Preserved in Portico This version is not peer-reviewed
Cybersecurity in Intelligent Transportation Systems
: Received: 2 August 2020 / Approved: 4 August 2020 / Online: 4 August 2020 (08:44:36 CEST)
: Received: 31 August 2020 / Approved: 1 September 2020 / Online: 1 September 2020 (04:32:24 CEST)
: Received: 28 September 2020 / Approved: 29 September 2020 / Online: 29 September 2020 (08:47:21 CEST)
A peer-reviewed article of this Preprint also exists.
Journal reference: Computers 2020
Intelligent Transportation Systems (ITS) are emerging field characterized by complex data model, dynamics and strict time requirements. Ensuring cybersecurity in ITS is a complex task on which the safety and efficiency of transportation depends. The imposition of standards for a comprehensive architecture, as well as specific security standards, is one of the key steps in the evolution of ITS. The article examines the general outlines of the ITS architecture and security issues. The main focus of security approaches is: configuration and initialization of the devices during manufacturing at perception layer; anonymous authentication of nodes in VANET at network layer; defense of fog-based structures at support layer and description and standardization of the complex model of data and metadata and defense of systems, based on AI at application layer. The article oversees some conventional methods as network segmentation and cryptography that should be adapted in order to be applied in ITS cybersecurity. The focus is on innovative approaches that have been trying to find their place in ITS security strategies recently. The list of innovative approaches includes blockchain, bloom filter, fog computing, artificial intelligence, game theory, and ontologies. In conclusion, a correspondence is made between the commented methods, the problems they solve and the architectural layers in which they are applied.
ITS; IoT; VANET; cybersecurity
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
We encourage comments and feedback from a broad range of readers. See criteria for comments and our diversity statement.