Vehicular Platoon Communication: Architecture, Security Threats and Open Challenges

Sean Joe Taylor, Farhan Ahmad, Hoang Nga Nguyen, Siraj Ahmed Shaikh

Research output: Contribution to journalReview articlepeer-review

11 Citations (Scopus)
121 Downloads (Pure)

Abstract

The emerging technology that is vehicular platooning is an exciting technology. It promises to save space on congested roadways, improve safety and utilise less fuel for transporting goods, reducing greenhouse gas emissions. The technology has already been shown to be vulnerable to attack and exploitation by attackers. Attackers have several attack surfaces available for exploitation to achieve their goals (either personal or financial). The goal of this paper and its contribution to the area of research is to present the attacks and defence mechanisms for vehicular platoons and put risks of existing identified attacks forwards. Here the variety of attacks that have been identified in the literature are presented and how they compromise the wireless communications of vehicle platoons. As part of this, a risk assessment is presented to assess the risk factor of the attacks. Finally, this paper presents the range of defence and countermeasures to vehicle platooning attacks and how they protect the safe operations of vehicular platoons.
Original languageEnglish
Article number134
Number of pages33
JournalSensors
Volume23
Issue number1
Early online date23 Dec 2022
DOIs
Publication statusPublished - Jan 2023

Bibliographical note

Copyright: © 2022 by the authors.Licensee MDPI, Basel, Switzerland.
This article is an open access article distributed under the terms and
conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/)

Keywords

  • platoons
  • intelligent transportation systems
  • security
  • cyber-attacks
  • smart cities
  • communication security

Fingerprint

Dive into the research topics of 'Vehicular Platoon Communication: Architecture, Security Threats and Open Challenges'. Together they form a unique fingerprint.

Cite this