IEEE Access (Jan 2024)

Exploring Secure V2X Communication Networks for Human-Centric Security and Privacy in Smart Cities

  • Vinay Rishiwal,
  • Udit Agarwal,
  • Aziz Alotaibi,
  • Sudeep Tanwar,
  • Preeti Yadav,
  • Mano Yadav

DOI
https://doi.org/10.1109/ACCESS.2024.3467002
Journal volume & issue
Vol. 12
pp. 138763 – 138788

Abstract

Read online

The Internet of Things (IoT) and advanced human-centred technologies have seen rapid expansion in smart city applications, including smart enterprises, homes, and vehicular networks. The IoT architecture underpins technological support for both human- and device-centric secure solutions, which are essential to the functioning of smart cities. Within this evolving landscape, Vehicle-to-Everything (V2X) technology has emerged as a key innovation, integrating vehicular communication with internet connectivity. This integration facilitates seamless data exchange between vehicles, infrastructure, and other entities, contributing to enhanced road safety, optimized traffic flow, reduced emissions, and the development of more intelligent transportation systems. As V2X technology becomes increasingly widespread, ensuring the security and privacy of the information exchanged within these networks is critical. While much of the existing research has concentrated on general IoT security frameworks and standalone vehicular communication protocols, our study addresses the unique security challenges inherent in V2X environments. This paper identifies and examines various security threats, including data privacy breaches, malicious attacks, and traffic manipulation, and explores strategies to mitigate these risks within V2X communications. In addition, this paper investigates the potential of blockchain technology as an innovative solution for enhancing the security and trustworthiness of information exchanges in V2X networks. The paper also includes a case study that presents a proposed solution demonstrating how blockchain technology could strengthen the security and integrity of data transfers within V2X systems. Through comprehensive analysis, evaluation, and recommendations for future research, this work contributes to the current understanding of secure data exchange in V2X networks.

Keywords