Proceedings of International Conference on Applied Innovation in IT
2025/07/26, Volume 13, Issue 3, pp.35-42

Advancements and Cybersecurity Strategies in V2X Communication and Transport System for Electric and Connected Vehicles Using IoT and AI


Hema Muniyappan, Pavithra Sankarappan, La Ode Muhram, Muhamad Farih, Aarthi Saravanaperumal, Shubham Sharma and Arkan Adnan Imran


Abstract: Vehicle-to-Everything (V2X) communication has emerged as one of the transformative technologies that the automobile sector needs: it concerns with present day exchange of information between two or more vehicles, facilities, and anything that aims at enhancing safety on the roads, flow of traffic and driving in general. According to the specifications provided by 5G, edge computing, and IoT in V2X systems, the EVs gain the development opportunity of collision avoidance, traffic optimization, and energy management. On the other hand, these developments brought forward cybersecurity weaknesses: and the jamming and spoofing attacks and DDoS attacks with which reliability and safety of V2X systems is threatened. In the present paper, the particular attention will be given by the author to outlining the newest technology trends and cyber security frameworks responses to the threats found in defending the channels in the V2X system– current and future. It lists relatively broad topics as the following general topics: authentication schemes applicable for V2X networks, encryption techniques that can be used in V2X communication link, and IDS system that can be implemented for V2X networks. More importantly, it demonstrates how AI can enhance the security of the vehicular network and realistic legislation may construct a foundation for V2X cyber security. This work explains research toward developing a secure V2X environment for readiness in integrated transport system with safer, efficient and sustainable methods.

Keywords: Vehicle-to-Everything, Automated Vehicle, V2X Communication, Cyberattacks, V2X Security.

DOI: Under Indexing

Download: PDF

References:

  1. D. G. Costa, J. C. N. Bittencourt, F. Oliveira, J. P. J. Peixoto, and T. C. Jesus, "Achieving sustainable smart cities through geospatial data-driven approaches," Sustainability, vol. 16, no. 2, p. 640, 2024, [Online]. Available: https://doi.org/10.3390/su16020640.
  2. K. I. Shah, M. Khan, S. Abbas, and Z. Hasan, "Intelligent transportation system (ITS) for smart-cities using Mamdani fuzzy inference system," Int. J. Adv. Comput. Sci. Appl., vol. 9, no. 2, p. 105, 2018, [Online]. Available: https://doi.org/10.14569/IJACSA.2018.090215.
  3. M. Dibaei, X. Zheng, K. Jiang, S. Maric, R. Abbas, S. Liu, Y. Zhang, Y. Deng, S. Wen, J. Zhang, Y. Xiang, and S. Yu, "An overview of attacks and defences on intelligent connected vehicles," arXiv preprint arXiv:1907.07455, 2019, [Online]. Available: https://arxiv.org/abs/1907.07455.
  4. S. Yogarayan, S. F. A. Razak, A. Azman, and M. F. A. Abdullah, "Vehicle to everything (V2X) communications technology for smart mobility in Malaysia: a comprehensive review," J. Southwest Jiaotong Univ., vol. 56, pp. 534-563, 2021, [Online]. Available: https://doi.org/10.35741/issn.0258-2724.56.4.47.
  5. M. Noor-A-Rahim, Z. Liu, H. Lee, M. O. Khyam, J. He, D. Pesch, K. Moessner, W. Saad, and H. V. Poor, "6G for vehicle-to-everything (V2X) communications: Enabling technologies, challenges, and opportunities," Proc. IEEE, vol. 110, pp. 712-734, 2022, [Online]. Available: https://doi.org/10.1109/JPROC.2022.3173031.
  6. T. Butt and M. Afzaal, "Security and privacy in smart cities: Issues and current solutions," in Smart Technologies and Innovation for a Sustainable Future, pp. 317-323, 2019, [Online]. Available: https://doi.org/10.1007/978-3-030-01659-3_37.
  7. I. H. Abed and S. Bahadori, "Using density criterion and increasing modularity to detect communities in complex networks," IJDS, vol. 2, no. 1, pp. 1-15, Jan. 2025, [Online]. Available: https://doi.org/10.62051/ijds.v2i1.15.
  8. K. Ahmad, "Internet of Things-aided intelligent transport systems," Wireless Commun. Mobile Comput., vol. 1, no. 1, p. 28, 2023.
  9. K. Ansari and Y. Feng, "Design of an integration platform for V2X wireless communications and positioning supporting C-ITS safety applications," J. Glob. Position. Syst., vol. 12, pp. 38-52, 2013, [Online]. Available: https://doi.org/10.5081/jgps.12.1.38.
  10. J. Clancy, D. Mullins, B. M. Deegan, and J. Horgan, "Wireless access for V2X communications: Research, challenges and opportunities," IEEE Commun. Surv. Tutor., 2024, [Online]. Available: https://doi.org/10.1109/COMST.2024.3384132.
  11. T. Wang, A. Hussain, X. Wang, and S. Maharjan, "Artificial intelligence for vehicle-to-everything: A survey," IEEE Access, vol. 7, pp. 1-1, 2019, [Online]. Available: https://doi.org/10.1109/ACCESS.2019.2891073.
  12. M. Houmer, "A secure vehicle to everything (V2X) communication model for intelligent transportation system," Comput. Intell. Recent Commun. Netw., vol. 1, no. 1, p. 102, 2022.
  13. S. A. Yusuf, A. Khan, and R. Souissi, "Vehicle-to-everything (V2X) in the autonomous vehicles domain – A technical review of communication, sensor, and AI technologies for road user safety," Transp. Res. Interdiscipl. Perspect., vol. 23, no. 11, p. 100980, 2024, [Online]. Available: https://doi.org/10.1016/j.trip.2023.100980.
  14. M. S. Alsabah, N. M. A. Aljarah, and S. V. Paşca, "Intelligent algorithmic approaches to ECG signal classification in heart disease detection," Electr. Eng. Tech. J., vol. 2, no. 1, pp. 25-32, Jan. 2025.
  15. K. Kim, J. Kim, S. Jeong, J.-H. Park, and H. K. Kim, "Cybersecurity for autonomous vehicles: Review of attacks and defense," Comput. Secur., vol. 103, p. 102150, 2021, [Online]. Available: https://doi.org/10.1016/j.cose.2020.102150.
  16. T. Yoshizawa, D. Singelée, J. Mühlberg, S. Delbruel, A. Taherkordi, D. Hughes, and B. Preneel, "A survey of security and privacy issues in V2X communication systems," ACM Comput. Surv., vol. 55, no. 9, p. 35, 2023, [Online]. Available: https://doi.org/10.1145/3558052.


    HOME

       - Conference
       - Journal
       - Paper Submission to Journal
       - Paper Submission to Conference
       - For Authors
       - For Reviewers
       - Important Dates
       - Conference Committee
       - Editorial Board
       - Reviewers
       - Last Proceedings


    PROCEEDINGS

       - Volume 13, Issue 3 (ICAIIT 2025)
       - Volume 13, Issue 2 (ICAIIT 2025)
       - Volume 13, Issue 1 (ICAIIT 2025)
       - Volume 12, Issue 2 (ICAIIT 2024)
       - Volume 12, Issue 1 (ICAIIT 2024)
       - Volume 11, Issue 2 (ICAIIT 2023)
       - Volume 11, Issue 1 (ICAIIT 2023)
       - Volume 10, Issue 1 (ICAIIT 2022)
       - Volume 9, Issue 1 (ICAIIT 2021)
       - Volume 8, Issue 1 (ICAIIT 2020)
       - Volume 7, Issue 1 (ICAIIT 2019)
       - Volume 7, Issue 2 (ICAIIT 2019)
       - Volume 6, Issue 1 (ICAIIT 2018)
       - Volume 5, Issue 1 (ICAIIT 2017)
       - Volume 4, Issue 1 (ICAIIT 2016)
       - Volume 3, Issue 1 (ICAIIT 2015)
       - Volume 2, Issue 1 (ICAIIT 2014)
       - Volume 1, Issue 1 (ICAIIT 2013)


    PAST CONFERENCES

       ICAIIT 2025
         - Photos
         - Reports

       ICAIIT 2024
         - Photos
         - Reports

       ICAIIT 2023
         - Photos
         - Reports

       ICAIIT 2021
         - Photos
         - Reports

       ICAIIT 2020
         - Photos
         - Reports

       ICAIIT 2019
         - Photos
         - Reports

       ICAIIT 2018
         - Photos
         - Reports

    ETHICS IN PUBLICATIONS

    ACCOMODATION

    CONTACT US

 

        

         Proceedings of the International Conference on Applied Innovations in IT by Anhalt University of Applied Sciences is licensed under CC BY-SA 4.0


                                                   This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License


           ISSN 2199-8876
           Publisher: Edition Hochschule Anhalt
           Location: Anhalt University of Applied Sciences
           Email: leiterin.hsb@hs-anhalt.de
           Phone: +49 (0) 3496 67 5611
           Address: Building 01 - Red Building, Top floor, Room 425, Bernburger Str. 55, D-06366 Köthen, Germany

        site traffic counter

Creative Commons License
Except where otherwise noted, all works and proceedings on this site is licensed under Creative Commons Attribution-ShareAlike 4.0 International License.