| 
 Proceedings of International Conference on Applied Innovation in IT
 2025/07/26, Volume 13, Issue 3, pp.35-42
 
 Advancements and Cybersecurity Strategies in V2X Communication and Transport System for Electric and Connected Vehicles Using IoT and AI
 Hema Muniyappan, Pavithra Sankarappan, La Ode Muhram, Muhamad Farih, Aarthi Saravanaperumal, Shubham Sharma and Arkan Adnan ImranAbstract: Vehicle-to-Everything (V2X) communication has emerged as one of the transformative technologies that the automobile sector needs: it concerns with present day exchange of information between two or more vehicles, facilities, and anything that aims at enhancing safety on the roads, flow of traffic and driving in general. According to the specifications provided by 5G, edge computing, and IoT in V2X systems, the EVs gain the development opportunity of collision avoidance, traffic optimization, and energy management. On the other hand, these developments brought forward cybersecurity weaknesses: and the jamming and spoofing attacks and DDoS attacks with which reliability and safety of V2X systems is threatened. In the present paper, the particular attention will be given by the author to outlining the newest technology trends and cyber security frameworks responses to the threats found in defending the channels in the V2X system– current and future. It lists relatively broad topics as the following general topics: authentication schemes applicable for V2X networks, encryption techniques that can be used in V2X communication link, and IDS system that can be implemented for V2X networks. More importantly, it demonstrates how AI can enhance the security of the vehicular network and realistic legislation may construct a foundation for V2X cyber security. This work explains research toward developing a secure V2X environment for readiness in integrated transport system with safer, efficient and sustainable methods.
 
 Keywords: Vehicle-to-Everything, Automated Vehicle, V2X Communication, Cyberattacks, V2X Security.
 
 DOI: Under Indexing
 
 Download: PDF
 
 
 References:
D. G. Costa, J. C. N. Bittencourt, F. Oliveira, J. P. J. Peixoto, and T. C. Jesus, "Achieving sustainable smart cities through geospatial data-driven approaches," Sustainability, vol. 16, no. 2, p. 640, 2024, [Online]. Available: https://doi.org/10.3390/su16020640.
K. I. Shah, M. Khan, S. Abbas, and Z. Hasan, "Intelligent transportation system (ITS) for smart-cities using Mamdani fuzzy inference system," Int. J. Adv. Comput. Sci. Appl., vol. 9, no. 2, p. 105, 2018, [Online]. Available: https://doi.org/10.14569/IJACSA.2018.090215.
M. Dibaei, X. Zheng, K. Jiang, S. Maric, R. Abbas, S. Liu, Y. Zhang, Y. Deng, S. Wen, J. Zhang, Y. Xiang, and S. Yu, "An overview of attacks and defences on intelligent connected vehicles," arXiv preprint arXiv:1907.07455, 2019, [Online]. Available: https://arxiv.org/abs/1907.07455.
S. Yogarayan, S. F. A. Razak, A. Azman, and M. F. A. Abdullah, "Vehicle to everything (V2X) communications technology for smart mobility in Malaysia: a comprehensive review," J. Southwest Jiaotong Univ., vol. 56, pp. 534-563, 2021, [Online]. Available: https://doi.org/10.35741/issn.0258-2724.56.4.47.
M. Noor-A-Rahim, Z. Liu, H. Lee, M. O. Khyam, J. He, D. Pesch, K. Moessner, W. Saad, and H. V. Poor, "6G for vehicle-to-everything (V2X) communications: Enabling technologies, challenges, and opportunities," Proc. IEEE, vol. 110, pp. 712-734, 2022, [Online]. Available: https://doi.org/10.1109/JPROC.2022.3173031.
T. Butt and M. Afzaal, "Security and privacy in smart cities: Issues and current solutions," in Smart Technologies and Innovation for a Sustainable Future, pp. 317-323, 2019, [Online]. Available: https://doi.org/10.1007/978-3-030-01659-3_37.
I. H. Abed and S. Bahadori, "Using density criterion and increasing modularity to detect communities in complex networks," IJDS, vol. 2, no. 1, pp. 1-15, Jan. 2025, [Online]. Available: https://doi.org/10.62051/ijds.v2i1.15.
K. Ahmad, "Internet of Things-aided intelligent transport systems," Wireless Commun. Mobile Comput., vol. 1, no. 1, p. 28, 2023.
K. Ansari and Y. Feng, "Design of an integration platform for V2X wireless communications and positioning supporting C-ITS safety applications," J. Glob. Position. Syst., vol. 12, pp. 38-52, 2013, [Online]. Available: https://doi.org/10.5081/jgps.12.1.38.
J. Clancy, D. Mullins, B. M. Deegan, and J. Horgan, "Wireless access for V2X communications: Research, challenges and opportunities," IEEE Commun. Surv. Tutor., 2024, [Online]. Available: https://doi.org/10.1109/COMST.2024.3384132.
T. Wang, A. Hussain, X. Wang, and S. Maharjan, "Artificial intelligence for vehicle-to-everything: A survey," IEEE Access, vol. 7, pp. 1-1, 2019, [Online]. Available: https://doi.org/10.1109/ACCESS.2019.2891073.
M. Houmer, "A secure vehicle to everything (V2X) communication model for intelligent transportation system," Comput. Intell. Recent Commun. Netw., vol. 1, no. 1, p. 102, 2022.
S. A. Yusuf, A. Khan, and R. Souissi, "Vehicle-to-everything (V2X) in the autonomous vehicles domain – A technical review of communication, sensor, and AI technologies for road user safety," Transp. Res. Interdiscipl. Perspect., vol. 23, no. 11, p. 100980, 2024, [Online]. Available: https://doi.org/10.1016/j.trip.2023.100980.
M. S. Alsabah, N. M. A. Aljarah, and S. V. Paşca, "Intelligent algorithmic approaches to ECG signal classification in heart disease detection," Electr. Eng. Tech. J., vol. 2, no. 1, pp. 25-32, Jan. 2025.
K. Kim, J. Kim, S. Jeong, J.-H. Park, and H. K. Kim, "Cybersecurity for autonomous vehicles: Review of attacks and defense," Comput. Secur., vol. 103, p. 102150, 2021, [Online]. Available: https://doi.org/10.1016/j.cose.2020.102150.
T. Yoshizawa, D. Singelée, J. Mühlberg, S. Delbruel, A. Taherkordi, D. Hughes, and B. Preneel, "A survey of security and privacy issues in V2X communication systems," ACM Comput. Surv., vol. 55, no. 9, p. 35, 2023, [Online]. Available: https://doi.org/10.1145/3558052.
 |  
	
		|  
  
			    HOME 
			- Conference - Journal
 - Paper Submission to Journal
 - Paper Submission to Conference
 - For Authors
 - For Reviewers
 - Important Dates
 - Conference Committee
 - Editorial Board
 - Reviewers
 - Last Proceedings
 
			-
            Volume 13, Issue 3 (ICAIIT 2025) PROCEEDINGS
 -
            Volume 13, Issue 2 (ICAIIT 2025)
 -
            Volume 13, Issue 1 (ICAIIT 2025)
 -
            Volume 12, Issue 2 (ICAIIT 2024)
 -
            Volume 12, Issue 1 (ICAIIT 2024)
 -
            Volume 11, Issue 2 (ICAIIT 2023)
 -
            Volume 11, Issue 1 (ICAIIT 2023)
 -
            Volume 10, Issue 1 (ICAIIT 2022)
 -
            Volume 9, Issue 1 (ICAIIT 2021)
 -
            Volume 8, Issue 1 (ICAIIT 2020)
 -
            Volume 7, Issue 1 (ICAIIT 2019)
 -
            Volume 7, Issue 2 (ICAIIT 2019)
 -
            Volume 6, Issue 1 (ICAIIT 2018)
 -
            Volume 5, Issue 1 (ICAIIT 2017)
 -
            Volume 4, Issue 1 (ICAIIT 2016)
 -
			Volume 3, Issue 1 (ICAIIT 2015)
 -
			Volume 2, Issue 1 (ICAIIT 2014)
 -
			Volume 1, Issue 1 (ICAIIT 2013)
 
			ICAIIT 2025 PAST CONFERENCES
 -
			Photos
 -
			Reports
 
 ICAIIT 2024
 -
			Photos
 -
			Reports
 
 ICAIIT 2023
 -
			Photos
 -
			Reports
 
 ICAIIT 2021
 -
			Photos
 -
			Reports
 
 ICAIIT 2020
 -
			Photos
 -
			Reports
 
 ICAIIT 2019
 -
			Photos
 -
			Reports
 
 ICAIIT 2018
 -
			Photos
 -
			Reports
   
			    ETHICS IN PUBLICATIONS
 ACCOMODATION
   
			    CONTACT US   |  |