Abstract
The widespread diffusion of Cyber-Physical Systems and their capability to interact with the physical world depend also on the availability of 5G network. The exponential development of intelligent and interconnected IoT and autonomous systems, combined with the development of 5G networks, presents new challenges from a cyber-security perspective. The paper, without claiming to be exhaustive, offers insights and reflections on the very broad topic that integrates innovative devices, 5G and cybersecurity by illustrating the main European directions indicated by both the Strategic Research and Innovation Agenda for Electronic Component and Systems (ECS-SRIA) and the evolution of 5G network standards. Some of the aforementioned issues will be reanalysed through use cases based on Vehicles to X (V2X) scenario, where connectivity, safety and cybersecurity play a key interworking.
- ECS-SRIA. Electronic Components and Systems - Strategic Research and Innovation Agenda, 2022.Google Scholar
- https://aeneas-office.org/Google Scholar
- Home | Inside (inside-association.eu)Google Scholar
- EPoSS (smart-systems-integration.org)Google Scholar
- M. Settembre, "A 5G Core Network Challenge: Combining Flexibility and Security", 2021 AEIT International Annual Conference 2021, pp. 1--6.Google Scholar
Cross Ref
- https://www.3gpp.org/Google Scholar
- https://www.3gpp.org/release-16Google Scholar
- https://www.3gpp.org/release-17Google Scholar
- 3GPP TS 23.501, 'System architecture for the 5G System (5GS)", version 17.4.0, March 23, 2022.Google Scholar
- NGMN Alliance, 'Service Based Architecture in 5G", (Final deliverable (approved-P Public), January 2018.Google Scholar
- D. Borsatti, L. Spinacci, C. Grasselli, M. Settembre, W. Cerroni, F. Callegati, 'A Network Slicing Architecture for Mission Critical Communications", IEEE WiMob 2020 Workshop on ICT Systems for PPRR, Oct. 2020.Google Scholar
- ENISA Report 'Threat Landscape for 5G Networks", update December 2020.Google Scholar
- ENISA Report - Security in 5G Specifications, Feb. 2021.Google Scholar
- M. Duncan, A. Imbruglia, S. Gligerini, "The way forward and opportunities towards autonomous driving, AEIT, March, pp. 50--55, 2019.Google Scholar
- NGMN Alliance, "V2X: white paper ", 2019.Google Scholar
- 3GPP TS 22.186 version 15.3.0 Release 15.Google Scholar
- ENISA Report "ENISA good practices for security of smart cars", November 2019.Google Scholar
- Recomm. ITU-T X.1372 "Security guidelines for vehicle-to-everything (V2X) communication", March 2020Google Scholar
Recommendations
Revisiting Attacks and Defenses in Connected and Autonomous Vehicles
Security, Privacy, and Anonymity in Computation, Communication, and StorageAbstractWith the development of the automotive industry, the security of connected and autonomous vehicles (CAVs) has become a hot research field in recent years. However, previous studies mainly focus on the threats and defending mechanisms from the ...
Assessment of Pedestrian-to-Vehicle Communication Pre-Crash Safety Warnings to Avoid Collisions
In recent years, road safety is getting more attention to reduce road pedestrian accidents caused by vehicles. The research community is trying to find new techniques related to accident avoidance in the existing vehicle driver assistance systems. ...
A survey on security attacks and defense techniques for connected and autonomous vehicles
AbstractAutonomous Vehicle has been transforming intelligent transportation systems. As telecommunication technology improves, autonomous vehicles are getting connected to each other and to infrastructures, forming Connected and Autonomous ...






Comments