tokens, to enhance security. This authentication method is used for access control of RSUs, ensuring that only authorized personnel can operate or configure the devices.

3) Intrusion Detection and Prevention Systems
  • Intrusion Detection System (IDS): An intrusion detection system monitors the network and communication activities of RSUs to identify abnormal behaviors or patterns, such as suspicious traffic or unauthorized access attempts. This system continuously monitors RSU network communication, detecting and recording possible attack attempts, such as man-in-the-middle attacks or denial-of-service attacks.

  • Intrusion Prevention System (IPS): An intrusion prevention system actively takes measures to block attacks upon detecting threats, such as blocking malicious traffic or isolating suspicious devices. It responds immediately upon discovering threats, protecting RSU security and preventing malicious communication from compromising the system.

Overview of Vehicle-to-Everything Technology and Security

4

Future Prospects

In the future, the air interface security of V2X systems connecting vehicles and RSUs will face more complex challenges. With the rise of quantum computing, traditional encryption algorithms may be compromised, necessitating the adoption of stronger post-quantum cryptography and lightweight security solutions to ensure higher security without increasing computational burdens. Artificial intelligence and machine learning will become important defensive measures for air interface security, particularly in intrusion detection and prevention systems. By analyzing communication traffic in real-time, AI can predict and respond to potential threats, improving the security response speed and effectiveness of V2X systems. At the same time, zero-trust architecture will gradually become widespread, enhancing system security through continuous identity verification and access control. These technological advancements will effectively address future challenges in V2X air interface security.
Overview of Vehicle-to-Everything Technology and Security

5

Conclusion

In V2X systems, the air interface security between roadside units (RSUs) and vehicles is a critical and complex issue. The air interface, as the wireless communication link between vehicles and RSUs, is the core hub for information exchange in V2X, ensuring the real-time performance and efficiency of the entire system. However, this wireless link also faces various security threats, including signal eavesdropping, data tampering, unauthorized access, denial-of-service attacks (DoS), identity forgery, man-in-the-middle attacks, and wireless signal interference.
In summary, the air interface security of V2X is not only related to the confidentiality, integrity, and availability of data but also directly impacts the safe driving of vehicles and the reliability of traffic management systems. To address these challenges, multi-layered security technologies, such as encryption technology, identity authentication, intrusion detection and prevention systems, and key management technologies, need to be employed. Furthermore, in light of the future development of quantum computing technology, traditional encryption algorithms may become ineffective, necessitating the use of stronger post-quantum cryptographic algorithms and lightweight security solutions. At the same time, artificial intelligence and machine learning will play important roles in real-time analysis and prediction of potential threats, while zero-trust architecture and blockchain technology will also become significant means to enhance air interface security in the future.
In conclusion, ensuring the air interface security in V2X systems requires continuous improvement of existing security strategies, enhancement of technical measures, and maintaining rapid responsiveness and adaptability to emerging threats to ensure the stable operation and secure communication of V2X systems.

References

[1] Jing, X. Analysis of V2X Technology and Applications. Shanghai Automobile, 2019, 4: 9-12.

[2] Huang, Y. Research on V2X Network Security Technology. Electronic World, 2018, 19: 49-50.

[3] Kenney, J. B. Dedicated Short-Range Communications (DSRC) Standards in the United States. Proceedings of the IEEE, 2011, 99(7): 1162-1182.

[4] Chen, S., Hu, J., Shi, Y., et al. A Vision of C-V2X: Technologies, Field Testing, and Challenges with Chinese Development. IEEE Internet of Things Journal, 2020, 7(5): 3872-3881.

[5] Salahuddin, M. A., Al-Fuqaha, A., Guizani, M. Software-Defined Networking for RSU Clouds in Support of the Internet of Vehicles. IEEE Internet of Things Journal, 2014, 2(2): 133-144.

[6] Kim, S. Y., Baik, I. K., Lim, S. S. An Implementation of WLL RSU Based on W-CDMA. 1997 International Conference on Consumer Electronics. IEEE, 1997: 446-447.

[7] Rawashdeh, Z. Y., Mahmud, S. M. Admission Control for Roadside Units Based on Virtual Air-Time Transmissions. 2011 IEEE Global Telecommunications Conference-GLOBECOM 2011. IEEE, 2011: 1-6.

[8] Liao, J., Feng, Z. Analysis of LTE Wireless Air Interface Security Threats. Communication Technology, 2017, 50(6): 1257-1263.

Chinese Association for Confidentiality

Science and Technology Branch

Long press to scan the code to follow us

Overview of Vehicle-to-Everything Technology and Security

Author: Feng Xiaoyu, Institute of Information Engineering, Chinese Academy of Sciences

Editor: Cai Beiping

Overview of Vehicle-to-Everything Technology and Security

Top 5 Exciting Articles of 2023 Review

Using Sound Masking to Protect Audio Privacy in Mobile Calls

Overview of Integrated Sensing and Communication Technology (ISAC)

Overview of Electromagnetic Fingerprinting Technology

Introduction to Electromagnetic Metamaterials

Overview of Network Attack Traffic Detection Technology

Overview of Vehicle-to-Everything Technology and Security

Recent Exciting Article Review

Overview of Direct Mobile-to-Satellite Technology (Part 2)

Overview of Direct Mobile-to-Satellite Technology (Part 1)

Satellite Internet, Security, and Starlink

Research on Elements and Models of High-Dynamic Satellite-Ground Link Communication

Analysis of Types and Impacts of Air Interface Attacks in Wireless Communication Networks

Leave a Comment