Performance Analysis of Blockchain-Enabled Security and Privacy Algorithms in Connected and Autonomous Vehicles: A Comprehensive Review

Rabia Khan, Amjad Mehmood, Carsten Maple, Kevin Curran, Houbing Herbert Song

Research output: Contribution to journalArticlepeer-review

34 Downloads (Pure)

Abstract

Strategic investment(s) in vehicle automation technologies led to the rapid development of technology that revolutionised transport services and reduced fatalities on a scale never seen before. Technological advancements and their integration in Connected Autonomous Vehicles (CAVs) increased uptake and adoption and pushed firmly for the development of highly supportive legal and regulatory and testing environments. However, systemic threats to the security and privacy of technologies and lack of data transparency have created a dynamic threat landscape within which the establishment and verification of security and privacy requirements proved to be an arduous task. In CAVs security and privacy issues can affect the resilience of these systems and hinder the safety of the passengers. Existing research efforts have been placed to investigate the security issues in CAVs and propose solutions across the whole spectrum of cyber resilience. This paper examines the state-of-the-art in security and privacy solutions for CAVs. It investigates their integration challenges, drawbacks and efficiencies when coupled with distributed technologies such as Blockchain. It has also listed different cyber-attacks being investigated while designing security and privacy mechanism for CAVs.
Original languageEnglish
Pages (from-to)1-12
Number of pages12
JournalIEEE Transactions on Intelligent Transportation Systems
Early online date21 Dec 2023
DOIs
Publication statusPublished online - 21 Dec 2023

Keywords

  • Security
  • Privacy
  • Blockchains
  • Sensors
  • Monitoring
  • Connected vehicles
  • Cameras
  • Cyber-physical system
  • connected and autonomous vehicles
  • blockchain technology
  • security
  • privacy

Fingerprint

Dive into the research topics of 'Performance Analysis of Blockchain-Enabled Security and Privacy Algorithms in Connected and Autonomous Vehicles: A Comprehensive Review'. Together they form a unique fingerprint.

Cite this