Security and Communication Networks

Security Threats and Defenses for Connected Vehicles


Publishing date
01 Oct 2021
Status
Published
Submission deadline
11 Jun 2021

Lead Editor

1Jinan University, Guangzhou, China

2University of New Brunswick, Fredericton, Canada

3City University of Hong Kong, Hong Kong

4Deakin University, Geelong, Australia


Security Threats and Defenses for Connected Vehicles

Description

As an essential component of the Internet of Things (IoT), connected vehicles refer to applications, services, and technologies that connect a vehicle to its surroundings. A typical connected vehicle not only enables in-vehicle connectivity, for example on-board devices, but also allows a vehicle to connect to external devices, networks, or even services and applications such as traffic safety and efficiency, entertainment, and remote diagnostics.

With vehicles becoming more sophisticated and communication technologies like 5G providing high-bandwidth and low-latency networks, connected vehicle technology is expected to become a fundamental component of automated driving. This could drastically improve the convenience and security of driving by decreasing the burden on drivers and reducing traffic accidents. However, the fast development of connected vehicle technology also faces various new security threats. For example, on-board devices like sensors in vehicles could be attacked or compromised, the in-vehicle access and control systems may be broken, and both in-vehicle and inter-vehicle communications could be intervened and controlled. All of these threats present critical security flaws to connected vehicles, consequently causing incidents or potentially even death.

The objective of this Special Issue is to explore security threats to connected vehicles, as well as new techniques and designs related to defense against those threats, to push forward the frontier and future development of secure connected vehicles. We hope to bring together leading researchers and developers to present their latest research in different topics relating to the security of connected vehicles. Both original research and review articles are welcome.

Potential topics include but are not limited to the following:

  • Security threats to on-board devices embedded in vehicles and to in/inter-vehicle communications
  • Defenses for on-board devices embedded in vehicles and in/inter-vehicle communications
  • Authorization, authentication, and access control for connected vehicles
  • Privacy techniques for connected vehicles
  • Vulnerability detection and prevention techniques for connected vehicles
  • Light-weight encryption and signature schemes for connected vehicles
  • Blockchain-based solutions for connected vehicle security
  • Artificial intelligence (AI)-based security solutions for connected vehicles
  • Security and privacy in edge computing-based connected vehicles
  • Security and privacy in connected vehicle applications/services
  • Trust management in connected vehicles

Articles

  • Special Issue
  • - Volume 2021
  • - Article ID 2847731
  • - Research Article

Efficient Identity-Based Broadcast Encryption Scheme on Lattices for the Internet of Things

Kai He | Xueqiao Liu | ... | Wei Liu
  • Special Issue
  • - Volume 2021
  • - Article ID 9951777
  • - Research Article

BusCount: A Provable Replay Protection Solution for Automotive CAN Networks

Daniel Zelle | Sigrid Gürgens
  • Special Issue
  • - Volume 2021
  • - Article ID 9678409
  • - Research Article

Enabling Fairness-Aware and Privacy-Preserving for Quality Evaluation in Vehicular Crowdsensing: A Decentralized Approach

Zhihong Wang | Yongbiao Li | ... | Wen He
  • Special Issue
  • - Volume 2021
  • - Article ID 1632825
  • - Research Article

Congestion Attack Detection in Intelligent Traffic Signal System: Combining Empirical and Analytical Methods

Yingxiao Xiang | Wenjia Niu | ... | Gang Li
  • Special Issue
  • - Volume 2021
  • - Article ID 7897527
  • - Research Article

Practical SM2-Based Multisignature Scheme with Applications to Vehicular Networks

Lin Hou | Wei Liu | ... | Guo-Qiang Zeng
  • Special Issue
  • - Volume 2021
  • - Article ID 9463606
  • - Research Article

A Certificateless Pairing-Free Authentication Scheme for Unmanned Aerial Vehicle Networks

Jingyi Li | Yujue Wang | ... | Huiyong Wang
  • Special Issue
  • - Volume 2021
  • - Article ID 5317062
  • - Research Article

A Reconstruction Attack Scheme on Secure Outsourced Spatial Dataset in Vehicular Ad-Hoc Networks

Qing Ren | Feng Tian | ... | Xiaolin Gui
  • Special Issue
  • - Volume 2021
  • - Article ID 9967829
  • - Research Article

Research on Manhattan Distance Based Trust Management in Vehicular Ad Hoc Network

Xiaodong Zhang | Ru Li | ... | Jinshan Shi
  • Special Issue
  • - Volume 2021
  • - Article ID 9969605
  • - Research Article

Energy-Efficient Relay-Based Void Hole Prevention and Repair in Clustered Multi-AUV Underwater Wireless Sensor Network

Amir Chaaf | Mohammed Saleh Ali Muthanna | ... | Ahmed A. Abd El-Latif
  • Special Issue
  • - Volume 2021
  • - Article ID 5580089
  • - Research Article

Towards a Smart Privacy-Preserving Incentive Mechanism for Vehicular Crowd Sensing

Lingling Wang | Zhongda Cao | ... | Xueqin Zhao
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.