Evaluating Cybersecurity Vulnerabilities in V2X Communications
Hence, there is a need for these V2X communications to be secured and reliable by ensuring that the cybersecurity properties like Confidentiality, Integrity, and Availability (CIA) are not compromised. ...This paper evaluates the potential cybersecurity use-cases developed, focusing on vulnerabilities like black hole attack, sybil attack and timing attack in V2X communications. ...The proposed cybersecurity vulnerabilities were tested and evaluated on FEV’s Smart Vehicle Demonstrator. Furthermore, the best practice countermeasure methods to avoid and overcome the risks identified based on the results were also discussed.