Skip to main content

Abstract

In recent years, mobility systems have been steadily improving their performance in terms of connectivity, allowing road users to communicate among them and with the road infrastructure either directly or through internet cloud-based services. The aim of this contribution is to provide an overview of inter-vehicle communications cybersecurity challenges in the cooperative, connected and automated mobility sector and make possible a further analysis of the cryptographic methods and tools that can leverage their security in a world where quantum computers will be a practical menace at some point in the future.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Threat: Potential cause of an incident, causing damage to the systems.

  2. 2.

    Vulnerability: Weakness of a system that can be exploited by internal or external threats.

  3. 3.

    Risk: Probability that a threat will materialize by exploiting the vulnerability.

References

  1. Ministerio del Interior: Estudio sobre la cibercriminalidad en España (2020). http://www.interior.gob.es/web/archivos-y-documentacion/informe-sobre-la-cibercriminalidad-en-espana. Accessed 21 May 2022

  2. ERTICO-ITS Europe: Project AUTOPILOT (2020). https://autopilot-project.eu. Accessed 21 May 2022

  3. CNPIC: Centro Nacional de Protección de Infraestructuras Críticas (2022). https://cnpic.interior.gob.es/opencms/en/home/. Accessed 21 May 2022

  4. Ineco: About Ineco (2022). https://www.ineco.com/webineco/en/about-us. Accessed 21 May 2022

  5. Dauksis, E., García, A., Lozano, L., Pérez, C., Rodríguez, A.: Cybersecurity and transport: protected systems (2020). https://www.revistaitransporte.com/cybersecurity-and-transport-protected-systems/. Accessed 21 May 2022

  6. European Telecommunications Standards Institute (ETSI): Security; Threat, Vulnerability and Risk Analysis (TVRA). ETSI TR 102 893 (2017). https://www.etsi.org/deliver/etsi_tr/102800_102899/102893/01.02.01_60/tr_102893v010201p.pdf. Accessed 21 May 2022

  7. Hahn, D., Munir, A., Behzadan, V.: Security and privacy issues in intelligent transportation systems: classification and challenges. IEEE Intell. Transp. Syst. Mag. 13(1), 181–196 (2021)

    Article  Google Scholar 

  8. Huq, N., Vosseler, R., Swimmer, M.: Cyberattacks Against Intelligent Transportation Systems (2017). https://documents.trendmicro.com/assets/white_papers/wp-cyberattacks-against-intelligent-transportation-systems.pdf. Accessed 21 May 2022

  9. Kim, S., Shrestha, R.: Automotive Cyber Security. Springer, Singapore (2020). https://doi.org/10.1007/978-981-15-8053-6

    Book  Google Scholar 

  10. Menezes, A.J., Vanstone, S.A., Oorschot, P.C.V.: Handbook of Applied Cryptography. CRC Press, Boca Raton Inc (1996)

    MATH  Google Scholar 

  11. Institute of Electrical and Electronics Engineers (IEEE): IEEE Trial-Use Standard for Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages (2006). https://ieeexplore.ieee.org/servlet/opac?punumber=11000. Accessed 21 May 2022

  12. Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484–1509 (1997)

    Article  MathSciNet  MATH  Google Scholar 

  13. Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings of the \(28^{th}\) annual ACM symposium on Theory of Computing (STOC 1996), pp. 212–219 (1996)

    Google Scholar 

  14. National Institute of Standards and Technology (NIST): Post-quantum cryptography (2022). https://csrc.nist.gov/Projects/post-quantum-cryptography. Accessed 21 May 2022

  15. National Institute of Standards and Technology (NIST): Lightweight Cryptography (2022). https://csrc.nist.gov/Projects/lightweight-cryptography. Accessed 21 May 2022

Download references

Acknowledgements

This work was supported in part by the Spanish State Research Agency (AEI) of the Ministry of Science and Innovation (MICINN), project P2QProMeTe (PID2020-112586RB-I00/AEI/10.13039/501100011033), and in part by ORACLE Project, with reference PCI2020-120691-2, funded by MCIN/AEI/10.13039/ 501100011033, and European Union “NextGenerationEU/PRTR”.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Víctor Gayoso Martínez .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Castillo Campo, Ó., Gayoso Martínez, V., Hernández Encinas, L., Martín Muñoz, A., Álvarez Fernández, R. (2023). State of the Art of Cybersecurity in Cooperative, Connected and Automated Mobility. In: García Bringas, P., et al. International Joint Conference 15th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2022) 13th International Conference on EUropean Transnational Education (ICEUTE 2022). CISIS ICEUTE 2022 2022. Lecture Notes in Networks and Systems, vol 532. Springer, Cham. https://doi.org/10.1007/978-3-031-18409-3_11

Download citation

Publish with us

Policies and ethics