Por favor, use este identificador para citar o enlazar este ítem: http://hdl.handle.net/11531/108348
Registro completo de metadatos
Campo DC Valor Lengua/Idioma
dc.contributor.authorGesteira Miñarro, Robertoes-ES
dc.contributor.authorYoshizawa, Takahitoes-ES
dc.contributor.authorPalacios Hielscher, Rafaeles-ES
dc.contributor.authorLópez López, Gregorioes-ES
dc.date.accessioned2026-01-26T05:18:47Z-
dc.date.available2026-01-26T05:18:47Z-
dc.date.issued2026-04-01es_ES
dc.identifier.issn0920-5489es_ES
dc.identifier.urihttps://doi.org/10.1016/j.csi.2026.104133es_ES
dc.identifier.urihttp://hdl.handle.net/11531/108348-
dc.descriptionArtículos en revistases_ES
dc.description.abstractVehicle-to-Everything (V2X) communication technologies are revolutionizing transportation by enabling real-time information exchange among vehicles, infrastructure, pedestrians, and networks. While these technologies offer significant benefits in terms of road safety, traffic efficiency, and support for autonomous driving, they also introduce critical security and privacy risks due to their decentralized and dynamic nature. In this paper, we perform an analysis of the ETSI Intelligent Transport System (ITS) standards, specifications and reports to identify vulnerabilities that could be exploited to cause cyber–physical damages. We focus particularly on Cooperative Awareness Messages (CAM) and Decentralized Environmental Notification Messages (DENM) in the ETSI ITS standard, and pseudonym ID mechanisms. We identified several security issues, including vulnerabilities that lead to replay attacks, identity-based attacks such as spoofing and Sybil attacks, as well as grayhole attacks. We present attack scenarios where the issues found can be leveraged to compromise road safety, and quantify their potential impact through simulations using Eclipse SUMO. These scenarios might be relevant during a transition period where V2X-enabled vehicles coexist with legacy vehicles. Furthermore, we propose mitigations to address the identified issues. Our findings highlight the need for stronger security measures in V2X systems to ensure both safety and security in future intelligent transportation systems.es-ES
dc.description.abstractVehicle-to-Everything (V2X) communication technologies are revolutionizing transportation by enabling real-time information exchange among vehicles, infrastructure, pedestrians, and networks. While these technologies offer significant benefits in terms of road safety, traffic efficiency, and support for autonomous driving, they also introduce critical security and privacy risks due to their decentralized and dynamic nature. In this paper, we perform an analysis of the ETSI Intelligent Transport System (ITS) standards, specifications and reports to identify vulnerabilities that could be exploited to cause cyber–physical damages. We focus particularly on Cooperative Awareness Messages (CAM) and Decentralized Environmental Notification Messages (DENM) in the ETSI ITS standard, and pseudonym ID mechanisms. We identified several security issues, including vulnerabilities that lead to replay attacks, identity-based attacks such as spoofing and Sybil attacks, as well as grayhole attacks. We present attack scenarios where the issues found can be leveraged to compromise road safety, and quantify their potential impact through simulations using Eclipse SUMO. These scenarios might be relevant during a transition period where V2X-enabled vehicles coexist with legacy vehicles. Furthermore, we propose mitigations to address the identified issues. Our findings highlight the need for stronger security measures in V2X systems to ensure both safety and security in future intelligent transportation systems.en-GB
dc.format.mimetypeapplication/octet-streames_ES
dc.language.isoen-GBes_ES
dc.sourceRevista: Computer Standards & Interfaces, Periodo: 1, Volumen: online, Número: , Página inicial: 104133-1, Página final: 104133-10es_ES
dc.subject.otherInstituto de Investigación Tecnológica (IIT)es_ES
dc.titleHighway to Hack - Security gaps in ETSI ITS standardses_ES
dc.typeinfo:eu-repo/semantics/articlees_ES
dc.description.versioninfo:eu-repo/semantics/publishedVersiones_ES
dc.rights.holderes_ES
dc.rights.accessRightsinfo:eu-repo/semantics/openAccesses_ES
dc.keywordsCooperative awareness; Vehicle-to-everything; Replay attack; Pseudonym; Simulation; Cybersecurityes-ES
dc.keywordsCooperative awareness; Vehicle-to-everything; Replay attack; Pseudonym; Simulation; Cybersecurityen-GB
Aparece en las colecciones: Artículos

Ficheros en este ítem:
Fichero Tamaño Formato  
IIT-26-036R_preview3,62 kBUnknownVisualizar/Abrir


Los ítems de DSpace están protegidos por copyright, con todos los derechos reservados, a menos que se indique lo contrario.