Working Paper Review Version 2 This version is not peer-reviewed

Cybersecurity in Intelligent Transportation Systems

Version 1 : Received: 2 August 2020 / Approved: 4 August 2020 / Online: 4 August 2020 (08:44:36 CEST)
Version 2 : Received: 31 August 2020 / Approved: 1 September 2020 / Online: 1 September 2020 (04:32:24 CEST)
Version 3 : Received: 28 September 2020 / Approved: 29 September 2020 / Online: 29 September 2020 (08:47:21 CEST)

A peer-reviewed article of this Preprint also exists.

Mecheva, T.; Kakanakov, N. Cybersecurity in Intelligent Transportation Systems. Computers 2020, 9, 83, doi:10.3390/computers9040083. Mecheva, T.; Kakanakov, N. Cybersecurity in Intelligent Transportation Systems. Computers 2020, 9, 83, doi:10.3390/computers9040083.


Intelligent Transportation Systems (ITS) are emerging field characterized by complex data model, dynamics and strict time requirements. Ensuring cybersecurity in ITS is a complex task on which the safety and efficiency of transportation depends. The imposition of standards for a comprehensive architecture, as well as specific security standards, is one of the key steps in the evolution of ITS. The article examines the general outlines of the ITS architecture and security issues. The main focus of security approaches is: configuration and initialization of the devices during manufacturing at perception layer; anonymous authentication of nodes in VANET at network layer; defense of fog-based structures at support layer and description and standardization of the complex model of data and metadata and defense of systems, based on AI at application layer. The article oversees some conventional methods as network segmentation and cryptography that should be adapted in order to be applied in ITS cybersecurity. The focus is on innovative approaches that have been trying to find their place in ITS security strategies recently. The list of innovative approaches includes blockchain, bloom filter, fog computing, artificial intelligence, game theory, and ontologies. In conclusion, a correspondence is made between the commented methods, the problems they solve and the architectural layers in which they are applied.


ITS; IoT; VANET; cybersecurity


Computer Science and Mathematics, Security Systems

Comments (1)

Comment 1
Received: 1 September 2020
Commenter: Nikolay Kakanakov
Commenter's Conflict of Interests: Author
Comment: General revisions due to comments and remarks by peer reviewer. New sections added, some sections expanded (introduction, discussion,...)
+ Respond to this comment

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 1
Metrics 0

Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.