Security and Communication Networks

Security Hardened and Privacy Preserved Vehicle-to-Everything (V2X) Communication


Publishing date
01 Nov 2021
Status
Published
Submission deadline
02 Jul 2021

Lead Editor

1International Islamic University Islamabad, Islamabad, Pakistan

2Yeungnam University, Gyeongsan, Republic of Korea

3Istanbul Gelisim University, Istanbul, Turkey

4University of South Wales, Cardiff, UK


Security Hardened and Privacy Preserved Vehicle-to-Everything (V2X) Communication

Description

Vehicle-to-everything (V2X) communications have gained interest in academia and industry, especially because cars in smart cities will soon be autonomous and connected via the internet. V2X communications are expected to hit the market at 7 trillion USD in transportation and infotainment services, whilst unmanned automated vehicles (UAVs) will hit the market at 127 billion USD. The architecture of V2X is based on a number of sensors that can create and disseminate data from their surroundings through the vehicle-to-person (V2P), vehicle-to-network (V2N), vehicle-to-vehicle (V2V), and vehicle-to-infrastructure (V2I) links. V2X communications will operate via the Internet-of-things (IoT) (e.g., sensors, actuators, processors, RFID tags, etc.), which in turn will generate a large volume of real-time data to control the vehicles automatically.

It has been recently revealed that future V2X vehicles will generate more than 1 terabyte of traffic data in each round. This situation can become problematic if the security and privacy control of the real-time data for V2X communication are compromised. The V2X networks will improve in several ways (e.g., architecture, modes of communication, processing capacity, connectivity support, etc.). The V2X vehicles will require new communication protocols to become more efficient, safe, and reliable. Furthermore, the security and privacy issues of the sensors in connected cars over the wireless medium could bring unprecedented challenges to V2X communications. The broadcast nature of the wireless channels is another undesirable phenomenon and limiting factor. Therefore, the existing wireless infrastructure is not enough to secure the ubiquitous connectivity and broadband coverage of future UAVs, and V2X networks. We need V2X communication in a very secure and reliable way. This is crucial for creating a fail-safe traffic infrastructure in smart cities since data privacy, and security violations are becoming more diverse in our daily lives.

The aim of this Special Issue is to collate original research articles, as well as review articles, investigating featured algorithms, cyber-attacks, and security solutions.

Potential topics include but are not limited to the following:

  • Security, privacy, and audit control of IoT for secure V2X networks
  • Authorisation, authentication, and access control for V2X communications
  • Securing V2X multimedia services for 5G Networks
  • Security and privacy techniques for intelligent transportation systems (ITS), and for sensor data within V2X
  • Machine learning and cloud computing-based security solutions for UAV data
  • Biometric modalities and resilience models for advanced IoT security, and privacy within V2X communications
  • Vulnerabilities detection and threat prevention systems for IoT networks
  • Light-weight cyber security and privacy preservation techniques for V2X networks
  • Intrusion detection, encryption and identity management techniques in UAVs
  • Privacy-preserved data mining and big data analysis techniques for vehicle data
  • Security, privacy, and reliability of edge-enabled V2X applications
  • Cyber security threat, vulnerabilities models, and risk management in V2X communication
  • Blockchain technology-based security for UAVs and V2X communication
  • Recent practices and future perspectives of security and privacy in UAVs, and V2X applications
  • Legal, ethical, and social considerations in IoT security for V2X communication

Articles

  • Special Issue
  • - Volume 2022
  • - Article ID 9865621
  • - Editorial

Security Hardened and Privacy Preserved Vehicle-to-Everything (V2X) Communication

Azeem Irshad | Muhammad Shafiq | ... | Muhammad Usman
  • Special Issue
  • - Volume 2021
  • - Article ID 2890132
  • - Research Article

AVoD: Advanced Verify-on-Demand for Efficient Authentication against DoS Attacks in V2X Communication

Taehyoung Ko | Cheongmin Ji | Manpyo Hong
  • Special Issue
  • - Volume 2021
  • - Article ID 2147958
  • - Research Article

Adaptive Fault-Tolerant System and Optimal Power Allocation for Smart Vehicles in Smart Cities Using Controller Area Network

Anil Kumar Biswal | Debabrata Singh | ... | Azeem Irshad
  • Special Issue
  • - Volume 2021
  • - Article ID 6537678
  • - Research Article

Improved Secure and Lightweight Authentication Scheme for Next-Generation IoT Infrastructure

Chien-Ming Chen | Shuangshuang Liu
  • Special Issue
  • - Volume 2021
  • - Article ID 5533843
  • - Review Article

Internet of Things Security: Challenges and Key Issues

Mourade Azrour | Jamal Mabrouki | ... | Ambrina Kanwal
  • Special Issue
  • - Volume 2021
  • - Article ID 1230593
  • - Research Article

A Reliable Network Intrusion Detection Approach Using Decision Tree with Enhanced Data Quality

Azidine Guezzaz | Said Benkirane | ... | Shahzada Khurram
  • Special Issue
  • - Volume 2021
  • - Article ID 9965573
  • - Review Article

The Snowden Phone: A Comparative Survey of Secure Instant Messaging Mobile Applications

Christian Johansen | Aulon Mujaj | ... | Josef Noll
  • Special Issue
  • - Volume 2021
  • - Article ID 9997771
  • - Review Article

Security in Vehicular Ad Hoc Networks: Challenges and Countermeasures

Jabar Mahmood | Zongtao Duan | ... | Muhammad Nasir Mumtaz Bhutta
  • Special Issue
  • - Volume 2021
  • - Article ID 9944460
  • - Research Article

A Provably Secure Authentication and Key Exchange Protocol in Vehicular Ad Hoc Networks

Tsu-Yang Wu | Zhiyuan Lee | ... | Chien-Ming Chen
  • Special Issue
  • - Volume 2021
  • - Article ID 5554318
  • - Research Article

Designing an Efficient and Secure Message Exchange Protocol for Internet of Vehicles

Shehzad Ashraf Chaudhry
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.