Security Challenges and Innovations in Automobile – A2V and A2I Systems and Connected Vehicles – Research Report

  • Home
  • Business
  • Security Challenges and Innovations in Automobile – A2V and A2I Systems and Connected Vehicles – Research Report
Security Challenges and Innovations in A2V and A2I Systems and Connected Vehicles

In the era of connected transportation, the integration of advanced systems such as Automobile-to-Vehicle (A2V) and Automobile-to-Infrastructure (A2I) has revolutionized the automobile industry. However, these innovations bring unique security challenges that demand strategic managerial oversight. This sample work covers the risks and opportunities associated with A2V and A2I systems. The report covers how businesses can handle these challenges to maintain competitiveness and consumer trust. It also highlights the critical role of management in fostering innovation while ensuring regulatory compliance and operational efficiency in a rapidly evolving market.

Looking for the Best Assignment Help Online? Contact us!

Understanding Automobile-to-Vehicle and Infrastructure Systems and Security Challenges in Connected Vehicles

Abstract

The topic that has been selected is “Security Challenges of Automobile to Vehicle and Automobile to Infrastructure”. The researcher has chosen this topic as it is trending in delivering its prospects in a transportation system. The researcher has duly highlighted various security challenges related to automobile-to-vehicle and automobile-to-infrastructure. This topic is very interesting and drives many advanced technological aspects in a future transportation system respectively. The researcher has drafted every detailed concept of the mentioned topic in a conceptualization way basis.

Research Project on Security Challenges of Automobile to Vehicle and Automobile to Infrastructure

Introduction

The recent type of vehicle is no longer made up of just a mechanical system; it is based on the concept of artificial intelligence and millions of lines of code encrypted. The day-to-day facilities of the internet have become important with vast research technology and survey directions among them, one of the most challenging research parts is Automobile to Vehicle and Automobile to Infrastructure Alnasser et al., (2019).  It has become too important in the lines of the transportation system; as it consists of a fully automated process. The concept of A2V implies the sharing of information wirelessly based on several communication system nodes. The information typically includes traffic safety warnings and traffic vital information. This technology of A2V has made a strong position in the technological world. On the other hand, the concept of A2I refers to the sharing of information wirelessly between the infrastructure of the road and the vehicle. The data stored in the concept of A2I is a huge database that has been proposed to share lots of information like mobility, safety, and environmental benefits Bemani & Bjorsell, (2020). But, as technology is improving and becoming advanced on day day-to-day basis, there exist most important security challenges that have been trending high lightly. The researcher has explained and highlighted the prevailing trending security challenges based on the concept of automobile-to-vehicle and automobile-to-infrastructure. In addition to this, the researcher has also analyzed the future outcome of the Automobile to Vehicle and Automobile to Infrastructure given the shareholders and the automated mobile industry as a whole. 

Research Aims and Objectives

Aims

The main aim of the research is to highlight the security challenges prevailing in the Automobile-to-vehicle and Automobile infrastructure concepts. 

Objectives

  • To reflect the security challenges in Automobile to Vehicle and Automobile to Infrastructure.
  • To identify the literature gaps in the automobile-to-vehicle and Automobile Infrastructure systems.
  • To identify the prospects of Automobile to Vehicle and Automobile to Infrastructure.

Literature Review

The literature review is considered one of the major parts of the research proposal or the research project. It depicts the entire summarization of the research topic in a detailed way.

Highlight the Challenges and the Problems in A2V and A2I Technology

Based on the concept of Automobile to Vehicle and Automobile to Infrastructure there exist the presence of security challenges which are mentioned below:

  • Imperfect Connectivity: Most of the technological vehicles do not contain the capability of updating their external software connectivity which is called OTA. This facilitates vehicle in protecting all the prevailing cyber attackers and hackers threats from being deteriorated. Due to this incapability of updates, the vehicle has a composite risk of cybersecurity attacks Chehri et al., (2020).
  • Limited performance of computational: The performance of the vehicle system is limited by its computational technology system. As most of the vehicle has a longer life it tends to reproduce the higher vibrations and the temperature. Due to this, there are most probably huge changes in hacking the vehicle system. This limitation also depicts the advanced overhead cyber attacker’s solutions to get hacked easily. 
  • Unpredictable threats and attacks: There are many loopholes by which cyber attackers can get a chance to enter the architecture of a vehicle system. Some of these include entry points, technology remote communication, vehicle databases, and several vehicle intellectual parts Dey et al., (2016). Day by day the hacker’s system is developing and the architecture of the vehicle is fixing; in this sense, most attackers can get a chance to attack the sensor system from a vehicle entry point.  
  • Prevailing risk in the lives of the passenger and the driver: As a large number of vital information is transmitted in-vehicle communication in Automobile to automobile-to-vehicle and automobile-to-infrastructure systems, sometimes the sensor information gets misinformed and results from several functions in communication strategy between drivers and the system. This can cost the lives of a passenger and the driver respectively Bemani & Bjorsell, (2020).
  • Attack of Denial of Service in A2V and V2I: In transmitting several messages in directing communication strategy, there are many chances from attackers to send a message in larger bits and make the sensor server low. The hacker uses the high message priority from vehicle entry points and thus hacks the entire system both internally and externally. 

Additionally, the accelerations and the velocity that have been sent during the Vehicle to Infrastructure (v2i) system may sometimes get optimized and display a wrong suggestion to drivers. In addition to this, in the concept of A2V concept, it is very challenging to define the centralized structure on a collaboration basis.  

The selection of literature highlights the present development

The researcher has selected the proposed research article based on the performance evaluation of the Automobile Vehicle and automobile-to-infrastructure systems. The chosen research article has reflected the emerging technology in the automobile-to-vehicle and automobile-to-infrastructure system with its proposed current expansion in the areas of the transportation system. In the research article, it has been mentioned several advanced features related to the advancement of Automobile Vehicles and Automobile Infrastructure systems which have changed the way of living and driving Dong et al., (2019). These features include backup cameras, high-priority sensors warning of lane departing, communicating transmission of signals, alert of rear traffic definition, and a strong emergency braking system. These are some of the recent developments made by several multinational companies like Toyota and Tesla. These companies have chosen high-priority technological; systems to make driving user-friendly. In addition to this, based on the information provided by OECD the current passage development in the automobile-to-vehicle and Automobile to Infrastructure system of the automobile industry includes importing various vehicle transmission and communication parts from different parts of the world to make hurdles free of hazards Dong et al., (2020). Companies like Toyota and Tesla have also improved the safety measurements and the sensorincapabilitys in the internal environment of a vehicle system to make stronger compulsion between drivers and passengers.

Additionally, the recent development in the Automobile Vehicle and Automobile to Infrastructure system also comprises fulfilling the prevailing loopholes that have given a certain advantage to hackers to enter through the entry point of the vehicle system. The companies have also somehow maintained the loopholes; but there exists a major space for hackers via sensor and communication transmission strategy Bemani & Bjorsell, (2020).

Identification of the Literature Gaps

This section is also considered the most crucial part of the research proposal. It implies the research in an exploration way for additional examination. To make the gap, the researcher must read the research project in a detailed manner with the identification of the area associated. In this section, the researcher has identified several issues that can be addressed and several issues that have not been addressed in prospects with the research project respectively. 

Discussing areas and issues in the current literature that have been addressed

The areas and the issues that have been addressed previously are the most prevailing security challenges trend in the automobile-to-vehicle and Automobile Infrastructure systems. The issues connected with the limited connection connectivity identify a major gap in the vehicle tracking system. It will find it more difficult to track the vehicle system with this limitation. The vehicle is unable to update the software built into it He et al., (2020). Without software up-gradation, how the vehicle system perfectly works. There are a lot of chances to hit the malfunctioning sensors through several malicious attacks in an internal environment. In addition to this the second issue that has been addressed based on computer performance which has been highlighted based on high vibrations and temperature. The hackers develop its software in such a way as to hit the victim application in several entry point ways; concerning the computer programs of vehicle systems it is unable to develop the up-gradation of software and the performance of the computational programs is also limited to its extent Dong et al., (2019). In such cases, there are ample chances of hitting the transmission sensor communication system wholly. These can also lead the Automobile-to-vehicle and Automobile to Infrastructure systems to deal with several malicious attacks in the future respectively. 

Highlighting the areas and the issues that have not been addressed

Based on the discussions mentioned above, there are various areas in which the issues are not well addressed or identified. Some of these include the connection cord between drivers and the vehicle sensor. As the traffic signals have been well-versed and updated accordingly; the communication cord transmitter that is present inside the vehicle system sometimes may fail to coordinate with the advanced traffic management system, which in turn leads to the mismanagement of information between the driver and the vehicle system Raj, (2020). In terms of A2I technology, the exchange of information to the infrastructure of the road wirelessly can fail the entire blockage of internet technology; as it has very limited usage of computational programming system inbuilt. Along with this, the limited connectivity option also results in a tendency to lose its capturing and sending data power respectively. Furthermore, these prevailing loopholes have been identified by the hackers and they attack maliciously by entering through the entry point. 

Discussion of the views of the issues 

Throughout, the discussion of the automobile-to-vehicle and automobile-to-infrastructure system issues and the challenging factor, the researcher has been justified with the mentioned issues and thus started researches furthermore to gain much expansion information. Based on the article on the automobile industry, the researcher has viewed that multinational companies like Tesla and Toyota have stopped manufacturing driverless cars and the A2I and A2V concept technology with the effect of attacking several attackers simultaneously. The companies have identified the prevailing loopholes and thus verified that they will upgrade their automated car system in the most predictive ways; to prevent severe attackers and hackers Bemani & Bjorsell, (2020). In addition to this, the prevailing advantage of Automobile to automobile-to-vehicle and automobile-to-infrastructure systems is touching its glimpses to attract most customers and drivers respectively. As far as the issues are concerned, the prevailing feature has made this technological advance further advance in the field of artificial intelligence. The issues mentioned above related to the Automobile to Vehicle and Automobile to Infrastructure systems have been properly justified by the researchers Sheik & Maple, (2019). Given the justification, the researcher wants to share his idea based on security challenges in vehicle technology. The issues must be completely been identified by the experts of the multinational companies to maintain and protect the database privately and securely.

Summarization of the Future Direction 

Based on the research project mentioned above by the researcher on the Automobile Vehicle and automobile-to-infrastructure system, the future lies beneath in growing the market forces and initializing the rise of funding Bemani & Bjorsell, (2020). Given the various prospects, this technology has proven a very trending system in the path of technological substantial changes and led many investors to invest a large amount of money in security patches of automobile-to-vehicle and automobile-to-infrastructure systems. Through a large shareholders ratio, the automobile industry boosts its productivity and expands its vehicle technological segment to an extent level respectively.  In addition to this, the gap in the literature that has been identified by the researcher in this research project will be fulfilled by the upcoming prospects.

Understanding Automobile-to-Vehicle and Infrastructure Systems and Security Challenges in Connected Vehicles

References

Alnasser, A., Sun, H., & Jiang, J. (2019). Cyber security challenges and solutions for V2X communications: A survey. Computer Networks151, 52-67.

Bemani, A., & Bjorsell, N. (2020). Cyber-Physical Control of Indoor Multi-vehicle Testbed for Cooperative Driving. arXiv preprint arXiv:2006.04421.

Chehri, A., Quadar, N., & Saadane, R. (2020, May). Communication and Localization Techniques in VANET Network for Intelligent Traffic System in Smart. In Smart Transportation Systems 2020: Proceedings of 3rd KES-STS International Symposium (Vol. 185, p. 167). Springer Nature.

Dey, K. C., Rayamajhi, A., Chowdhury, M., Bhavsar, P., & Martin, J. (2016). Vehicle-to-vehicle (A2V) and vehicle-to-infrastructure (V2I) communication in a heterogeneous wireless network–Performance evaluation. Transportation Research Part C: Emerging Technologies68, 168-184.

Dong, C., Wang, H., Li, Y., Liu, Y., & Chen, Q. (2019). Economic comparison between vehicle-to-vehicle (A2V) and vehicle-to-infrastructure (V2I) at freeway on-ramps based on microscopic simulations. IET Intelligent Transport Systems13(11), 1726-1735.

Dong, C., Wang, H., Ni, D., Liu, Y., & Chen, Q. (2020). Impact Evaluation of Cyber-Attacks on Traffic Flow of Connected and Automated Vehicles. IEEE Access8, 86824-86835.

El Zorkany, M., Yasser, A., & Galal, A. I. (2020). Vehicle To Vehicle “A2V” Communication: Scope, Importance, Challenges, Research Directions and Future. The Open Transportation Journal14(1).

He, Q., Meng, X., Qu, R., & Xi, R. (2020). Machine Learning-Based Detection for Cyber Security Attacks on Connected and Autonomous Vehicles. Mathematics8(8), 1311.

Malik, R. Q., Alsattar, H. A., Ramli, K. N., Zaidan, B. B., Zaidan, A. A., Kareem, Z. H., … & Zaidan, R. A. (2019). Mapping and Deep Analysis of Vehicle-to-Infrastructure Communication Systems: Coherent Taxonomy, Datasets, Evaluation and Performance Measurements, Motivations, Open Challenges, Recommendations, and Methodological Aspects. IEEE Access7, 126753-126772.

Mostowfi, S., & Buttlar, W. G. (2020, July). Vehicle-to-Infrastructure and Human-to-Infrastructure Models for Smart Civil Infrastructure Systems. In International Conference on Applied Human Factors and Ergonomics (pp. 147-155). Springer, Cham.

Raj, D. (2020, January). Performance Evaluation of QoS in Marine Vehicle to Infrastructure (V2I) Network. In 2020 International Conference on COMmunication Systems & Networks (COMSNETS) (pp. 876-878). IEEE.

Rak, J., Jonsson, M., Vinel, A., & Jurczenia, K. (2020). Design of Resilient Vehicle-to-Infrastructure Systems. In Guide to Disaster-Resilient Communication Networks (pp. 721-741). Springer, Cham.

Sheik, A. T., & Maple, C. (2019). Key security challenges for cloud-assisted connected and autonomous vehicles.

Smith, S. W., Kim, Y., Guanetti, J., Li, R., Firoozi, R., Wootton, B., … & Arcak, M. (2020). Improving Urban Traffic Throughput with Vehicle Platooning: Theory and Experiments. IEEE Access8, 141208-141223.

Vaz, A. C., Nayak, C. G., & Nayak, D. (2020). Role of Visible Light Communication in Enhancing the Safety of Cyber-Physical Systems. In Advances in Control Instrumentation Systems (pp. 183-192). Springer, Singapore.

Yasir, M. N., & Croock, M. S. (2020). Cyber DoS attack-based security simulator for VANET. International Journal of Electrical & Computer Engineering (2088-8708)10(6).

Take our help in completing your assignments online by experts!

Check our other Management Assignment Samples ->
× Chat with us!