Emerging Trends in V2X Communication, Hardware Security, and Cybersecurity

Advancements in V2X Communication, Hardware Security, and Cybersecurity

Vehicular-to-Everything (V2X) Communication and Security Credential Management Systems (SCMS)

The field of V2X communication is rapidly advancing, with a strong focus on enhancing security, privacy, and efficiency. Researchers are making strides in improving authentication and key management schemes to better support the dynamic environments of the Internet of Vehicles (IoV). Innovations in certificate management processes aim to reduce execution times and bolster privacy protections for connected vehicles. A notable development is the exploration of hybrid cryptographic schemes that merge Elliptic-Curve Cryptography (ECC) with Post-Quantum Cryptography (PQC), offering a robust defense against quantum computing threats while maintaining the operational efficiency required for V2X communications.

Hardware Security

In the realm of hardware security, the focus is on mitigating sophisticated cyber attacks targeting cloud services, smart devices, and IoT devices. Research is delving into side-channel attacks, such as cache and power side-channel attacks, and advancing techniques like Voltage Glitching and Electromagnetic Analysis. Efforts are also being made to enhance memory encryption strategies, develop Cryptographic Instruction Set Architectures, and implement Secure Boot and Root of Trust mechanisms. The exploration of Physical Unclonable Functions (PUFs) and hardware fault injection techniques is also gaining traction, alongside addressing the unique security challenges of the RISC-V architecture.

Cybersecurity in Autonomous Vehicles and Smart Manufacturing

Cybersecurity is evolving to tackle the complex threats facing autonomous vehicles, smart manufacturing, and digital infrastructures. A holistic approach to security is emerging, emphasizing the resilience of systems that may already be compromised. This includes developing frameworks and taxonomies for identifying vulnerabilities in cyber-physical systems, where the integration of physical, cyber, and human elements presents unique challenges. Innovative solutions are being proposed to secure autonomous vehicles against electromagnetic signal injection attacks and to create defense-in-depth models for smart manufacturing that account for the interplay between cyber, physical, and human factors.

Integration of AI in Cybersecurity, Digital Forensics, and IoMT

The integration of machine learning (ML) and deep learning (DL) technologies is revolutionizing cybersecurity, digital forensics, and the Internet of Medical Things (IoMT). In cybersecurity and digital forensics, ML and DL are being utilized for intrusion detection, malware classification, and anomaly detection to enhance system resilience. In archaeology, ML applications are expanding to include automatic structure detection and artefact classification. The IoMT sector is focusing on mitigating security vulnerabilities against malware and DDoS attacks through innovative solutions like ML algorithms, blockchain, and edge computing, highlighting the broader movement towards leveraging AI to solve domain-specific problems and secure digital infrastructures.

Sources

Evolving Cybersecurity Strategies for Autonomous Systems and Digital Infrastructures

(9 papers)

Advancements in V2X Communication Security and SCMS Efficiency

(4 papers)

Advancements in Hardware Security: Mitigating Emerging Cyber Threats

(4 papers)

Advancements in AI Applications Across Cybersecurity, Archaeology, and IoMT

(4 papers)

Built with on top of