PreprintPDF Available

Towards Zero Trust Security in Connected Vehicles: A Comprehensive Survey

Authors:
Preprints and early-stage research may not have been peer reviewed yet.

Abstract

Zero Trust is the new cybersecurity model that challenges the traditional one by promoting continuous verification of users, devices, and applications, whatever their position or origin. This model is critical for reducing the attack surface and preventing lateral movement without relying on implicit trust. Adopting the zero trust principle in Intelligent Transportation Systems (ITS), especially in the context of connected vehicles (CVs), presents an adequate solution in the face of increasing cyber threats, thereby strengthening the ITS environment. This paper offers an understanding of Zero Trust security through a comprehensive review of existing literature, principles, and challenges. It specifically examines its applications in emerging technologies, particularly within connected vehicles, addressing potential issues and cyber threats faced by CVs. Inclusion/exclusion criteria for the systematic literature review were planned alongside a bibliometric analysis. Moreover, keyword co-occurrence analysis was done, which indicates trends and general themes for the Zero Trust model, Zero Trust implementation, and Zero Trust application. Furthermore, the paper explores various ZT models proposed in the literature for connected vehicles, shedding light on the challenges associated with their integration into CV systems. Future directions of this research will focus on incorporating Zero Trust principles within Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communication paradigms. This initiative intends to enhance the security posture and safety protocols within interconnected vehicular networks. The proposed research seeks to address the unique cybersecurity vulnerabilities inherent in the highly dynamic nature of vehicular communication systems.
Towards Zero Trust Security in Connected Vehicles: A Comprehensive Survey
Malak Annabia, Abdelhafid Zerouala, Nadhir Messaib
aLaboratoire de Recherche d’Electronique de Skikda LRES, Faculté de technologie, Université 20 Août 1955-Skikda, Skikda,
Algeria
bUniversité de Reims Champagne Ardenne, CReSTIC EA 3804, 51097 Reims, France
Abstract
Zero Trust is the new cybersecurity model that challenges the traditional one by promoting continuous
verification of users, devices, and applications, whatever their position or origin. This model is critical for
reducing the attack surface and preventing lateral movement without relying on implicit trust. Adopting
the zero trust principle in Intelligent Transportation Systems (ITS), especially in the context of connected
vehicles (CVs), presents an adequate solution in the face of increasing cyber threats, thereby strengthening
the ITS environment. This paper offers an understanding of Zero Trust security through a comprehensive
review of existing literature, principles, and challenges. It specifically examines its applications in emerging
technologies, particularly within connected vehicles, addressing potential issues and cyber threats faced by
CVs. Inclusion/exclusion criteria for the systematic literature review were planned alongside a bibliometric
analysis. Moreover, keyword co-occurrence analysis was done, which indicates trends and general themes
for the Zero Trust model, Zero Trust implementation, and Zero Trust application. Furthermore, the pa-
per explores various ZT models proposed in the literature for connected vehicles, shedding light on the
challenges associated with their integration into CV systems. Future directions of this research will focus
on incorporating Zero Trust principles within Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I)
communication paradigms. This initiative intends to enhance the security posture and safety protocols
within interconnected vehicular networks. The proposed research seeks to address the unique cybersecurity
vulnerabilities inherent in the highly dynamic nature of vehicular communication systems.
Keywords: Zero Trust, Transportation safety, Connected Vehicles, Cyber Security, Network Security,
Cyber-attack
1. Introduction
The evolving growth of the interconnected world and the adoption of advanced technologies like cloud
computing, the Internet of Things (IoT), and Artificial Intelligence (AI) permit seamless communication and
innovation. This interconnectivity has resulted in cyber security risks that include data breaches and cyber-
arXiv:2504.05485v1 [cs.CR] 7 Apr 2025
attacks. The traditional perimeter security approaches need to be improved in the face of these complex
threats. Zero Trust offers enhanced visibility, data protection, and defence against growing cyber threats by
continuous authentication and verification of every entity on the network [1]. Also, it helps save money by
combining tools and working more efficiently, which makes it a great model for keeping the network secure
[2].
To ensure a methodologically sound and transparent systematic literature review, a comprehensive in-
clusion and exclusion criteria framework was formulated and presented in Table 1. This methodological
approach aligns with established guidelines for conducting systematic reviews in scientific research, provid-
ing a standardized protocol for selecting and filtering relevant scholarly works [3]. Implementing such criteria
ensures a rigorous selection process for relevant literature, thereby enhancing the validity and reliability of
the review’s findings. This approach also mitigates selection bias and enhances the overall quality of the
review.
Table 1: Inclusion / Exclusion criteria for the systematic review
Criteria Inclusion Exclusion
Time frame From 2018 to 2024 Prior 2018
Language Published in English Published in other languages
Type Peer-reviewed, review, articles, confer-
ence papers Editorial, note, letters
Topic Studies specifically addressing zero trust
architecture or principles
Studies addressing other types of cyber-
security models
Comparative
analysis
Surveys that explore the theoretical foun-
dations, implementation strategies, or
adoption trends of zero trust
Other surveys not discussing zero trust
model
Applications
Research focusing on the application of
zero trust principles in cloud computing,
IoT, and 5G/6G technologies
Studies not specifically addressing zero
trust principles or applications in the re-
spective domains
Connected vehi-
cles
Studies focusing on zero trust princi-
ples applied in connected vehicle environ-
ments
Studies focusing solely on vehicle security
without the application of zero trust
As shown in Table 1, the systematic review employed a stringent set of inclusion and exclusion criteria
to ensure methodological rigour and relevance. The temporal scope was constrained to publications between
2018 and 2024, specifically focusing on zero trust architecture (ZTA). This timeframe aligns with the rapid
evolution of ZTA concepts and implementations. The initial analysis phase encompassed surveys highlighting
2
the theoretical foundations, implementation strategies, and adoption trends of ZTA. Additionally, research
exploring the application of zero trust principles in cloud computing, Internet of Things (IoT), and 5G/6G
technologies was included, reflecting the growing integration of ZTA across diverse technological domains.
The primary emphasis of this study, however, was on investigations that leveraged ZTA principles to improve
the cybersecurity of connected vehicles. This focus reflects the increasing criticality of securing automotive
systems in the era of intelligent transportation. Studies pertaining to alternative cybersecurity models, those
published before 2018, and those in languages other than English were excluded from the review. To ensure
scholarly rigour, the analysis was restricted to peer-reviewed articles, systematic reviews, and conference
papers. Editorials, notes, and letters were omitted due to their typically lower level of empirical content.
The subsequent sections of this paper elucidate the findings derived from this systematic analysis, providing
a comprehensive overview of the current state of ZTA in connected vehicle cybersecurity.
The bibliometric analysis of zero trust literature, based on data from the Scopus database, provides a
comprehensive overview of the academic aspect, defining the cybersecurity evolution of the research and
highlighting key features. The research methodology conducted to extract from the title, keyword, and
abstract was: TITLE-ABS-KEY((zero AND trust AND architecture) OR (Zero Trust) OR (Zero Trust-
architecture)) AND PUBYEAR >2017. In total, there have been 8 documents in the last ten years.
Notably, there has been a significant surge in scholarly output from 2018 to 2024 , as evidenced by a rising
number of publications. Specifically, from 2021 to 2024, the number of papers increased steadily, with 125,
237, 324, and 168 papers published, respectively, during these years. Figure 1illustrates this evolution,
highlighting the growing significance and attention devoted to ZT within the cybersecurity domain. Figure
2further illustrates our literature analysis, which is based on published sources.
0
50
100
150
200
250
300
350
2018 2019 2020 2021 2022 2023 2024
12 10
49
125
237
324
168
Documents
Year
Figure 1: Evolution of the Zero Trust literature (Scopus
database)
Year
Documents
IEEE Access ACM International Conference Proceeding Series
Lecture Notes In Networks And Systems
Lecture Notes In Computer Science Including Subseries Lecture Notes In Artificial Intelligence And Lecture Notes In
Bioinformatics
Sensors
Computers And Security
Lecture Notes In Electrical Engineering
2018 2019 2020 2021 2022 2023 2024
0
2
4
6
8
10
12
Figure 2: Evolution of the Zero Trust literature based on Pub-
lishing Sources
These documents are categorized into two main categories, document types and subject areas. Analyzing
the document types reveals that conference papers are the most prevalent, constituting 56.1% of the total
3
documents, followed by articles at 27.9%. Conference Reviews, Book Chapters, Reviews, Books, and other
types, as shown in Figure 3, make up a smaller percentage and indicate a varied composition of scholarly
contributions. The documents encompass a broad spectrum of subject areas, as illustrated in Figure 4.
Computer Science is the most prominent field at 39.6%, with engineering closely behind at 23.1%. Decision
Sciences, Mathematics, Physics, and Astronomy exhibit sustainable representation, accounting for 8.3%,
8.1%, and 4.7% of the documents. Energy, Social Sciences, Materials Science, Business, Management, Ac-
counting, Medicine, and other areas contribute to the diverse range of research interests represented in the
dataset extracted from the Scopus database. These visual representations offer valuable insights into the
ZT landscape, including trends, key contributors, and pivotal works. Notably, the NIST special publication
[4], has significantly influenced numerous researchers in shaping their work.
Figure 3: Classification of the documents based on their type
(Scopus Database) Figure 4: Classification of the documents based on their sub-
ject area (Scopus Database)
1.1. Keyword co-occurrence analysis
Keywords in research papers provide crucial information about the content and significance of the pa-
per. Analyzing keyword co-occurrences helps uncover trends and research variations within specific fields.
This analysis is a common method in scientometrics, revealing the structure of the academic domains and
highlighting research frontiers[5].
4
Game Theory
Block-Chain
Access Control
Authentification
3rd Generation
Mobile Security
G-Networks
Internet Of Things
Cybersecurity Attack
Centralised
Micro-Segmentation
Diagnostics Program
Continious Diagnostic and Mitigation
Zero Trust Architecture
Zero Trust
Architecture
6G
5G Mobile Communication
Network Security
Centralized Architecture
Network Architecture
Auditing
End to End
Data Transfer
Cyber Security
Figure 5: Network keyword co-occurrence with VOSviewer
VOSviewer is used to analyze the network of keyword co-occurrences in the ZT field. Across all chosen
articles in the datasets, 139 keywords meet the minimum threshold of one occurrence, indicating that each
keyword appears at least once. The network of these co-occurrences is shown in Figure 5. Keywords are
represented as nodes, and the size of each one corresponds to the frequency of the keyword occurrence.
Links between nodes signify relationships between the keywords they represent. The closeness of two nodes
indicates a higher frequency of those keywords appearing together. In addition, the colour of each node
indicates the cluster it belongs to; as shown in Figure 5, there are 9 clusters. The most significant node
corresponds to "Network Security" with an occurrence of 8 and total link strength of 140, followed by "Net-
work Architecture" with 7 occurrences and 124 of strength, "5G mobile communication systems", "Internet
of Things", "block-chain", alongside the keywords related to the ITS as illustrated in Table 2, "on-board
devices", "roadsides", "transportation safety", "vehicles", and "vehicular networks" with an occurrence of
1 and total link strength of 14. Figure 6displays the network map containing the keywords summarized in
Table 2. The first 11 keywords meet the minimum threshold of appearing at least two times.
5
Table 2: High Keywords occurrences
Keyword Occurrences Total link of strength
network security 8 140
network architecture 7 124
5g mobile communication systems 3 56
Internet of Things 3 56
block-chain 3 55
blockchain 2 55
decision making 3 54
cyber security 3 53
cybersecurity 3 52
zero trust architecture 3 48
zero trust 3 45
on-board devices 1 14
roadsides 1 14
transportation safety 1 14
vehicles 1 14
vehicular networks 1 14
Zero Trust Architecture
Zero Trust
Cybersecurity
Network Architecture
Network Security
Internet Of Things
Decision Making
Cyber security
5G Mobile Communication System
Blockchain
Vehicular
Vehicular Networks
Transportation Safety
On-Board Devices
Roadsides
Block-chain
Figure 6: Network map of the high occurrence keywords alongside the ones related to the vehicles
Figure 5, Figure 6and Table 2collectively clarify a pertinent correlation, allowing us to comprehensively
analyse Zero Trust’s prevalence across diverse research domains. This multifaceted examination enables
us to delineate the Zero Trust model’s relationship with the spectrum of scientific terminologies, each
representing distinct applications and contexts of the model. The graphical representation in Figure 5
and Figure 6provides a visual synthesis of these interconnections, illustrating the semantic and conceptual
linkages between the Zero Trust Model and the other terminologies enumerated in Table 2. These connections
are derived from an extensive corpus of scientific literature indexed in the Scopus database, offering a robust
foundation for our analysis. The synergistic examination of these representations offers a nuanced perspective
on the pervasive influence of the Zero Trust Model across the scientific landscape. This comprehensive
analysis not only elucidates the current state of Zero Trust research but also potentially identifies emerging
trends and unexplored avenues for future investigation. The diverse array of associated terms underscores
6
the model’s adaptability and broad relevance, suggesting its continued significance in addressing security
challenges across multiple domains.
1.2. Comparative Analysis of Existing Surveys
Numerous studies have investigated the architectural and technical elements of ZTA. In this part, we
provide a brief literature review of existing surveys on ZTA, highlighting the unique contributions of each, as
summarized in Table 3. Authors in [6] conducted a survey that scrutinized ZTA papers employing a search
model that differentiated academic literature from grey literature (non-academic, commercial, or private
sources.) and examined the drawbacks and expenses of ZTA considering the economic impact and user
viewpoint within a blockchain context. Furthermore, researchers in [7] provide a research investigation into
the pros and cons of access control models and authentication protocols while contrasting prevalent assess-
ment techniques used to evaluate trust. Similar to Syed et al.[8] exploring the latest authentication and
access control technologies within various ZTA contexts, focusing on ZTA encryption, micro-segmentation,
and security automation, and expanding its scope to encompass software-defined perimeters and challenges.
Pittman et al.[9] propose implementing Zero Trust tenets directly to data objects rather than access path-
ways. In [10], researchers centre on employing AI techniques to automate and orchestrate ZTA, highlighting
their significant potential and roles in addressing the challenges and enabling automation and orchestration
of the model. Teerakanok et al. [11] explores the obstacles, necessary procedures, and relevant factors
involved in transitioning from traditional architecture to ZTA.
Surveys historically emphasized ZTA architecture development and management, while current ones
focus on comprehensive evaluations of theoretical models and application scenarios within ZTA. According
to the literature, none of the surveys, to our knowledge, handle ZTA technologies within the context of
connected vehicles.
Table 3: Analysis of existing surveys on Zero Trust
(: Discussed : Partially Mentioned X: Not Mentioned )
Reference Contributions
ZT
Principles
ZT
Architecture
ZT Maturity
Model
ZTA
Challenges
ZTA
applications
ZTA-CVs
7
Buck et al. [6]
Synthesizing Zero Trust
Foundations and Iden-
tifying Knowledge Gaps
across Industry and
Academia
X X X X
He et al.[7]
Analysing ZTA core tech-
nologies and comparing
their advantages and
drawbacks
X X X X
Syed et al.[8]
Exploring Access Control
and Authentication of
ZTA
XX X
Pittman et al. [9]
Adopting Zero Trust Prin-
ciples for Safeguarding
Data Objects
X X X X
Sarkar et al.[12]
Grouping and Comparing
New Elements in Zero
Trust Models for Cloud
Networks
X✓✓X
Alevizos et al. [13]
Examining ZTA-based
models and blockchain-
driven intrusion detec-
tion and prevention to
strengthen endpoint
security
X X X X
Cao et al.[10]
Evaluating AI-centered
methods for addressing
the technical aspects of
automating ZTA
X
Teerakanok et al. [11]
Examining the challenges
and essential aspects of
transitioning to ZTA
X X X X
8
Yan et al. [14]
Evaluating the fundamen-
tal technologies within
ZTA components
XXX
Hongzhaoning et al.[15]
Introducing the "trust
base" and outlining future
research trends
X X
This Survey.
Exploring the Zero Trust
model and its application
in enhancing cybersecu-
rity, particularly in con-
nected vehicles (CVs)
As the automotive industry embraces digital transformation and connectivity, the security challenges
associated with connected vehicles become increasingly prominent. Our motivation for linking the zero trust
principle with transportation stems from the critical challenges that threats and attacks have increasingly
targeted connected vehicles. Existing literature has proposed various techniques to enhance their security,
including blockchain and machine learning. Various studies have explored the application of ZT across
different domains, such as the Cloud, IoT, and 5G 6G. There is a significant gap in the literature regarding its
specific implications and benefits in the realm of connected vehicles (CVs). Building upon these foundations
and being inspired by adopting the zero trust model in other sectors. This paper addresses the pressing
need for a comprehensive survey on the zero trust security paradigm in light of its critical importance in
ITS, particularly in the connected vehicle landscape. The contribution of this paper is to explore the ZT
security paradigm by offering a holistic understanding of its principles and applications, showcasing the
adaptability of ZT in diverse technological landscapes. Focusing on connected vehicles, the paper addresses
unique security concerns, emphasizing the role of ZT in enhancing automotive security. Furthermore, the
paper offers a comprehensive analysis of ZT technology within the context of connected vehicles, contributing
to existing surveys.
9
Figure 7: Structure of The Survey
This paper, as illustrated in Figure 7, is organized as follows:
Section 1 presents an introduction with bibliometric analysis of existing literature and surveys on zero
trust security. Section 2 identifies the ZT concept, principles, and architecture. Section 3 introduces the Zero
Trust implementation process. ZT applications across different fields, Cloud, IoT, 5G/6G, and connected
vehicles are presented in Section 4. Section 5 provides insights into the communication system of CVs, the
cyber-attacks, and the threats they face. Section 6 examines the various approaches to zero trust within
the context of connected vehicles, along with the trust models. Section 7 discusses open problems and
challenges. Finally, Section 8 concludes the survey.
2. Zero Trust Generalities
The Zero Trust model is a cybersecurity philosophy founded on "Never Trust, Always Verify." In 2004,
the Jericho Forum, a collective of Chief Information Security Officers (CISOs) based in the United Kingdom
10
[16,4], introduced the idea of deperimeterization. And then, in 2010, it gained interest from John Kindervag
[17,10,7], a former Forrester analyst. The idea challenges the traditional security model by assuming that all
users, devices, and applications, regardless of location within or outside the network, are potential security
threats. The Zero Trust model earns trust instead of assuming it implicitly. It grants access to resources
through authentication, authorization, and continuous monitoring, maintaining the necessary confidence in
the legitimacy of users and devices before granting access. This security model minimizes the assumed trust
and focuses on continuous and real-time validation and verification of entities seeking access to resources.
In the cybersecurity landscape, there are several influential ZT models. Well, BeyondCorp is a Google
business security model for building zero trust networks that shift access controls to an individual device
and user level. This allows workers to work from anywhere while knowing that the information is securely
kept off the traditional VPN. Further, BeyondCorp allows access based on the credentials of users, be it
their status or that of the devices, ensuring full authentication, authorization, and encryption independent
of the network location. It provides fine-grained access to the resources of an enterprise, having multiple
components that ensure whether a device is authenticated or not and a user authenticated therein to access
desired applications [18,19]. Microsoft moved to a zero trust access architecture, focused on least privilege
principles among the identities, people, services, and IoT devices as it transitioned to cloud-based services
and mobile computing. Thus, Zero Trust Access provides secure access by supplying comprehensive measures
for device health monitoring, application and API controls, data encryption, and telemetry for threat and
risk detection. The in-built next-generation segmentation, real-time threat protection, and analytics fortify
the network security with a robust model for cybersecurity [?20]. The research framework of this study
is predicated on the National Institute of Standards and Technology (NIST) Zero Trust (ZT) model. This
choice is based on its accordance with the study’s central focus on zero trust implementation within connected
vehicle environments [21,22]. The NIST ZT model provides a robust foundation for addressing the complex
security challenges inherent in vehicular networks.
2.1. Zero Trust Principles
The ZT model is founded on various core principles that significantly differ from traditional security
models. The basic tenets of ZT security involve being proactive in network security by assuming that the
network is under constant threat from hostile actors. This clearly indicates the need to recognize threats
from both within and outside the network. It emphasizes that security risks can emanate from external
sources such as hackers or malware, but they can also originate from compromised devices or malicious
user intent. This clearly indicates that the mere location of network entities is not enough to base a trust
assessment. Still, a multi-factor approach has to be taken and considered, which is above and beyond the
physical or virtual location. Also, there is a need for strict authentication and authorization procedures for
all devices, users, and network traffic to grant access to network resources. Besides, this model suggests
11
that security policies should be dynamic. Instead of using static, predefined policies, this model relies on
real-time data from multiple sources. This way, the network adapts to emerging threats by dynamically
adjusting security controls in response to real-time evolving conditions [7,23].
Some related technologies used in the ZT model include Least Privilege Access[24], which controls user ac-
cess using just-in-time and just-enough access, adaptive risk policies, and data protection measures. Thus,
security for both the data and productivity is enhanced. In addition, ZT networks incorporate micro-
segmentation[25], where security perimeters are broken into smaller zones, thus ensuring different access
controls for different network segments. This ensures there is no lateral movement, and any compromised
device or user account is quarantined once the presence of an attacker has been detected. ZT security
emphasizes Multi-Factor Authentication (MFA), which requires users to present more than one form of au-
thentication evidence to access resources, thereby enhancing authentication security beyond mere password
entry. Encryption, a cornerstone of ZTA [26], plays a crucial role in securing data at rest, in transit, or
during processing. Encryption transforms sensitive data into a nonsensitive format, such as by replacing
names with arbitrary identifiers, thereby minimizing the attack surface, significantly reducing the risk of
data breaches, and providing effective protection.
2.2. Zero Trust Architecture
Zero Trust Architecture is a cybersecurity model that implements ZT principles within a network of busi-
ness infrastructure and operational procedures. It focuses on component interactions, workflow planning,
and access controls to enhance security measures [4]. Figure 8shows the main components of NIST’s ZTA
model. As depicted in this figure, the Policy Decision Point (PDP) is a crucial component for managing
authentication decisions and access policies, consisting of two core elements: the Policy Engine (PE) and the
Policy Administrator (PA). A PE is critical in making decisions about whether a certain subject should be
allowed a resource by applying the Trust Algorithm (TA), the different external data sources, and business
policies. It collaborates with a PA to develop and implement access policies. Both the PA and PE interlink
with one another to allow or deny access based on PE decisions. To enforce policies, it might be integrated
into the PE framework and communicate with the Policy Enforcement Point (PEP). The PEP is responsible
for managing subject and enterprise resource connections, as well as communicating with the PA. It has the
flexibility to function as a single component or be separated into client and resource sides, extending the
trust zone beyond the PEP.
In a ZTA setup [4], aside from the core components, various data sources, both internal and external,
provide input and policy rules for the PE to use a TA in order to make decisions about access. The en-
terprise security infrastructure comprises several interconnected systems. The Continuous Diagnostics and
Mitigation (CDM) system focuses on maintaining asset states, verifying factors like OS patching correct-
12
ness, software integrity, and known vulnerabilities, and extending its reach to nonenterprise devices. The
compliance system addresses regulatory frameworks and enforces policy rules to ensure industry compli-
ance. Threat intelligence provides information on attacks, vulnerabilities, and malware to the policy engine.
Network and system activity logs consolidate real-time insights into security status, while data access poli-
cies govern resource access. The Enterprise Public Key Infrastructure (PKI) generates and logs certificates
that are potentially integrated with the global PKI ecosystem. The ID management system oversees user
accounts, roles, and access details, possibly linked with PKI. Lastly, the Security Information and Event
Management (SIEM) system collects security-centric data for analysis, refining policies, and issuing alerts
for potential attacks on enterprise assets.
Figure 8: Logical components of the zero trust architecture (NIST SP 800-207 Model [4])
The policy engine in the ZTA is the central decision-maker, with its primary thought process guided
by the TA. This algorithm, utilized by the PE, determines whether to grant or deny access to a resource.
The decision-making process incorporates inputs from various sources, such as the policy database, which
contains data on subjects, their attributes and roles, their past behavioral patterns, threat intelligence
sources, and other metadata sources. This is illustrated in Figure 9.
13
Figure 9: Trust algorithm [4]
The access request process involves subjects requesting information about assets, considering factors
like OS version, software, and security status. Access is restricted based on requester credentials and
asset security posture. The subject database and history manage subject attributes and privileges, which
are stored in the ID management system. The asset database tracks asset status, with access restrictions
based on alignment with database information. Resource policy requirements establish minimum criteria for
access, including authentication assurance levels and data sensitivity. Threat intelligence and logs provide
information on threats and malware, typically managed by external services[4].
3. Zero Trust Model Implementation
The implementation of the zero trust model generally involves deploying security measures and protocols
that do not inherently trust any device or entity within a network [27], as described in the previous section,
to provide robust defenses against evolving threats and vulnerabilities. The implementation process involves
several stages and considerations, including the pillars that support the ZT model. In this section, we delve
into the pillars of the zero trust model along with the Zero Trust Maturity Model (ZTMM) to provide
clarity and guidance throughout the implementation process. Figure showcases the occurrence of zero trust
implementation keywords
14
Cybersecurity
Cyber Security
Validation
Security Strategy
Compliance
Zero Trust
Implementation
Networks Security
Zero Trust Core Implementation
Network Security
Network Architecture
Keycload
Kubernetes
Access Control
Security Architecture
Zero Trust Architecture
Security
Figure 10: Zero trust implementation keywords occurrence
3.1. Pillars of Zero Trust Model
Before implementing ZTA, users must consider the seven main pillars that support a ZT model. The
Cybersecurity and Infrastructure Security Agency (CISA)[28] created a ZTMM (Figure 12), which outlines
the fundamental pillars essential for a robust ZT model. The pillars, as shown in Figure 11, were divided into
Identity, Devices, Network/Environment, Applications/Workloads, And Data. Each pillar includes common
components for visibility and analysis, automation and orchestration, and governance.
Figure 11: pillars of zero trust model [28]
For which, identity describing the unique features of agency users or entities is essential to creating
15
secure access controls. In addition, a number of diverse hardware assets, such as IoT devices and mobile
phones, interconnect with the network, enabling seamless communication and exchanging data. Furthermore,
applications and workloads that exist on-premises or in the cloud rely on this network infrastructure to
function. Meanwhile, data, which is fundamental to agency operations, flows through these interrelated
systems, placing a high value on data protection mechanisms. Moreover, visibility and analytics bring
viewpoints to enterprise-wide events, guiding informed decisions and proactive security actions. Automation
and orchestration smooth out security response functions; therefore, they enhance general efficiency and
resilience. Last but not least, governance ensures that enforcement of cybersecurity policies runs across the
enterprise, further strengthening adherence to ZT principles and federal requirements.
3.2. Zero Trust Maturity Model
That would be a progressive ZT implementation, a procedure requiring time and effort, so it could not
be implemented quickly. Most networks can use the majority of their installed base by implementing ZT
concepts, but achieving a mature ZTA often requires additional capabilities to fulfill its promise completely.
It is not imperative to transition to a mature ZTA in one stroke. Instead, integrating ZT functionality
incrementally as part of a strategic plan helps reduce risks at every stage. As the ZT implementation evolves,
improved visibility and automated responses empower defenders to counter emerging threats effectively. The
National Institute of Standards and Technology (NIST)[4] has published a ZTA guide outlining the seven
tenets of the ZTMM. These tenets are described as follows:
1. Considering as resources all data sources and computing services.
2. Securing every communication across network locations.
3. Per-session access granting for individual enterprise resources.
4. Resource access governed by dynamic policies.
5. Integrity and security posture of the enterprise assets are monitored and assessed comprehensively.
6. Strict enforcement of dynamic authentication and authorization for resource access.
7. Enhancing security posture through comprehensive data collection on assets, infrastructure, and com-
munications.
16
Figure 12: Stages of zero trust maturity model [28]
The NIST outlines that the complete and pure implementation of all tenets may not be entirely achievable
within a given strategy. CISA’s ZTMM is just one of the diverse options available to facilitate the shift
towards a ZT model. This model is based on the pillars discussed earlier (subsection 3.1).
The zero trust journey unfolds in five stages (Figure 12). In stage zero, organizations initiate security
processes like asset discovery and risk assessment. Transitioning to stage classic, they often rely on man-
ual configurations and isolated policies with limited enforcement capabilities. Progressing to stage initial,
automation begins, emphasizing least privilege and improved visibility. Advanced stages prioritize con-
tinuous monitoring and automated threat response, ensuring centralized visibility and integrated policies.
Finally, stage optimal marks the pinnacle, where full automation and enterprise-wide implementation of
ZTA are achieved, demanding comprehensive revisions across people, processes, and technology to complete
the initiative.
3.3. Open-source Tools For Zero Trust Model
Various organizations have developed a wide array of open-source tools to facilitate the implementation
of zero-trust security architectures. These tools encompass a range of functionalities crucial to the Zero
Trust model, including micro-segmentation, fine-grained dynamic access control, safe communication, and
centralized policy management. These features collectively simplify the application and enforcement of Zero
Trust principles across diverse IT environments.
OpenZiti
OpenZiti is an Open Source project by NetFoundry that allows ZT integration into existing systems
using a very flexible ZT overlay network. This gives a private networking capability that is unavailable
to the Internet and makes port sniffing ineffective in finding any unauthorized access owing to the fact
that there are no listening ports on the services. Strict identity-based access control insists on strong
17
authentication before establishing a connection. It also supports Zero Trust methodologies such as
attribute-based access control (ABAC), end-to-end encryption, and least privilege [29].
Keycloak
Keycloack is an open-source Identity and Access Management system used in securing web applications,
microservices, and APIs. It provides a single location where authentication and authorization are
managed and has a large community of users. Keycloak is considered to be one of the top IAM
solutions within the open-source space and is very fast on its way to gaining high popularity due to
its powerful capabilities it has and speed of development [30]. Noticeably, this aligns with Zero Trust,
a model in which IAM plays a very active role since it assures and authenticates secure access to
networks and applications.
Tailscale
It is a modern implementation of Zero Trust VPN, creating secure tunnels to services and applications
across untrusted networks. Each host has to run a client software while having some central server
coordinate authentication keys and the access policies. Clients form a secure mesh network. Concretely,
Tailscale creates full VPN tunnels for all client traffic and is based on the Wireguard protocol[31].
Ockam
Ockam is a library that enables secure end-to-end communication. It works as a Policy Enforcement
Point (PEP) to build Zero Trust applications in Rust and supports key establishment, rotation, revo-
cation, and attribute-based access control mechanisms. Ockam works with many transport protocols
like TCP, UDP, WebSockets, and Bluetooth. All Ockam applications create secure channels using
either the Noise Protocol Framework or the X3DH protocol[31].
4. Zero Trust Applications
Zero Trust principles, characterized by their proactive and continuous verification model to security, have
found widespread application across diverse fields, such as cloud computing, IoT, 5G/6G, and connected
vehicles, each presenting its own challenges and requirements.
In cloud computing, ZT principles play a crucial role in ensuring continuous verification of access to
cloud resources, thereby minimizing the risk of unauthorized access and data breaches. Various studies have
contributed to advancing the understanding and implementation of ZT model in different contexts. Ahmed
et al. [32] proposed a decentralized identity and access management (IAM) framework to minimize the
controlling power of any single entity over digital assets in cloud environments. Likewise, Chuan et al. [33]
introduced a technique that helps small and medium-sized businesses establish situations where users access
intranet data across servers hosted in the cloud. Mehraj et al.[34] created a conceptual model to address
18
security issues that appear while deploying new infrastructure in the cloud. This model allows cloud server
providers and customers to identify legitimate entities inside the cloud environment. Leveraging machine
learning for behavior analysis. Saleem et al. [35] propose a zero trust security architecture that uses the
Rich model for trust verification in SaaS. Furthermore, Ferretti et al. [36] addressed the issues around the
zero trust principles and trusting control plane components by proposing a method to divide trust and
mitigate potential attacks. For wireless environments, Mandal et al. [37] presented a new access control
model based on a zero trust network. This model aims to reduce vulnerabilities, focusing on MAC spoofing
prevention and general security reinforcement. Additionally, in order to strengthen network security and
protect cloud assets, researchers in [38] suggested a network design that included first-packet authentication
and transport access control. Rodigari et al. [39] evaluated the performance of ZT implementation with
a focus on multi-cloud scenarios using Istio service mesh, providing an understanding of resource use and
latency. Finally, Sarkar et al. [12] presented a combined zero trust network architecture for cloud networks
that coordinates user security, improves network visibility, slows down cyberattacks, and automates trust
computations.
IoT security depends on ZT principles, allowing stringent access controls and device authentication to
reduce risks. Awan et al. [40] suggested a dynamic method that combines blockchain technology, attribute-
based access control (ABAC), and ZT principles to improve security in smart cities and other large-scale
IoT infrastructures. Their solution ensures all security features, including data privacy, confidentiality, and
authentication, for every user accessing IoT devices across a network. Dimitrakos et al. [41] presented
a unique ZTA-based trust-aware continuous authorization technique created specifically for consumer IoT
networks, especially smart home situations. This lightweight architecture provides effective speed, scalability,
and flexibility while answering privacy and security concerns. In another study, Shah et al. [42] proposed
a lightweight continuous device-to-device authentication protocol (LCDA) that will be suitable for low-
resource IoT devices. Through process simplification and lightweight encryption, the protocol reduces energy
consumption while ensuring strong resistance against a wide variety of threats. For IoT contexts,Wang
et al. [43] developed a zero trust architecture-based safe access technique that exploits identity-centric
authentication and dynamic access control. Their model detects and mitigates cyber risks in distributed
power access settings, while balancing comprehensive security measures and lightweight architecture. To
address the complexity of IoT access control, Meng et al. [44] developed a blockchain-based continuous
authentication system inside a ZT model for solving the complexity of IoT access management. That
system improves efficiency by ensuring safety and categorizing the devices into three categories: trustworthy,
suspicious, and untrusted. To deal with the exponential increase in data within 6G networks, Han et al.
[45] developed a blockchain-based zero trust data storage technique. The proposed method reduces resource
consumption, improves data security, and increases storage and bandwidth. Moreover, Zhao et al. [46]
19
proposed the IoT device authentication system based on blockchain, which brings not only security but
categorizes devices as entities of trust and provides strong options for authentication.
Similarly, using ZTA in 5G and 6G networks tackles comparable security concerns for the upcoming gen-
eration of fast, linked networks. In this context, ZT provides robust security measures to safeguard critical
communication channels against emerging threats. Coping with the escalating connectivity of devices in un-
trustworthy environments within 5G/6G networks necessitates dynamic security frameworks. The authors
in [47] proposed an intelligent Zero Trust Architecture (i-ZTA) for 5G/6G networks. The i-ZTA provides
dynamic network assurance, real-time processing of big data, AI-driven components for ZT principles, and
presents innovative research directions for enhancing information security in untrusted 5G/6G networks. A
blockchain-based zero trust security-enabled federated learning system, "Shunk", was suggested by [48] to
deal with the challenges of configuration complexities and security management in 5G/6G networks with
network slicing and the limitations of existing centralized federated learning (FL) systems. The platform
ensures transparency and data provenance. Its sharding-based architecture improves security across vari-
ous network slices, addressing centralized coordinator-based federated learning challenges. Scientists in [49]
recommended a robust ZTA empowered intrusion detection model to resolve challenges in 6G edge comput-
ing. The model ensures accurate cyber-attack detection, protection from internal and external threats, and
efficient network cost management, as demonstrated by high detection rates, low false positive rates, and
reduced network costs in simulation results. Scholars in [50] proposed an Intelligent Zero Trust (iZT) model
for enhanced security in 6G networks that employs distributed threat detection and collaboration to bolster
defences against RAN threats. Hireche et al.[51] presented a distributed trustworthy SelfDN utilizing zero
trust telemetry, automated code rewriting with P4 and AI, and secure, decentralized knowledge sharing
with blockchain to counter challenges in complex networks in the face of high connectivity. The model
enhances monitoring with real-time telemetry, achieves autonomous code translation, enables decentralized
knowledge sharing, demonstrates practical effectiveness against distributed denial of service (DDoS) attacks,
and positions AI as a transformative element in achieving the SelfDN vision.
Transitioning from the application of ZT principles in cloud computing, IoT security, and 5G/6G net-
works to their integration in connected vehicles highlights the broad spectrum of cybersecurity threats faced
by these emerging technologies. Implementing trust management in vehicular environments poses challenges
due to frequent network disconnections, dynamic mobility patterns, and constraints in computing and com-
munication capabilities [52]. Nonetheless, ZT effectively addresses these risks by enforcing authentication
mechanisms and segmenting network access, providing a proactive model to improving network security in
connected vehicles. Zayed et al. [53] proposed implementing a zero trust architecture through verifying
vehicle owner identity. Researchers in [54] presented a security scheme founded on blockchain and zero trust
principles to protect both the chargers and the cloud platform. On the other hand, Zhao et al. [22] suggested
20
5th Generation
5G
5G Mobile Communication System
Zero Trust Architecture
Ran
6G
G-Networks
Decentralized Approach
Cloud Technologies
Internet of Things
Industrial IoT
Zero Trust
Cloud Technologies
Figure 13: Zero trust applications keywords occurrence
a security model for smart charging stations, using a ZT model to secure vehicle-node communication. Wang
et al. [55] introduced a Zero Trust Access Control Model (AU-ZTAC) based on attributes and user trust
scores. Furthermore, scientists in [56] introduced a security scheme for the Internet of Vehicles (IoV) that
combines multifactor authentication, blockchain encryption, and a zero trust architecture.
Figure 13 demonstrates the occurrence of the zero trust application keywords across the different fields
explained earlier.
5. Cybersecurity Challenges in Connected Vehicles
In this section, we delve into the critical aspects of securing CVs, beginning with an overview of the
topic. Our investigation encompasses a range of considerations, including trust models and intra-vehicle
and inter-vehicle network cyber-attacks. First, we introduce the overview of connected vehicles to establish
the necessary context for understanding the complexities and variations involved in ensuring the security of
these intelligent transportation systems.
5.1. Connected Vehicles Overview
Connected vehicles are vehicles that use communication technologies to enable them to exchange data
with the Internet, other vehicles, infrastructure, and mobile devices wirelessly. They provide features such
as real-time data transmission, remote control, and applications like traffic safety, infotainment, and au-
tonomous capabilities. These vehicles enhance situational awareness for occupants, playing a crucial role
in ITS and IoV. Vehicle networks, both external and internal, facilitate communication between different
21
systems within CVs, in both intra and inter-vehicle communication, ensuring seamless connectivity and
collaborative functionality.
5.1.1. Intra-vehicle communication
Intra-vehicle communication entails data and information sharing across various vehicle devices, en-
compassing control units, monitoring components, mobile devices, execution components, wearables, and
other elements. A complex diverse network is formed by the intra-vehicle network, enabling information
exchange and coordinated control among electronic components, including sensors (LiDAR, RADAR, Cam-
era, GPS...etc), actuators, and Electronic Control Units (ECUs) for an enhanced driving experience[57].
The intra-vehicle network comprises interconnected subnets communicating through gateways with various
protocols. The proliferation of electronic components, particularly numerous ECUs in modern vehicles con-
nected to the intra-vehicle network (IVN), is vital for advancing autonomous vehicle technology, yet it raises
safety concerns with an expanded attack surface [58].
The current automotive landscape incorporates five key intra-vehicle networking technologies: Controller
Area Network (CAN), Local Interconnect Network (LIN), FlexRay, Media Oriented Systems Transport
(MOST), and Automotive Ethernet.
The Controller Area Network (CAN) is a cost-effective and reliable serial bus network connecting devices
within control applications. It supports data rates up to 1 Mb/s, utilizing a message-based broadcast pro-
tocol for intra-vehicle communication among ECUs. However, limitations include relatively low bandwidth
and shared data transmission, restricting its application in certain domains [59,60]. The Local Interconnect
Network (LIN), standardized by ISO 17987, is a cost-effective network for low-bitrate vehicular applications,
operating at 1 to 20 kbps. It utilizes a single wire to connect a master to multiple slaves, serving as an
affordable solution for automotive sensor and actuator connections, linking them with higher-level networks
like CAN [61]. FlexRay provides higher bandwidth and fault tolerance than CAN, albeit at a higher cost. Its
dual-channel architecture makes it suitable for safety-critical systems like brake-by-wire, offering a compet-
itive alternative for high-performance applications [62]. Media Oriented Systems Transport (MOST) excels
in transmitting multimedia data within vehicles, with bandwidths ranging from 25 to 150 Mbps. MOST
operate in a ring topology, supporting up to 64 devices, but its higher cost limits its use to applications
requiring essential multimedia capabilities [63]. As automotive ethernet evolves to meet diverse needs like
bandwidth and network management, it provides enhanced communication bandwidth for advanced driv-
ing features and infotainment systems. Despite its standardization, automotive ethernet inherits security
weaknesses from traditional ethernet, necessitating robust cybersecurity measures to safeguard intra-vehicle
networks. While each protocol offers advantages, its vulnerability to cyber attacks underscores the need for
stringent cybersecurity to ensure modern automotive safety and the integrity of the system [64,65].
22
5.1.2. Inter-vehicle communication
Inter-vehicle communication (IVC) involves real-time information sharing among vehicles within a net-
work facilitated by modern technologies. In the context of ITS and autonomous driving, this communication
kind crucial for sharing safety-related data and enhancing perception and planning. It allows vehicles to au-
tonomously respond to potential risks, contributing to accident prevention without direct driver intervention.
Given traditional limitations of sensors and reliance of autonomous vehicles on environmental data, secure
and reliable communication technologies are essential for effective inter-vehicle networking [66,67]. VANET
extends the principles of traditional MANET (Mobile Ad-hoc Network) to traffic scenarios, which aim to
swiftly transmit safety messages and infotainment services for drivers and autonomous vehicles [68,69].
Prioritizing critical safety information delivery, VANETs offer various services, including safety applica-
tions, driving assistance, cooperative driving, collision avoidance, traffic control, and entertainment [70,71].
It utilizes V2X (Vehicle-to-Everything) technologies, including V2V (Vehicle-to-Vehicle), V2I (Vehicle-to-
Infrastructure), I2I (Infrastructure-to-Infrastructure), V2P (Vehicle-to-Pedestrian), and V2C (Vehicle-to-
Cloud).
In a VANET setup, vehicles utilize onboard units (OBUs), roadside units (RSUs), and a trusted au-
thority (TA). The TA, an external device, registers RSUs, authenticates vehicles, and monitors the network
via RSUs [72,73]. RSUs, stationed along the roadside and utilizing wireless technologies like WiFi, act as
intermediaries between the TA and vehicle OBUs, conveying safety instructions to nearby vehicles. OBUs,
fixed on vehicles, facilitate the transmission of vital messages to neighboring vehicles [74].
The increase in vehicle traffic highlights the significance of VANETs within ITS. Although VANETs
facilitate wireless communication among vehicles, their constrained processing capabilities confine them
to short-term or localized applications, hindering the advancement of vehicle-based services. To address
this limitation, an integrated network infrastructure is required. The incorporation of IoT is reshaping
conventional VANETs into the IoV, distinguished by seamless wireless connectivity among vehicles [75]. This
evolution promises to enhance road safety and reduce congestion while improving the driving experience.
V2V communication via DSRC or IEEE 802.11p creates a local ad-hoc network with limited reach and
capacity, supporting around one hundred vehicles within a few hundred meters. However, 5G’s Cellular-
Vehicle to Everything (C-V2X) technology can also establish V2V connections. When comparing V2V
using IEEE 802.11p to C-V2X, it’s evident that C-V2X offers a broader range. However, there could be
a trade-off regarding data capacity [76,77], as the Radio Access Network (RAN) coordinates participants
in the network [78]. Despite the intended objectives of 5G technology to achieve great capacity, massive
bandwidth, vast connections, low latency, and low power consumption, challenges arise due to vendor-specific
hardware and protocols. As 5G networks become more sophisticated, operators face difficulties dynamically
23
adjusting network operations. This complexity and the associated costs become more pronounced as the
technology evolves [79]. On the other hand, integrating 6G technologies into ITS is poised to revolutionize
network performance. This includes advanced communication technologies like AI-enabled wireless networks,
ultra-reliable low-latency communication, solutions for faster mobility, and secure practices for IoV. 6G
integration promises to improve efficiency, smart traffic management, and address dynamic challenges in
transportation networks, presenting opportunities for advanced connectivity and streamlined data processing
[80]. Furthermore, the onboard server has limited computing and storage capability, and intricate computing
tasks are expected to be accomplished with the support of cloud computing or mobile edge computing[81].
Vehicular clouds play a crucial role in providing services such as route planning and safety control to
vehicles. These clouds communicate with other commercial clouds as well as sensor clouds, forming based
on the services needed. Core functionalities, including communication, processing, sensing, and storage,
are essential for vehicular clouds. Vehicles can join existing clouds or initiate formation, and a dynamic
cloud leader manages resources and incoming requests. This technological model offers feasible solutions for
enhancing vehicular cloud infrastructure[82].
Figure 14 represents A VANET architecture with cloud computing and 5G C-V2X in the Internet of
Vehicles environment. VANET architectures typically consist of interconnected elements to facilitate efficient
communication and data processing in a vehicular network.
24
Figure 14: Hybrid VANET architecture (cloud computing, 5G-cellular networks)
5.2. Intra-vehicle Networks Cyber-attacks
Intra-vehicle networks (IVNs) face a range of cybersecurity threats. Cyber attackers can exploit vulner-
abilities by obtaining physical access through entry points like the OBD-II port, USB connections, and CD
player. Moreover, short-range wireless technologies such as Bluetooth and RFID and long-range options
like Wi-Fi and LTE offer potential avenues for intrusion. Additionally, attackers may focus on exploiting
vulnerabilities in communication protocols and the sensors, including LiDAR, RADAR, and cameras, inte-
grated into IVNs. In this subsection, we briefly explore the main IVN cyber attacks including sensors and
protocols cyber attacks.
5.2.1. Intra-vehicle sensors cyber attack
Cyber threats to connected vehicles are a significant concern, particularly for key components of the
vehicle. Research in [83] describes the various attacks on intra-vehicle sensors, like the camera [84], integral
for functions like lane detection and pedestrian recognition. The camera in CVs faces susceptibility to ma-
nipulation by attackers. Deceptive tactics involve introducing ambiguous shapes on road signs or disrupting
lane detection using unconventional elements. One specific threat, a blinding attack, uses a powerful laser
beam to increase tonal values and hide the camera feed, causing complete blindness to vehicle sensor inputs.
25
This can cause vehicle deformation and need emergency braking. Another form of attack, the auto-control
attack, focuses on camera sensors, employing continuous bursts of light to manipulate auto controls and
prevent image stabilization. Typically executed as a front, rear, or side attack, this assault can hinder the
functionality of the camera.
LiDAR, crucial for precise object detection in safe transportation, is vulnerable to cyber-attacks, espe-
cially in its fixed position within Adaptive Cruise Control (ACC) and collision avoidance systems. Despite
the limitations of the camera, the high spatial resolution of LiDAR allows accurate scanning to distinguish
between cars and pedestrians. However, cyber threats pose risks to the reliability of LiDAR. Denial of
service attacks can slow down object detection by flooding the system with excessive objects. Moreover,
replay attacks involve recording LiDAR signals for later transmission, thereby creating non-existent objects
that disrupt the accuracy of distance gauging in LiDAR. Furthermore, blinding attacks saturate LiDAR
with light, discreetly denying its services. Additionally, spoofing attacks make LiDAR detect non-existent
objects, potentially causing miscalculations. Lastly, jamming attacks disrupt the operation of LiDAR by
emitting light at the scanner unit, further complicating its functionality [83,84].
Cyber attackers exploit vulnerabilities in the Global Positioning System (GPS) [83,84] through spoofing
attacks, manipulating GPS data to misdirect vehicles. The susceptibility of Tesla vehicles to wireless GPS
spoofing underscores the severity of this security threat. Spoofing involves strengthening false signals over
authentic GPS signals, leading vehicles off course. Simpler attacks like jamming, where noise disrupts
authentic signal reception, also pose risks to vehicle navigation systems. In GPS jamming attacks, signals
are intentionally disrupted, preventing the vehicle from being located. Spoofing attacks take advantage of
the low power of GPS signals, supplying false signals to compromise data integrity. Such attacks can be a
preliminary step for additional threats, including replay and tunnel attacks.
Radar sensors [84] serve diverse functions: long-range for ACC, mid-range for Lane Change Assistants
(LCA), and short-range for parking obstacle alerts. However, security concerns arise, and jamming attacks
involve disrupting radar sensors with a signal in the same frequency band, reducing the signal-to-noise ratio
of the sensor and impairing its capacity to identify objects in nearby areas. Risks also occur due to spoofing
relay attacks, in which malicious actors continuously retransmit a previously legitimate signal in order to
falsify it. Attackers store and duplicate a signal using a Digital Radio Frequency Memory (DRFM) repeater
to trick the radar into thinking it is legitimate. The integrity of radar-based systems is being challenged by
these attacks.
5.2.2. Intra-vehicle communication protocols cyber attacks
The integration of various components within the intra-vehicle network has enhanced safety, comfort,
and performance while connecting with external devices, which further enriches the user experience. How-
ever, these digital communications also present security risks [85]. This section illustrates the attacks that
26
compromise the CAN, LIN, MOST, FlexRay, and automotive ethernet networks.
Conducting a vulnerability assessment of a network is crucial for identifying security issues. For the
CAN protocol, such an assessment focuses on confidentiality, integrity, and availability. Unfortunately,
the protocol lacks inherent cryptographic methods, compromising confidentiality and allowing unauthorized
access to sensitive data. While the CAN bus employs Cyclic Redundancy Checksum (CRC) for integrity
verification, it is unable to prevent malicious data injection, thus failing to ensure data integrity. In addition,
the priority-based messaging system threatens availability and could result in the inability of the network
to be available to other lower priority nodes. Therefore, the CAN protocol performs poorly on all three
security criteria and thus is vulnerable to attacks from various attacks [59].
The CAN bus security system is considered sensitive because of the variety of potential attacks, includ-
ing bus-off attacks, DoS, masquerading, injection, eavesdropping, and replay attacks. The CAN frames
lack encryption and authentication mechanisms, which is why these attackers take advantage of them by
disrupting communication and also compromising critical systems in a vehicle [86]. Through their error
message flooding, the bus-off attacks may cause nodes to go into a "bus-off" state where the communication
between critical vehicle systems shuts down. DoS attacks would block all communication over the bus,
violating the CAN bus’s availability. In contrast, man-in-the-middle attacks violate the integrity of commu-
nication by sniffing and modifying the messages. Injection attacks, conversely, through the exploitation of
the OBD-II ports, gain unauthorized access to the ECUs. In contrast, replay attacks disrupt vehicle oper-
ations by causing the replaying of valid frames in repetition, this violates the freshness of the intra-vehicle
network property. Masquerading attacks exploit unencrypted communication patterns of CAN frames, and
eavesdropping compromises privacy, allowing unauthorized access to intra-vehicle information and facilitat-
ing subsequent attacks such as masquerading, injection, and replay. Implementing robust countermeasures,
such as encryption and authentication mechanisms, is essential for enhancing cybersecurity resilience and
defending against these multifaceted attacks in the CAN bus system [85,87].
LIN bus attacks can impact non-critical vehicle systems, affecting functionalities like infotainment, cli-
mate control, or lighting. Response collision exploits vulnerabilities in the physical and data link layers of
the LIN, causing message collisions and potential disruptions. Header collision manipulates header fields,
compromising the arbitration process and leading to conflicts in simultaneous transmissions [88]. Injection
attacks exploit application layer vulnerabilities, allowing malicious data injection and system malfunctions.
Forced Suspend Mode attacks temporarily suspend targeted nodes, disrupting communication and leaving
them vulnerable. DoS attacks take advantage of the lack of authentication by continually performing header
collisions, causing the bus to shut down and denying service. These attacks highlight the need for strong
security measures in LIN systems, especially when critical safety functions are compromised [85] . Finally,
The purpose of a message spoofing attack is to disrupt vehicular communication by sending unauthorized,
false messages and exploiting vulnerabilities in the master-slave model of the LIN [87].
27
Attacks on the MOST bus, integral for high-end multimedia functions in vehicles, can severely impact
multimedia and infotainment systems, leading to compromised audio and video playback, connectivity loss,
navigation malfunctions, and disruptions in entertainment features. Synchronization disruption, injection,
denial of service, and jamming attacks pose significant threats. Synchronization disruption involves intro-
ducing false timing information to disrupt MOST synchronization. Injection attacks aim to inject malicious
data or commands, thereby altering normal functioning. DoS attacks target the data link layer, delivering
false messages to interrupt legitimate ones, and jamming attacks disrupt low-priority legitimate messages
[85,87].
FlexRay bus attacks pose serious risks to safety-critical vehicle systems, impacting real-time commu-
nication for functions like braking and steering. Potential outcomes include compromised control signals,
disrupted ECU communication, and system failures. Common FlexRay attacks include masquerading,
eavesdropping, injection, replay, man-in-the-middle, full DoS, and targeted DoS. Masquerading involves
unauthorized devices being presented as legitimate ones and gaining access to sensitive data. Eavesdrop-
ping sees attackers intercept communication without consent, potentially accessing sensitive information. It
affects data confidentiality and includes security primitives. Injection attacks manipulate frames between
network nodes, causing system malfunctions. Replay attacks intercept and retransmit valid messages, mis-
leading the receiver [89]. Man-in-the-middle attacks occur when an attacker manipulates communication
between nodes, leading to security breaches. Full denial of service overwhelms the FlexRay network with
dominant signals, disrupting legitimate messages. By transmitting dominant signals, targeted denial of
service prevents specific, legitimate messages. These attacks exploit vulnerabilities like a lack of encryption
and authentication
Automotive ethernet networks are increasingly integral for high-bandwidth applications like infotain-
ment, advanced driver-assistance systems, and autonomous driving. However, potential attacks on these
networks pose serious risks, including unauthorized access, critical command manipulation, and communi-
cation disruption among ECUs. Consequences range from compromised vehicle functionality to safety risks
and privacy breaches.
Network access, eavesdropping, spoofing, injection, replay, Address Resolution Protocol (ARP) cache
poisoning, DoS, TCP hijacking, and CAM table overflow are common attacks on automotive Ethernet.
Unauthorized access is a component of network access attacks. Efforts at access, endangering control systems
and data privacy. By intercepting unapproved network access, eavesdropping jeopardizes privacy. Injection
attacks happen when an attacker inserts malicious messages into the automotive ethernet, compromising
the system; replay attacks take advantage of the lack of authentication by intercepting and retransmitting
legitimate packets to cause malfunctions. Spoofing entails impersonating a device to obtain unauthorized
access because there is no authentication. False ARP messages are the cause of ARP Cache Poisoning,
which can result in Man-in-the-Middle attacks. DoS attacks overwhelm the network, disrupting the system.
28
TCP hijacking involves intercepting and controlling TCP connections. CAM table overflow attacks exploit
limited table size, potentially causing system crashes or DoS[85].
5.3. Inter-vehicle Networks Cyber-attacks
Inter-vehicle communication in modern connected vehicles enables data exchange, supporting safety
features like collision avoidance and cooperative cruise control. However, this connectivity also introduces
cybersecurity risks, making vehicles potential cyberattack targets. Malicious actors could exploit vulnerabil-
ities in communication protocols, compromising data integrity and posing security threats. In the upcoming
section, we will explore various attacks on VANET networks, which aim to compromise availability, confi-
dentiality, integrity, authenticity, and nonrepudiation within vehicular networks.
Ensuring information availability is critical in VANETs, where various threats and attacks can impact this
aspect. DoS attacks, executed by internal or external malicious nodes, disrupt communication channels and
render services unavailable, posing a significant threat to VANET applications [67]. Jamming Attacks involve
using a powerful signal to block valid safety alerts, posing a serious threat to safety applications in VANETs
[73]. Blackhole attacks, present in both VANETs and ad hoc networks, involve malicious nodes throwing
away packets of data to cause a DoS. Malware attacks infiltrate VANETs through software components
responsible for operating OBUs and RSUs. Broadcast tampering attacks involve transmitting fake messages
to authorized vehicles, hiding correct safety messages, and posing a risk of dangerous accidents. Greedy
behavior in VANETs involves deceiving others with false data, causing bandwidth issues and delays for
registered users. Spamming attacks flood the network with numerous messages, presenting challenges due
to the absence of centralized administration [90]. The Grayhole Attack, a variant of the Blackhole Attack,
involves untrustworthy vehicles selectively forwarding certain data packets while dropping others without
detection [91].
Preserving confidentiality in VANETs involves using certificates and shared public keys for message en-
cryption, ensuring access only to designated vehicles. However, several common threats to confidentiality
exist. Eavesdropping, a prevalent attack on wireless networks like VANETs, focuses on obtaining unau-
thorized access to confidential data. This passive attack compromises confidentiality without having an
immediate impact on the network, allowing the collection of useful information, including location data,
which could be exploited for tracking vehicles. Another threat is traffic analysis in VANETs, which poses a
serious risk to confidentiality and privacy as attackers track transmitted messages, analyze their content, and
extract valuable information [92]. In a man-in-the-middle attack during V2V communication, the attacker
inspects and alters messages, gaining control over the communication while the entities believe they are
communicating directly in private. Additionally, a social attack aims to distract drivers by sending immoral
and unethical messages, impacting the driving experience and the performance of the vehicle within the
VANET system [93].
29
Authentication plays a crucial role in defending VANETs against attacks from both internal and exter-
nal malicious nodes. Various threats and attacks target VANET authentication. Sybil attacks, introduced
in [94], involve sending fake messages with multiple identities, disrupting normal operations, and causing
perceived traffic congestion in VANETs [95]. GPS spoofing disrupts vehicle navigation by generating false
information and misleading other vehicles with deceptive GPS locations. A tunneling attack in VANETs,
similar to a wormhole attack, involves creating an additional communication channel, known as a tunnel,
between distant parts of the network, enabling far-reaching nodes to communicate as neighbors. Replay
attacks, where valid data is deceitfully retransmitted to create unauthorized and malicious effects, pose a
prevalent security threat in VANETs. Additionally, the key and/or certificate replication attack encompasses
the deceptive use of duplicated keys and/or certificates from other vehicles, complicating authentication and
identification processes for trusted traffic authorities, especially during disputes [96].
Data integrity, ensuring that transmitted data remains unchanged, is a vital aspect in VANETs, and
several threats target data integrity. In a masquerading attack, intruders use registered user IDs and pass-
words to infiltrate the system, disseminating false or malicious messages that appear to originate from the
registered node. Exploiting each node’s unique MAC address and IP address, masquerading attackers uti-
lize stolen valid credentials for deceptive broadcasts within the VANET network. The replay attack repeats
or delays transmission by injecting previously valid data into the VANET network, posing challenges for
traffic authorities in identifying vehicles during emergencies [95]. The illusion attack involves generating
false data to deceive the VANET network, undermining integrity and data trust. Attackers exploit existing
road conditions to create illusions for nearby vehicles, diminishing system performance through deceptive
traffic warnings and undesirable bandwidth consumption. In a message tampering attack, assailants manip-
ulate recent message data before transmission, altering information during congestion to mislead users into
changing their driving paths. Attackers may delete, alter, or create new messages to achieve the intended
purpose of the attack [97].
Ensuring nonrepudiation in communication means that both the sender and receiver cannot deny the
transmission and receipt of messages during a dispute. Repudiation, a malicious action, occurs when an
attacker disrupts the transmission or reception of critical messages, causing severe damage. In this attack,
the assailant denies involvement in sending and receiving messages, particularly during disputes [95,91].
To provide a visual overview, Figure 15 presents a taxonomy of connected vehicle cyber attacks. This
analysis aims to shed light on the intricate landscape of cybersecurity challenges CVs face, offering valuable
insights for safeguarding the future of connected automobiles.
Zero Trust provides a proactive model to tackling these challenges by implementing its principles within
vehicular networks. Through the adoption of a ZT architecture, vehicles can authenticate all communication
participants, whether they originate from within the vehicle itself or external entities, thereby mitigating
30
the risks posed by cyber-attacks. Moreover, ZT addresses trust management challenges by continuously
verifying and authorizing access to resources, regardless of the location of the vehicle or network connection
status. This integration of ZT principles establishes a comprehensive security model that safeguards both
intra- and inter-vehicular communication channels, effectively managing trust dynamics in dynamic vehicular
environments.
Figure 15: Toxonomy of connected vehicles under cyber attack
6. Zero Trust Models for Enhanced Connected Vehicle Security
The emergence of connected vehicle technologies and zero trust cybersecurity paradigms catalyzes a
paradigm shift in automotive safety protocols. The zero trust model, predicated on the axiom of continuous
31
verification for all system interactions, comes as an indispensable bulwark against the growing number of
cyber threats in the increasingly interconnected vehicular system. The integration of zero trust architecture
into connected vehicle systems provides robust defence mechanisms, significantly enhancing the overall
cybersecurity posture and consequently fostering safer and more secure automotive experiences.
In this section, we will initially examine some of the existing security solutions relevant to mitigating
cyber-attacks on connected vehicles, as well as the trust models related to them. Furthermore, we delve into
the primary focus of this paper, which is a comprehensive analysis of zero trust security in CVs. We analyze
the existing literature in this field, presenting each approach and its advantages.
Blockchain technology, with its distributed ledger and cryptographic features, presents a groundbreaking
solution for revolutionizing data management in self-driving cars and CVs. By enabling real-time traffic
analysis, accident reduction, optimal route identification, and minimized travel time, blockchain overcomes
challenges like RADAR interference and regulatory gaps. Its tamper-proof, decentralized storage enhances
data security and integrity, ensuring decentralized security, transparency, and traceability in CVs communi-
cations [98]. Concurrently, machine learning approaches, encompassing both supervised and unsupervised
learning, play a crucial role in safeguarding VANETs from cyber threats. Techniques such as Naive Bayes,
decision trees, and random forests in supervised learning effectively counter various attack types, including
location falsification attacks. Unsupervised learning, particularly the K-means algorithm, detects jamming
attacks by distinguishing benign interference from intentional jamming, providing valuable insights into data
without prior knowledge [99].
Moreover, a zero trust architecture for connected vehicles emerges as a secure and scalable solution,
prioritizing the security and privacy of car owners and passengers. By addressing challenges associated with
traditional centralized systems and reducing risks associated with the Internet of Things, this model recom-
mends the vast adoption of CVs technologies. Combining the ZT model with new solutions such as machine
learning, deep learning, and blockchain improves cyber attack risk mitigation for CVs, as documented in
future investigations.
Table 4 summarizes various ZT techniques in the context of vehicular systems. It encompasses fields such
as electric vehicle infrastructure, intelligent connected vehicles (ICVs), the Internet of Connected Vehicles
(IoCV), connected and autonomous vehicles, and Zero Trust techniques in vehicular networks.
6.1. Trust models in Connected Vehicle Systems
Trust models are essential for managing secure and dependable networks among vehicular nodes. These
models assess the reliability and legitimacy of messages circulated within VANET system. Three key trust
models include Entity-based Trust Models (ETM), which foster trust relationships in VANET entities;
Data-based Trust Models (DTM), which assess data reliability among entities; and the Hybrid Trust Model
(HTM), which integrates both ETM and DTM for a comprehensive approach to trust evaluation.
32
6.1.1. Entity-based Trust Models
The Entity-based Trust Model (ETM) assesses vehicle credibility through direct and recommendation-
based trust, considering interactions among vehicles. This system calculates trust values for individual vehi-
cles, identifying untrusted or malicious ones. It employs a distributed approach, with vehicles autonomously
computing trust values. Enhancements like vehicle clustering and RSU-based trust computation are inte-
grated to increase accuracy and reduce computational overhead.
There are limited traditional trust models proposed in the literature. Marmol and Perez. [100] proposed
a trust and reputation-based trust model (TRIP) to identify malicious or selfish nodes that transmit deceptive
messages over the network rapidly and effectively. In [101], a novel trust inference model was proposed. This
model measures the trust level of a certain vehicle by combining subjective trust and recommended trust.
The ETM exhibits strong resistance to a variety of attacks, including bad-mouthing attacks and collusion
attacks. Nonetheless, scientists have proposed future work that includes considerations for deployment
areas, network applications, and security levels, all of which may reveal potential coverage gaps. Trust
computations as targets highlight a significant security challenge, and emphasis on defense mechanisms
underscores potential vulnerabilities.
A study by Minhas et al. [102] suggested a multifaceted trust model for VANETs that includes role-
based, experience-based, priority-based, and majority-based trust to help build trust in environments that
are always changing. The model is effective in countering deceptive information from malicious agents.
In another ETM proposed in the literature by [103], the researchers introduced a Reputation System-
based Lightweight Message Authentication (RMSA) model for 5G-enabled vehicular networks, addressing
deficiencies in traditional PKI-based authentication. The model managed by a Trusted Authority (TA),
restricts vehicles with reputation scores below a threshold from participating in communication, reducing
untrusted messages. Built on the Elliptic Curve Cryptosystem (ECC) and supporting batch authentication,
the scheme demonstrated security against various attacks.
In [104], scholars recommended a trust-based platoon service recommendation scheme, REPLACE, de-
signed to address challenges in ITS, particularly within vehicular platooning systems. In REPLACE, a
reputation system collects and models user vehicle feedback to help identify poorly behaved platoon head
vehicles. An iterative filtering algorithm is employed to handle untruthful feedback. The proposed scheme is
shown to be secure and robust against various attacks. Researchers in [105] outlined the Reputation-based
Global Trust Establishment scheme (RGTEs) as a solution to the challenges faced by existing trust es-
tablishment methods in VANETs, particularly in rapidly changing environments. RGTEs utilize statistical
laws to safely share trust information in VANETs, , thereby improving trust establishment efficiency and
accuracy. To detect and identify bad nodes, the system dynamically adjusts thresholds based on real-time
reputation status.
33
Overall, the entity-based model faces difficulty collecting adequate trust evidence when vehicles join
VANETs with limited interaction information [106]. Similarly, the ETM grapples with data sparsity, par-
ticularly in scenarios where vehicles are widely dispersed, impacting the accuracy of trust evaluation [107].
6.1.2. Data-based Trust Models
In order to evaluate the reliability of communications, the data-based trust model (DTM) gathers and
filters information from various sources, including neighbors and RSUs. This is particularly crucial in IoVs
since messages usually contain much information. Because the messages are time-sensitive, the data-based
trust model computes real-world information per message, such as traffic conditions and position data.
Zaidi et al.[108] proposed a cooperative detection and Correction (C-DAC) scheme to strengthen VANET
security by stopping rogue nodes from sending false emergency messages. This data-driven approach does
not require infrastructure or revocation lists because it utilizes cooperative data flow among vehicles to
identify and correct rogue nodes. The method uses a network model to allow each node to independently
predict its current state to guarantee fault tolerance and resistance against false data injection in VANETs.
The scheme faces some limitations in identifying actual rogue nodes during Sybil attacks, where a rogue
node presents multiple identities. Additionally, coordinated attacks by multiple attackers blocking lanes
and sending false messages with different identities may go undetected by C-DAC. The technique struggles
to distinguish between rogue and honest nodes during sudden density increases in the case of an actual
accident, making it challenging to identify rogue nodes during this transition phase.
Another DTM proposed in [109] is a decentralized and privacy-aware trust management scheme. Ad-
dressing challenges posed by the high mobility and the temporary nature of the VANETs, their method
ensures user privacy, robustness against security threats, and linear time complexity for real-time imple-
mentation. RaBTM, as an RSU-aided beacon-based trust management system for VANETs, was introduced
by authors in [110]. The primary objectives of RaBTM are to enhance the accuracy and reduce the delay
in making trustworthiness decisions, thereby improving safety and location privacy for vehicles. Similar
to scientists in [111], they proposed an RSU-aided scheme for data-centric trust establishment in VANET
called RATE; this model can efficiently conduct trust establishment. Thus, RATE leads to increased delays
compared to distributed mechanisms. Some factors influenced the performance of RATE, such as observing
conditions, event evolving status, and the proportion of malicious data.
Raya et al.[112] presents a data-centric trust framework for mobile ad hoc networks, addressing limitations
in traditional entity-based models. It computes trust for individual data, combines related data, and em-
ploys Bayesian inference and dempster-shafer theory for validity inference. Evaluation in vehicular networks
demonstrates resilience to attacks, stable convergence, and effectiveness in specific scenarios, meeting life-
critical network requirements.
The drawbacks of DTMs encompass issues such as latency and data sparsity. Latency arises due to the
34
abundance of data from various sources, leading to the potential dismissal of valuable information or over-
whelming significant data [113]. Another limitation is the inability to establish a long-term trust relationship
among vehicles. Instead, data-based models can only establish short-term trust for received data based on
individual events. This restriction necessitates repetitively constructing trust relationships for each event
without utilizing previous trust data. Additionally, accurately judging the reliability of messages becomes
challenging when the quantity of received messages is insufficient[106].
6.1.3. Hybrid Trust Models
Hybrid trust models (HTMs) evaluate vehicle confidence and data reliability in this category, integrating
entity-based and data-based assessments. The HTMs calculate trust values for both vehicles and messages,
with the latter often based on entity trust. However, the hybrid approach can be more complex than
other models and introduce higher communication overheads. This method efficiently considers both entity
and data trustworthiness in evaluations, ensuring that data assessed by trusted entities is perceived as
trustworthy by other network nodes in VANETs.
The research in [114] addressed decision-making challenges in VANETs, focusing on the accuracy and
delay of received event messages. They presented a model for adaptive decision-making using RSUs for
rapid and efficient support. Compared to a baseline, simulations using a range of trust attacks showed that
the suggested approach increased detection accuracy and decreased decision delay. The paper tackles the
crucial problem of erroneous traffic warning signals in VANETs, stressing their possible influence on the
decisions of the driver, time, and fuel efficiency. An Event-based Reputation System (ERS) was developed
in [115], for drivers, the system includes a dynamic reputation evaluation mechanism that determines the
importance and reliability of incoming traffic messages. Results show that the system effectively stops the
spread of false messages in different VANET contexts when a proper reputation adaption mechanism and
threshold settings are used.
The research covered in [116] focused on managing trust in VANETs, with a specific focus on protecting
location privacy. The authors suggested a Beacon-based Trust Management system (BTM) to thwart internal
attackers trying to deliver misleading communications in VANETs with greater privacy. To assess the
dependability and efficiency of the system. Simulations involving message suppression, fraudulent messages,
and altering assaults were carried out. The researchers come to the conclusion that the BTM system is
workable for location privacy-enhanced schemes in addition to being robust against trust attack models.
Placzek et al.[117] examined how Sybil attacks affect VANET performance in traffic light management
applications. They proposed a technique to identify malicious data injected by vehicle nodes who participate
in Sybil attacks with position verification combined with a driving behavior model. Simulation studies of
a decentralized, self-organizing system controlling traffic signals at various intersections in an urban road
network demonstrate the effectiveness of the approach.
35
Another HTM suggested by scholars in [118] is an Attack-Resistant Trust model (ART) for VANETs to
enhance the trustworthiness of both traffic data and vehicle nodes. The ART scheme assesses data trust,
determines the trustworthiness of reported traffic data, and assesses node trust, evaluating the reliability
of nodes in VANETs. The two functional dimensions of trust evaluation are functional trust and recom-
mendation trust, which reflect the capacity of any node to carry out its functionality and the reliability of
suggestions, respectively, made towards other nodes. The ART scheme resists a wide range of malicious at-
tacks; hence, the scheme is appropriate for various applications in VANET, including mobility, environment
protection, and traffic safety.
Increased system overhead characterizes the hybrid trust model because it inherits complications from
entity-based and data-based approaches. The complexity of the model, based on the establishment of ad-
equate trust relationships between vehicles and the evaluation of the dependability of every message data,
increases resource consumption and computational demands. Besides, limited data poses challenges to the
model [106], which could challenge trust assessment accuracy. Despite the benefits of considering entities
and data, the HTM’s increased complexity and system overhead present significant drawbacks. However,
these drawbacks typically arise when dealing with small data sets.
6.2. Zero Trust in Electric Vehicles Infrastructure
Electric vehicles (EVs) have many advantages, including reducing emissions and operation expenses.
Nevertheless, like any technology, they also have weaknesses that should be considered. Such risks are going
on in the development of EV charging infrastructure. Public charging stations share risks like tampering
or hacking that can severely impair the availability and reliability of the charging service. Due to the rapid
digitization of EV chargers, Li et al. [54] have shown that these devices are becoming increasingly vulnerable.
Hence, it proposes a blockchain and zero trust architecture-based security scheme to protect those chargers
and the cloud platforms. This work is proposed to save EV security, energy crises, and environmental issues
despite being proven effective during attacks. Another research on EV by [22] suggests a security model
for smart charging stations, using ZT model, Elliptic Curve Cryptography, and access control to secure
vehicle-node communication. This method targets security challenges, adapting to the construction needs
of the station and paving the way for secure operation.
6.3. Zero Trust in Intelligent Connected Vehicles
Intelligent Connected Vehicles (ICVs) integrate modern technologies like Artificial Intelligence, Big Data,
and Cloud Computing alongside simple connections such as V2V and V2I for smart driving functions related
to navigation and predictive maintenance. Authors in [119] investigate the application of the zero trust
model to address challenges in ICV platoons, focusing on dynamic behaviors, information interactions, and
36
security threats. It explores the ZT model, focusing on the processes of authorization and confirmation
among connected nodes within a group. The ZT model discussion encompasses information perception, full
information chain communication, and fault-tolerant control techniques in ICV systems. The paper defined
the ZT theory, used mathematical models to describe the ICV system, and discussed impact factors such as
system dynamics and communication topology. Cui et al. [120] discuss trust assessment of communication
topology nodes in ICVs running in a zero trust environment. A customized trust model is proposed that
calculates the trust function of nodes with time based on weighted calculations. The work establishes the
communication topology model in a ZT environment, evaluates the consistency of ICV queues, and analyses
the impact of different node trust values on the whole topology.
The researchers in [121] presented a method using Active Disturbance Rejection Control (ADRC) to
reject the influence of unknown input disturbances, which occur due to the ZT environment, on the ICV
queuing system. The focus was not only on disturbance rejection but also on ensuring the stability of vehi-
cle formations and increasing the overall system robustness and security. In combining ZTA concepts and
ADRC, the proposed model tried to strengthen the management of vehicle queues in ICVs, thus targeting
issues emerging from dynamic driving scenarios and cyber threats. These authors carried out extensive
simulations and analyses to test the efficiency of the proposed ADRC, which was proven to be effective in
keeping the vehicle queue safe and efficient. On the other hand, scientists in [122] make an effort to address
the problem of fault-tolerant control for the dynamic communication topology of ICV platoons in a ZT
environment. Here, the communication structure is reconfigured by adding a trust factor, which opens up
the path toward a fault-tolerant control policy. Here, a state observer and error estimator are used, which
includes the cases where the system cannot get its state. The stability of the error system is studied using
the Lyapunov method, while the distributed controller has been designed to wipe out errors.
6.4. Zero Trust in Internet of Vehicles
Fang et al. [56] proposed an IoV security scheme that integrates MFA, blockchain encryption, and a
ZTA to fortify data transmission, user privacy, and system integrity. Although it faces limitations due to a
lack of deployed vehicle nodes for comprehensive simulation, IoV was also of interest in [123]. The research
introduces a two-step authentication system for modern car rental services. It starts with a secure smart key
generation process using static authentication and then implements continuous driver authentication while
driving, utilizing fingerprint, NFC, and facial recognition data. Subsequent research in [55] proposes an
Attribute and User Trust Score-based Zero Trust Access Control Model (AU-ZTAC) to address the intricate
challenges in IoV security. This model combines the zero trust and attribute-based access control models,
providing fine-grained dynamic access control. The methodology integrates trust evaluation into the access
control process, ensuring a comprehensive reflection of the intent of the user.
37
Researchers in [124] developed a decentralized handover authentication scheme for seamless authentica-
tion in zero trust IoV networks. It involves multiple Authentication Cooperators (ACs) at the network edge
collecting device/location-related features of vehicles for identity verification. During vehicle movement,
Access Points (APs) select new ACs for handover authentication, ensuring minimal disruption. They also
introduced a situation-aware AC selection and update algorithm and proposed a hierarchical blockchain-
assisted mechanism for secure information transfer and reputation management. Their scheme outperforms
existing methods in terms of authentication accuracy and handover time, offering continuous IoV protection
through collaborative authentication and trajectory prediction.
Furthermore, an IoV-ZT conceptual model architecture was designed by Zhang et al. [125] to address the
security problems in IoV. It offers the Linkable Ring Signature Map Review (LRSMR) scheme for privacy
security under autonomous vehicle map review scenarios. Based on a linkable ring signature mechanism, it
utilizes the SM2 digital signature algorithm. LRSMR supports the preservation of privacy for user identity
and signature linkability within a ring, enhances the reliability of review data through user credit demand,
and provides rewards for the distribution of incentives, which will provide an incentive for the participation
of users. The security analysis proved that LRSMR is correct, unforgeable, unconditionally anonymous,
linkable, and nonslanderous. According to simulation results, LRSMR has demonstrated high efficiency in
both communication overhead and computation costs.
Zayed et al. [53] addresses security challenges within the Internet of Connected Vehicles (IoCV) by
proposing the implementation of ZTA to enhance information exchange and security measures. To achieve
this, the methodology focuses on verifying the identity of vehicle owners, utilizing techniques such as recog-
nizing license plates and retrieving owner details.
Another work in the context of IoCV proposed in [126] involves researchers exploring distributed fault
detection in a ZT environment. It studies the influence of the zero trust paradigm on fault diagnosis and
analyses the stability conditions of the £2 observer.
6.5. Zero Trust in Connected and Autonomous Vehicles
Anderson et al. [21] add to this research landscape an aim to enhance the security of connected and
autonomous vehicles. Their goal is to identify vulnerabilities in controller area network bus technology.
The authors propose the ZTA to protect CAV sensors and control networks against cyber threats. The
investigation examines the existing attacks against CAN networks and solutions to enhance the security
posture. The authors propose ZTA in CAVs that address the problems of fabrication, suspension, and
masquerade by requiring all the ECU nodes to register with the ZTA controller for contextual checks and
permission for the legitimate flow at the CAN bus.
John Blåberg Kristoffersson [127], in his research, presents the investigation of the implementation of a
zero trust network in the automotive ethernet for fully autonomous vehicles. They emphasize the shift in
38
security from the perimeter to the ZT model. It examines security protocol performance, suggests "Bump-
in-the-Wire" devices for nodes lacking security, and explores key distribution using 802.1X authentication
with RADIUS and certificates within automotive Ethernet.
The researchers in [128] investigated the security risks associated with connected and autonomous vehi-
cles, which rely on sensor data for decision-making. They proposed a security architecture based on the ZT
model, focusing on maintaining confidentiality, integrity, and data availability.
To assess the effectiveness of their proposal, they conducted simulations using the NeSSi2 network sim-
ulation tool and analyzed captured packets with wire sharks. They specifically simulated common cyber-
attacks like DDOS and packet sniffing to compare the security performance of the proposed architecture
with traditional approaches. Results showed that the ZTA offered superior protection against these attacks,
highlighting its potential for enhancing security in next-generation automobiles.
Sullivan et al. [129] developed OBSERVE, a ZT protocol for CAVs to endorse each other’s trajectories in
real-time to prevent the potential malicious or false data for navigation and path planning decisions, using
blockchain. This model allows vehicles to self-organize and reach a consensus on the truthfulness of nearby
trajectories of vehicles through a consensus mechanism. They employed simple machine learning algorithms
for trajectory prediction to reduce computational overhead and energy consumption. OBSERVE was vali-
dated on realistic data, using simulated connected vehicle trajectories from New York City, demonstrating
higher prediction accuracy with lower computation overhead.
6.6. Other Zero Trust Models
The researchers in [130] implemented a Free Space Optical Quantum Key Distribution (FSO-QKD)
system within a V2I application as part of the AirQKD project. To enable secure communication, they
developed various technologies, including single-photon components, FSO systems, QRNGs, and crypto-
graphic protocols. Through a practical experiment, the researchers demonstrated the functionality of the
QKD system in generating symmetric keys for a zero trust security scheme within V2I applications. Their
goal was to replace certificate-based PKI systems with QKD-generated symmetric keys, contributing to the
advancement of 6G communications. Liu et al. [131] developed a blockchain-based information-sharing pro-
tocol for ZT environments, focusing on IoT nodes like autonomous vehicle sensors. This protocol facilitated
autonomous data exchange without centralized servers and included authentication and consensus mecha-
nisms. Roadside units, smart contracts, vehicles, shared files, and blockchain were all part of the system that
ensured blockchain-based identity verification was used before sharing current road information. It packed
blocks with the best reputation, using RSUs and smart contracts to drive the consensus method value after
a predetermined quantity of exchanges. Through vehicle IDs and signatures, it ensured non-repudiation,
and a bonus system encouraged proper information sharing. Additionally, based on reputation values, it
gave users better rating priority throughout subsequent sharing processes.
39
A trustworthy Ultra-Reliable Low Latency Communication (URLLC) resource slicing and scheduling
method for 6G zero trust vehicle networks has been suggested by the authors in [132]. Using edge, conver-
gence, and cloud servers as the three infrastructure layers, their method incorporates a reputation mecha-
nism. They developed a subjective logic model for reputation monitoring of access points in the network,
enhancing the security degree of accessed nodes and trustworthiness in the ZTA. Furthermore, they created
a federated asynchronous reinforcement learning algorithm for optimizing the deployment of slice resources
while protecting the privacy of vehicles and optimizing efficiency.
40
Table 4: Zero Trust model for Connected Vehicles
Reference Year Focus Methodology Benefits
Li et al.[54] 2023 Securing EV chargers
and cloud platforms
Blockchain and zero
trust principles Secu-
rity scheme
Protection of EV security,
addressing energy crises
and environmental issues
Zhao et al. [22] 2023
Securing vehicle-node
communication at
charging stations
Zero trust model, El-
liptic Curve Cryptog-
raphy, access control
Secure operation of smart
charging stations, adapta-
tion to construction needs
Zayed et al. [53] 2022
Implementing Zero
Trust Architecture in
IoCVs
Verifying the identity
of vehicle owners, rec-
ognizing license plates,
retrieving owner de-
tails
Enhanced information ex-
change, improved security
measures
Wang et al. [126] 2023
Exploring fault detec-
tion in IoCVs under
zero trust environment
Investigation of zero
trust paradigm impact,
analysis of £2 observer
stability conditions
Exploration of fault diag-
nosis, analysis of stability
conditions
Zhang et al. [122] 2023
Tackling fault-tolerant
control in dynamic
communication topol-
ogy of IoCV platoons
Introduction of trust
factor, design of fault-
tolerant control model
Reshaping communication
structure, designing fault-
tolerant control model
Bao et al. [133] 2023
Investigating internal
stability of vehicle pla-
toons in zero trust en-
vironment
Establishment of lin-
earized vehicle dynam-
ics model, design of
distributed control law
Analysis of internal sta-
bility conditions of vehicle
platoons
Fang et al. [56] 2022
Data transmission,
user privacy, and sys-
tem integrity in IoV
environment
Integration of multi-
factor authentication,
blockchain encryption,
and zero trust architec-
ture
Improved data transmis-
sion, enhanced user pri-
vacy and system integrity
41
Song et al. [123] 2022
Introduction of two-
step authentication
system for modern car
rental services
Implementation of the
secure smart key gen-
eration process, con-
tinuous driver authen-
tication
Improved security for car
rental services
Wang et al. [55] 2023 Addressing IoV secu-
rity challenges
Integration of zero
trust and attribute-
based access control
model, trust evalua-
tion integration
Dynamic access control,
comprehensive reflection
of the intent of the user
Fowler et al
.[130]2023
Implementation of
FSO-QKD system to
secure communication
in V2I applications of
the AirQKD project
Developement of
various technologies,
including single-
photon components,
FSO systems, QRNGs,
and cryptographic
protocols
Functionality demonstra-
tion of QKD system, gen-
eration of symmetric keys
Cui et al.[120] 2023
Evaluating trust in
communication topol-
ogy nodes in ICVs
operating in zero trust
environment
Development of a tai-
lored trust model using
weighted calculations
Evaluation of node trust
levels, analysis of topology
consistency
Anderson et al.
[21]2023
Identifying vulnerabil-
ities within CAN bus
technology in CAVs
Examination of attack
methods, proposed so-
lutions for security en-
hancement
Provides robust security
by detecting and prevent-
ing various attacks, en-
suring continuous context
checks and flow authoriza-
tion on the CAN bus
42
Kristoffersson.
[127]2022
Evaluation of zero
trust network imple-
mentation in auto-
motive ethernet for
autonomous vehicles
Performance eval-
uation, suggestion
"Bump-in-the-Wire"
of security measures
Provides efficient and
low-resource security en-
hancement with MACsec
encryption, particularly
demonstrated by its
performance surpassing
IPsec in latency with-
out significant resource
expenditure.
Huang et al.
[119]2023
Investigating the ap-
plication of zero trust
model in ICV platoons
Analysis of infor-
mation perception,
communication topol-
ogy, and fault-tolerant
control
Exploration of informa-
tion perception, full infor-
mation chain communica-
tion, fault-tolerant control
mechanisms
Fang et al. [124] 2024 Authentication in zero
trust IoV networks
Decentralized han-
dover authentication
scheme for zero trust
IoV networks
Enhanced authentication
accuracy, reduced time
costs, and continuous pro-
tection for Internet of Ve-
hicles (IoV) systems
Kondaveety et al.
[128]2022
Security risks associ-
ated with connected
and autonomous vehi-
cles
Security architecture
based on the Zero
trust model
Provides superior defense
against attacks, thereby
enhancing security in fu-
ture automotive systems
Sullivan et
al.[129]2024
Verification the truth-
fulness of trajectories
and other data shared
by neighboring vehicles
OBSERVE a
Blockchain-based
Zero Trust Security
Protocol for CAVs
Higher prediction accu-
racy with lower computa-
tion overhead
43
Zhang et al. [125] 2023 Security challenges in
IoV
LRSMR an IoV-ZT
conceptual model
Offers improved user pri-
vacy, enhanced data relia-
bility, and increased par-
ticipation, contributing to
a more trustworthy and ef-
ficient map review process
for autonomous vehicles
Li et al.[121] 2023
Impact of unknown in-
put perturbations aris-
ing from the zero trust
environment on the
ICV queuing system
Active disturbance
rejection control
(ADRC) integrating
ZTA principles
Ability to maintain a safe
and efficient vehicle queue
in dynamic driving envi-
ronments
Liu et al. [131] 2022
IoT nodes like au-
tonomous vehicle sen-
sors
Blockchain-based
information-sharing
protocol for zero trust
environments
The model prioritized
users with higher rat-
ings for future sharing
processes based on their
reputation values
Hao et al. [132] 2021
Security and efficiency
challenges posed by
zero trust vehicular
networks in the con-
text of 6G
Trustworthy Ultra-
Reliable Low La-
tency Communication
(URLLC) resource
slicing and scheduling
approach
Efficiently scheduling slice
resources and protecting
vehicle information secu-
rity
7. Open problems and challenges
In this section, we will outline the potential challenges within the CVs communication system under the
zero trust model, building upon the approaches presented in section 5, as summarized in Figure 16. However,
before delving into these specific challenges, it is essential to introduce the broader zero trust challenges.
This will provide a comprehensive understanding of the overarching issues facing the implementation of zero
trust principles in various technological environments.
44
Figure 16: Open problem and challenges of connected vehicles under the zero trust model
Vendor lock-in poses a persistent challenge in the technology industry, where organizations face risks
tied to over-reliance on specific vendors. This issue spans diverse sectors, including cloud computing, IoT,
and emerging concepts like ZTA. In the early stages, ZT solutions raise concerns about potential lock-in
as organizations assemble components from various vendors. Navigating this landscape requires standards
for interoperability and strategic planning to avoid exclusive vendor dependencies, emphasizing the need for
flexible and adaptable technological environments [11,134,135].
Implementing ZTA in enterprises faces significant challenges due to the absence of industry standards
providing clear guidance. This deficiency makes it difficult to ascertain the successful implementation of ZTA
within organizations. Moreover, certain components of ZT platforms, like the PDP, lack uniform standards
for information exchange. While some standards exist for sharing threat intelligence information, there is an
overall lack of common standards in crucial areas. For instance, the decision-making process of ZTA carried
out by the PDP relies on information from various sources, contributing to the complexity. In scenarios where
a quick replacement is needed, encountering security or technical issues becomes a considerable challenge
without established common standards, potentially leading to high costs [11,134].
Minimizing disruptions to users is a significant challenge when deploying ZTA. When initiating the
migration cycle, an enterprise introduces a new ZTA-based model in the parameterized zone to replace the
legacy system, encouraging users to adopt the new system. Simultaneously, technical restrictions are slowly
added to the old method to encourage users to switch to the ZTA-based system. As more users use the
new system without issues, the enterprise considers moving the new workflow to the unprivileged network.
However, technical issues and user disturbances may arise at any point during the transfer process, therefore
45
remediation plans must be properly thought out. [134].
Managing unmanaged devices and allocating resources are the two main implementation challenges of
ZTA. ZTA would require enormous financial, technological, and human resource pools for its successful
implementation. As a result, allocating resources becomes crucial to the model of ZTA implementation. In
addition, there is always a problem with unmanaged devices. Maintaining control and oversight over the
devices may present challenges for the organization, particularly in BYOD contexts. Privacy concerns make
matters worse since the company is not allowed to monitor, control, or install the necessary software on the
devices of the employees. ZTA adoption requires a difficult balancing act between smart resource allocation
and resolving the complexities of unmanaged devices in order to be successful. [135,134,11].
Making the right choices about access requests mostly depends on the TA or the cognitive process that
powers the PE of the ZTA. Because of its dynamic character, TA is a dynamic decision mechanism that
uses machine learning to gradually increase its decision-making capacity. This dynamic is crucial because a
false positive or false negative result from TA could raise security concerns by granting unauthorized people
access or by permitting malicious access. Continuous observation and fine-tuning of TA parameters are
essential to ensure accurate functionality. Moreover, the integration and collaboration of supported systems
within the ZT platform are emphasized, preventing isolation to maintain efficient visibility and analytics.
The normalization, filtering, and correlation of information from diverse sources further enhance the overall
efficiency of the TA in the ZTA environment [134,11].
7.1. Zero trust challenges in Vehicular Networks
Implementing zero trust algorithms in VANET faces challenges due to the incapacity of existing so-
lutions to authenticate real-time safety warnings from vehicles and the limited deployment capabilities of
OBUs. The dynamic network topology resulting from vehicle movement further complicates adaptation.
Despite these limitations, there is potential for leveraging ZT principles in securing background communi-
cations with backend servers and RSUs, offering a more focused application of these concepts in vehicular
environments[136]. Otherwise, in ZT vehicular networks, there is a potential threat of attackers maliciously
manipulating RSUs, emphasizing the need to safeguard against such risks. Leveraging machine learning
and deep learning algorithms can enhance authentication and security. These technologies enable real-time
communication analysis, improving the accuracy of safety warnings and detecting malicious activity.
The need for authentication and authorization before each V2I or V2V communication can lead to signifi-
cant computational energy consumption and transmission delays. This may impact the fulfillment of service
requirements and business demands. Additionally, even after passing identity verification, the reliability
of uploaded information remains uncertain, posing a risk to transportation safety with the potential for
invalid or false information[137]. Blockchain can enhance security by providing decentralized authentication
mechanisms and enforcing access control policies through smart contracts.
46
Fang et al.[56] their implementation scheme within the ZT model faces a notable limitation due to
the inadequate representation of the IoV architecture. The insufficient deployment of vehicle nodes in the
simulation hinders the ability of the scheme to mimic the complexities and scale of real-world IoV scenarios
accurately.
In a ZT environment, the default model is to not inherently trust any entity and verify the trustworthiness
of each interaction. As mentioned in [126], Real-time trust updates become crucial in dynamic scenarios
where conditions, behaviors, or vehicle relationships are constantly changing.
The challenge encountered by researchers [21] in the ZTA for CAVs concerning DoS attack vectors on
the CAN bus. The broadcast nature of the CAN bus makes it susceptible to DoS attacks, allowing attackers
to saturate the bus and render the entire network unusable. This vulnerability is attributed to the exclusive
reliance of architecture on the CAN bus as the communication channel. The potential consequences of a DoS
attack include the necessity for the CAV to cease operation to ensure occupant safety, as the ZTA cannot
process control or response messages during such an attack, resulting in a paralyzed network. Implementing
security measures in safety-critical real-time systems is challenging due to resource limitations. Intrusion
Detection Systems (IDS) for CAN networks have emerged to address these challenges. IDS can be signature-
based, which relies on known attack patterns, or anomaly-based, which detects deviations from normal
behavior. While signature-based IDS requires regular updates and may miss unknown attacks, anomaly-
based IDS can detect previously unknown threats [59]. Implementing IDS on the CAN bus helps detect and
respond to DoS attacks proactively, ensuring uninterrupted operation and safety in CAV environments.
7.2. Zero Trust challenges in Intelligent Connected Vehicles
Implementing Zero Trust in ICVs platoons has led to several challenges and issues. According to authors in
[119] there are three main challenges :
a. Information perception and processing challenges
One challenge involves dynamic deception within the visual area of ICV platoons, demanding the
identification and elimination of deception targets based on multisource feature information. This
entails ensuring the concordance of features between multisensor data and multi-feature tag data that
are correctly matched. The other challenge is that malicious nodes cause an unbalanced match of
decisions and information asymmetry in the ICV system. Solving this problem involves research on
cooperation competition mechanism-driven approach, including the feature extraction mechanism of
multi-dimensional data and lightweight distributed mechanism for cooperation competition games.
Also, although promising, the cooperative driving of ICV platoons in real system implementations
faces operational challenges.
b. Reliable data transportation challenges
47
The problems in the data security and access control of ICV systems in the model of a ZT scenario
span from the information-sensing and control terminals, communication infrastructure, and cloud
platforms. With so many terminal device nodes, the high number itself contributes toward a detri-
mental effect on the process of data fusion, it will lead to further threats in forms of malicious attacks
and unauthorized access. The shift from partial to total ZT communication among interaction nodes
introduces challenges. These challenges encompass designing secure data encryption, transmission,
and processing methods, considering periodic migration characteristics. Addressing confidentiality,
authenticity, and integrity concerns in information chain transmission while accommodating the de-
mand for weak centralization is vital. Furthermore, challenges include establishing adaptive forgetful
access control for intelligently networked vehicle platoon data, covering global index setup, local in-
dex framing, credit authorization allocation, and implementing a risk-adaptive forgetful access control
model.
c. Fault Tolerant Control (FTC) challenges
The transportation scenarios demand fault tolerance since the disruption of the ICV platoon might
affect the entire platoon. The FTC challenges in ICVs platoons under the ZT model The comprehen-
sive modeling of all the nodes of the ICV platoon needs model identification, either by model or data
approaches. Independent controllers are required for each node. Second, the trust values need to be
evaluated for all the nodes. The result would be to start an authorization process, and the rejected
vehicles would be treated as external disturbances. Accepted vehicles need a distributed FTC con-
trolling scheme and consistency strategy for ICV systems based on the perception of the environment.
The data security transmission among the nodes of the ICV system is also a challenge. The necessary
malicious attacks, false location transmission, or data tampering could present serious consequences
for the entire ICV platoon. These challenges highlight the intricate nature of achieving fault tolerance
in the context of ICV platoons under a ZT model.
Scholars also mentioned some extended issues in evaluating node trust values and network vulnera-
bility within the ZT model. It highlights the need for trust evaluation mechanisms and authorization
processes to assess the reliability of communication nodes, data sources, and control commands in the
ICV system. This involves evaluating entity trustworthiness and granting access based on trust levels,
following the core principle of "never trust, always verify." The document also explores challenges in
heterogeneous vehicle platoons under the ZT model, emphasizing effective data perception in unstruc-
tured environments and multi-degree-of-freedom feature identification for diverse vehicles to enhance
safety.
48
8. Conclusion
In reshaping cybersecurity strategy, zero trust represents a significant departure from the conventional
reliance on a trusted internal network. This model acknowledges the persistent and dynamic nature of
cyber threats, taking a proactive stance by eliminating inherent trust in users or devices. Trough the
implementation of rigorous access controls, continuous verification processes, and resource segmentation,
ZT aims to booster security measures, addressing both external attacks and potential insider risks.
This paper contributes to the exploration of ZT security paradigm by providing a comprehensive under-
standing of its principles and applications, it demonstrates the adaptability of ZT across various technolog-
ical environments. We conducted a bibliometric and systematic review based on literature from the scopus
database, this review revealed an increasing number of documents in recent years, different document types,
subject areas, the keyword co-occurrence analysis, and the comparison with existing surveys related to the
field of ZT. We delved into its overarching concept, the implementation process, and its applications in var-
ious domains such as Cloud, IoT, and 5G/6G. With a specific focus on connected vehicles (CVs), the paper
explores different approaches within this context. We examined CVs systems, assessed prevalent threats and
cyber attacks they face, and analyzed various CVs trust models. Furthermore, we investigated different ZT
models across CVs systems, including electric vehicle systems, intelligent and connected vehicles, connected
and autonomous vehicles, the internet of vehicles, and other approaches in this context.
In conclusion, according to existing literature, we address primary challenges and open issues associated
with proposed ZT model in CVs, aiming for clarity and comprehensiveness in understanding the potential
of zero trust in enhancing automotive security. Prospective research endeavours may be oriented towards
extending and applying ZT frameworks within both V2V and V2I communication paradigms. The synergistic
integration of ZT methodologies with cutting-edge technological innovations has the potential to create a
powerful defence mechanism against the evolving increase of cyber threats and attacks targeting connected
vehicles. This merger of multifaceted approaches is expected to significantly increase safety and security
protocols within contemporary transportation systems to address critical challenges posed by increasing
connectivity and automation in vehicular networks. Consequently, it enhances safety and security within
transportation systems.
Appendix A. List of abbreviations
ZT Zero Trust
ZTA Zero Trust Architecture
CVs Connected Vehicles
EV Electric Vehicle
49
IoV Internet of Vehicle
IoCV Internet of Connected Vehicle
PDP Policy Decision Point
PE Policy Engine
PA Policy Administrator
PEP Policy Enforcement Point
CDM Continuous Diagnostic and Mitigation
TA Trust Algorithm
PKI Public Key Infrastructure
LDAP Lightweight Directory Access Protocol
SEIM Security Information and Event Management
CAN Controller Area Network
MFA Multi-Factor Authentication
BYOD Bring Your Own Device
IAM Identity and Access Management
GPS Global Positioning System
ECU Electronic Component Unit
LIN Local Interconnect Network
MOST Media Oriented Systems Transport
IVN Intra-Vehicle Network
IVC Inter-Vehicle Communication
ITS Intelligent Transportation System
VANET Vehicular Ad Hoc Network
MANET Mobile Ad Hoc Network
OBU On Board Unit
RSU Road Side Unit
DSRC Dedicated Short Range Communication
WAVE Wireless Access in Vehicular Environment
RAN Radio Access Network
50
V2V Vehicle to Vehicle
V2I Vehicle to Infrastructure
V2X Vehicle to Everything
V2P Vehicle to Pedestrian
C-V2X Cellular Vehicle to Everything
VCC Vehicular Cloud Computing
References
[1] Q. Shen and Y. Shen, “Endpoint security reinforcement via integrated zero-trust systems: A collaborative approach,”
Computers & Security, vol. 136, p. 103537, 2024.
[2] A. C. for Technology-Industry Advisory Council (ACT-IAC). (2019) Zero trust cybersecurity current trends @ONLINE.
[Online]. Available: https://www.actiac.org/system/files/ACT-IACZeroTrustProjectReport04182019.pdf
[3] D. Moher, A. Liberati, J. Tetzlaff, D. G. Altman, and t. PRISMA Group*, “Preferred reporting items for systematic
reviews and meta-analyses: the prisma statement,” Annals of internal medicine, vol. 151, no. 4, pp. 264–269, 2009.
[4] S. Rose, O. Borchert, S. Mitchell, and S. Connelly, “Nist special publication 800–207 zero trust architecture,” National
Institute of Standards and Technology, US Department of Commerce: Washington, DC, USA, pp. 800–207, 2020.
[5] J.-g. Shi, W. Miao, and H. Si, “Visualization and analysis of mapping knowledge domain of urban vitality research,”
Sustainability, vol. 11, no. 4, p. 988, 2019.
[6] C. Buck, C. Olenberger, A. Schweizer, F. Völter, and T. Eymann, “Never trust, always verify: A multivocal literature
review on current knowledge and research gaps of zero-trust,” Computers & Security, vol. 110, p. 102436, 2021.
[7] Y. He, D. Huang, L. Chen, Y. Ni, and X. Ma, “A survey on zero trust architecture: Challenges and future trends,”
Wireless Communications and Mobile Computing, vol. 2022, no. 1, p. 6476274, 2022.
[8] N. F. Syed, S. W. Shah, A. Shaghaghi, A. Anwar, Z. Baig, and R. Doss, “Zero trust architecture (zta): A comprehensive
survey,” IEEE Access, vol. 10, pp. 57143–57 179, 2022.
[9] J. M. Pittman, S. Alaee, C. Crosby, T. Honey, and G. M. Schaefer, “Towards a model for zero trust data,” American
Journal of Science & Engineering, vol. 3, no. 1, pp. 18–24, 2022.
[10] Y. Cao, S. R. Pokhrel, Y. Zhu, R. Doss, and G. Li, “Automation and orchestration of zero trust architecture: Potential
solutions and challenges,” Machine Intelligence Research, vol. 21, no. 2, pp. 294–317, 2024.
[11] S. Teerakanok, T. Uehara, and A. Inomata, “Migrating to zero trust architecture: Reviews and challenges,” Security and
Communication Networks, vol. 2021, no. 1, p. 9947347, 2021.
[12] S. Sarkar, G. Choudhary, S. K. Shandilya, A. Hussain, and H. Kim, “Security of zero trust networks in cloud computing:
A comparative review,” Sustainability, vol. 14, no. 18, p. 11213, 2022.
[13] L. Alevizos, V. T. Ta, and M. Hashem Eiza, “Augmenting zero trust architecture to endpoints using blockchain: A
state-of-the-art review,” Security and privacy, vol. 5, no. 1, p. e191, 2022.
[14] X. Yan and H. Wang, “Survey on zero-trust network security,” in Artificial Intelligence and Security: 6th International
Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part I 6. Springer, 2020, pp. 50–60.
[15] H. Kang, G. Liu, Q. Wang, L. Meng, and J. Liu, “Theory and application of zero trust security: A brief survey,” Entropy,
vol. 25, no. 12, p. 1595, 2023.
51
[16] D. D’Silva and D. D. Ambawade, “Building a zero trust architecture using kubernetes,” in 2021 6th international con-
ference for convergence in technology (i2ct). IEEE, 2021, pp. 1–8.
[17] J. Kindervag et al., “Build security into your network’s dna: The zero trust network architecture,” Forrester Research
Inc, vol. 27, pp. 1–16, 2010.
[18] P. Assunção, “A zero trust approach to network security,” in Proceedings of the Digital Privacy and Security Conference,
vol. 2019. Porto Protugal, 2019.
[19] L. Alevizos, M. H. Eiza, V. T. Ta, Q. Shi, and J. Read, “Blockchain-enabled intrusion detection and prevention system
of apts within zero trust architecture,” Ieee Access, vol. 10, pp. 89 270–89 288, 2022.
[20] M. Azure, “Zero trust cybersecurity for the internet of things,” https://azure.microsoft.com/mediahandler/files/
resourcefiles/zero-trust-cybersecurity-for- the-internet-of-things/Zero%20Trust%20Security20Whitepaper_4.30_3pm.
pdf., 2021.
[21] J. Anderson, Q. Huang, L. Cheng, and H. Hu, “A zero trust architecture for connected and autonomous vehicles,” IEEE
Internet Computing, vol. 27, no. 5, pp. 7–14, 2023.
[22] Y. Zhao, H. Miao, W. Liu, S. Wang, and R. Zhang, “Research on security protection methods for state grid charging
stations based on zero trust,” in 2023 3rd International Conference on Energy Engineering and Power Systems (EEPS).
IEEE, 2023, pp. 943–946.
[23] E. Gilman and D. Barth, Zero trust networks. O’Reilly Media, Incorporated, 2017.
[24] M. J. Haber and M. J. Haber, “Zero trust,” Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to
Protect Organizations, pp. 295–304, 2020.
[25] N. Basta, M. Ikram, M. A. Kaafar, and A. Walker, “Towards a zero-trust micro-segmentation network security strategy:
an evaluation framework,” in NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium. IEEE,
2022, pp. 1–7.
[26] M. Shore, S. Zeadally, and A. Keshariya, “Zero trust: the what, how, why, and when,” Computer, vol. 54, no. 11, pp.
26–35, 2021.
[27] C. Itodo and M. Ozer, “Multivocal literature review on zero-trust security implementation,” Computers & Security, p.
103827, 2024.
[28] CISA(Cybersecurity and I. S. Agency). (2022) Zero trust maturity model @ONLINE. [Online]. Available:
https://www.cisa.gov/zero-trust-maturity-model
[29] S. Kanerva, “Lateral movement restriction in advanced devops environments.”
[30] B. M. BARTOŠ, “Adaptive authentication in keycloak.”
[31] T. Hilbig, T. Schreck, and T. Limmer, “‘state of the union’: Evaluating open source zero trust components,” in Interna-
tional Workshop on Security and Trust Management. Springer, 2023, pp. 42–61.
[32] M. Ahmed and K. Petrova, “A zero-trust federated identity and access management framework for cloud and cloud-based
computing environments,” 2020.
[33] T. Chuan, Y. Lv, Z. Qi, L. Xie, and W. Guo, “An implementation method of zero-trust architecture,” in Journal of
Physics: Conference Series, vol. 1651, no. 1. IOP Publishing, 2020, p. 012010.
[34] S. Mehraj and M. T. Banday, “Establishing a zero trust strategy in cloud computing environment,” in 2020 International
Conference on Computer Communication and Informatics (ICCCI). IEEE, 2020, pp. 1–6.
[35] M. Saleem, M. Warsi, and S. Islam, “Secure information processing for multimedia forensics using zero-trust security model
for large scale data analytics in saas cloud computing environment,” Journal of Information Security and Applications,
vol. 72, p. 103389, 2023.
[36] L. Ferretti, F. Magnanini, M. Andreolini, and M. Colajanni, “Survivable zero trust for cloud computing environments,”
Computers & Security, vol. 110, p. 102419, 2021.
52
[37] S. Mandal, D. A. Khan, and S. Jain, “Cloud-based zero trust access control policy: an approach to support work-from-
home driven by covid-19 pandemic,” new generation computing, vol. 39, no. 3-4, pp. 599–622, 2021.
[38] C. DeCusatis, P. Liengtiraphan, A. Sager, and M. Pinelli, “Implementing zero trust cloud networks with transport access
control and first packet authentication,” in 2016 IEEE International Conference on Smart Cloud (SmartCloud). IEEE,
2016, pp. 5–10.
[39] S. Rodigari, D. O’Shea, P. McCarthy, M. McCarry, and S. McSweeney, “Performance analysis of zero-trust multi-cloud,”
in 2021 IEEE 14th International Conference on Cloud Computing (CLOUD). IEEE, 2021, pp. 730–732.
[40] S. M. Awan, M. A. Azad, J. Arshad, U. Waheed, and T. Sharif, “A blockchain-inspired attribute-based zero-trust access
control model for iot,” Information, vol. 14, no. 2, p. 129, 2023.
[41] T. Dimitrakos, T. Dilshener, A. Kravtsov, A. La Marra, F. Martinelli, A. Rizos, A. Rosetti, and A. Saracino, “Trust aware
continuous authorization for zero trust in consumer internet of things,” in 2020 IEEE 19th international conference on
trust, security and privacy in computing and communications (TrustCom). IEEE, 2020, pp. 1801–1812.
[42] S. W. Shah, N. F. Syed, A. Shaghaghi, A. Anwar, Z. Baig, and R. Doss, “Lcda: lightweight continuous device-to-device
authentication for a zero trust architecture (zta),” Computers & Security, vol. 108, p. 102351, 2021.
[43] Z.-h. Wang, M.-h. Jin, L. Jiang, C.-j. Feng, J.-y. Cao, and Z. Yun, “Secure access method of power internet of things
based on zero trust architecture,” in International Conference on Swarm Intelligence. Springer, 2023, pp. 386–399.
[44] L. Meng, D. Huang, J. An, X. Zhou, and F. Lin, “A continuous authentication protocol without trust authority for zero
trust architecture,” China Communications, vol. 19, no. 8, pp. 198–213, 2022.
[45] C. Han, G.-J. Kim, O. Alfarraj, A. Tolba, and Y. Ren, “Zt-bds: a secure blockchain-based zero-trust data storage scheme
in 6g edge iot,” Journal of Internet Technology, vol. 23, no. 2, pp. 289–295, 2022.
[46] S. Zhao, S. Li, F. Li, W. Zhang, and M. Iqbal, “Blockchain-enabled user authentication in zero trust internet of things,”
in Security and Privacy in New Computing Environments: Third EAI International Conference, SPNCE 2020, Lyngby,
Denmark, August 6-7, 2020, Proceedings 3. Springer, 2021, pp. 265–274.
[47] K. Ramezanpour and J. Jagannath, “Intelligent zero trust architecture for 5g/6g networks: Principles, challenges, and
the role of machine learning in the context of o-ran,” Computer Networks, vol. 217, p. 109358, 2022.
[48] E. Bandara, X. Liang, S. Shetty, R. Mukkamala, A. Rahman, and N. W. Keong, “Skunk—a blockchain and zero trust secu-
rity enabled federated learning platform for 5g/6g network slicing,” in 2022 19th Annual IEEE International Conference
on Sensing, Communication, and Networking (SECON). IEEE, 2022, pp. 109–117.
[49] H. Sedjelmaci and N. Ansari, “Zero trust architecture empowered attack detection framework to secure 6g edge comput-
ing,” IEEE Network, vol. 38, no. 1, pp. 196–202, 2023.
[50] H. Sedjelmaci and K. Tourki, “A distributed zero trust framework for 6g ran,” in NOMS 2023-2023 IEEE/IFIP Network
Operations and Management Symposium. IEEE, 2023, pp. 1–5.
[51] O. Hireche, C. Benzaïd, and T. Taleb, “Deep data plane programming and ai for zero-trust self-driven networking in
beyond 5g,” Computer Networks, vol. 203, p. 108668, 2022.
[52] H. El-Sayed, M. Chaqfeh, H. El-Kassabi, M. A. Serhani, and H. Alexander, “Trust enforcement in vehicular networks:
challenges and opportunities,” IET Wireless Sensor Systems, vol. 9, no. 5, pp. 237–246, 2019.
[53] M. Zayed, A. Anwar, Z. Rahman, S. S. Arefin, and R. Islam, “Owner identity verification in the internet of connected
vehicles: Zero trust based solution,” Cryptology ePrint Archive, 2022.
[54] P. Li, W. Ou, H. Liang, W. Han, Q. Zhang, and G. Zeng, “A zero trust and blockchain-based defense model for smart
electric vehicle chargers,” Journal of Network and Computer Applications, vol. 213, p. 103599, 2023.
[55] J. Wang, Z. Wang, J. Song, and H. Cheng, “Attribute and user trust score-based zero trust access control model in iov,”
Electronics, vol. 12, no. 23, p. 4825, 2023.
[56] L. Fang, C. Wu, Y. Kang, W. Ou, D. Zhou, and J. Ye, “Zero-trust-based protection scheme for users in internet of
53
vehicles,” Security and Communication Networks, vol. 2022, no. 1, p. 9896689, 2022.
[57] H. Chen, J. Liu, J. Wang, and Y. Xun, “Towards secure intra-vehicle communications in 5g advanced and beyond:
Vulnerabilities, attacks and countermeasures,” Vehicular Communications, vol. 39, p. 100548, 2023.
[58] G. Karopoulos, G. Kambourakis, E. Chatzoglou, J. L. Hernández-Ramos, and V. Kouliaridis, “Demystifying in-vehicle
intrusion detection systems: A survey of surveys and a meta-taxonomy,” Electronics, vol. 11, no. 7, p. 1072, 2022.
[59] M. Bozdal, M. Samie, S. Aslam, and I. Jennions, “Evaluation of can bus security challenges,” Sensors, vol. 20, no. 8, p.
2364, 2020.
[60] H. M. Song, J. Woo, and H. K. Kim, “In-vehicle network intrusion detection using deep convolutional neural network,”
Vehicular Communications, vol. 21, p. 100198, 2020.
[61] E. Aliwa, O. Rana, C. Perera, and P. Burnap, “Cyberattacks and countermeasures for in-vehicle networks,” ACM Com-
puting Surveys (CSUR), vol. 54, no. 1, pp. 1–37, 2021.
[62] Z. Mahmood, “Connected vehicles in the internet of things,” Springer Nature SwitzerlandAG, 2020.
[63] S. Rajapaksha, H. Kalutarage, M. O. Al-Kadri, A. Petrovski, G. Madzudzo, and M. Cheah, “Ai-based intrusion detection
systems for in-vehicle networks: A survey,” ACM Computing Surveys, vol. 55, no. 11, pp. 1–40, 2023.
[64] W. Tiberti, R. Civino, N. Gavioli, M. Pugliese, and F. Santucci, “A hybrid-cryptography engine for securing intra-vehicle
communications,” Applied Sciences, vol. 13, no. 24, p. 13024, 2023.
[65] T.-Y. Lee, I.-A. Lin, and R.-H. Liao, “Design of a flexray/ethernet gateway and security mechanism for in-vehicle
networks,” Sensors, vol. 20, no. 3, p. 641, 2020.
[66] J. Wang, J. Liu, and N. Kato, “Networking and communications in autonomous driving: A survey,” IEEE Communica-
tions Surveys & Tutorials, vol. 21, no. 2, pp. 1243–1274, 2018.
[67] M. N. Mejri, J. Ben-Othman, and M. Hamdi, “Survey on vanet security challenges and possible cryptographic solutions,”
Vehicular Communications, vol. 1, no. 2, pp. 53–66, 2014.
[68] S. Sharma and B. Kaushik, “A survey on internet of vehicles: Applications, security issues & solutions,” Vehicular
Communications, vol. 20, p. 100182, 2019.
[69] M. Lee and T. Atkison, “Vanet applications: Past, present, and future,” Vehicular Communications, vol. 28, p. 100310,
2021.
[70] N. H. Hussein, C. T. Yaw, S. P. Koh, S. K. Tiong, and K. H. Chong, “A comprehensive survey on vehicular networking:
Communications, applications, challenges, and upcoming research directions,” IEEE Access, vol. 10, pp. 86 127–86 180,
2022.
[71] A. Luckshetty, S. Dontal, S. Tangade, and S. S. Manvi, “A survey: comparative study of applications, attacks, security
and privacy in vanets,” in 2016 International Conference on Communication and Signal Processing (ICCSP). IEEE,
2016, pp. 1594–1598.
[72] H. Khelifi, S. Luo, B. Nour, H. Moungla, Y. Faheem, R. Hussain, and A. Ksentini, “Named data networking in vehicular ad
hoc networks: State-of-the-art and challenges,” IEEE Communications Surveys & Tutorials, vol. 22, no. 1, pp. 320–351,
2019.
[73] M. Arif, G. Wang, M. Z. A. Bhuiyan, T. Wang, and J. Chen, “A survey on security attacks in vanets: Communication,
applications and challenges,” Vehicular Communications, vol. 19, p. 100179, 2019.
[74] P. Mundhe, S. Verma, and S. Venkatesan, “A comprehensive survey on authentication and privacy-preserving schemes in
vanets,” Computer Science Review, vol. 41, p. 100411, 2021.
[75] R. Assem, G. Lyamine, B. Abderrezak, S. Zineb, and L. Abdelkrim, “Data processing from vanets to iov: Literature
review,” in Proceedings of the Future Technologies Conference. Springer, 2023, pp. 472–494.
[76] A. Bazzi, B. M. Masini, A. Zanella, and I. Thibault, “On the performance of ieee 802.11 p and lte-v2v for the cooperative
awareness of connected vehicles,” IEEE Transactions on Vehicular Technology, vol. 66, no. 11, pp. 10 419–10 432, 2017.
54
[77] V. Mannoni, V. Berg, S. Sesia, and E. Perraud, “A comparison of the v2x communication systems: Its-g5 and c-v2x,” in
2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring). IEEE, 2019, pp. 1–5.
[78] P. Arthurs, L. Gillam, P. Krause, N. Wang, K. Halder, and A. Mouzakitis, “A taxonomy and survey of edge cloud com-
puting for intelligent transportation systems and connected vehicles,” IEEE Transactions on Intelligent Transportation
Systems, vol. 23, no. 7, pp. 6206–6221, 2021.
[79] M. J. N. Mahi, S. Chaki, S. Ahmed, M. Biswas, M. S. Kaiser, M. S. Islam, M. Sookhak, A. Barros, and M. Whaiduzzaman,
“A review on vanet research: Perspective of recent emerging technologies,” IEEE Access, vol. 10, pp. 65 760–65 783, 2022.
[80] M. Adhikari, A. Hazra, V. G. Menon, B. K. Chaurasia, and S. Mumtaz, “A roadmap of next-generation wireless technology
for 6g-enabled vehicular networks,” IEEE Internet of Things Magazine, vol. 4, no. 4, pp. 79–85, 2021.
[81] J. Guo, M. Bilal, Y. Qiu, C. Qian, X. Xu, and K.-K. R. Choo, “Survey on digital twins for internet of vehicles: Funda-
mentals, challenges, and opportunities,” Digital Communications and Networks, vol. 10, no. 2, pp. 237–247, 2024.
[82] I. Ahmad, R. M. Noor, I. Ali, M. Imran, and A. Vasilakos, “Characterizing the role of vehicular cloud computing in road
traffic management,” International Journal of Distributed Sensor Networks, vol. 13, no. 5, p. 1550147717708728, 2017.
[83] Z. Saeed, M. Masood, and M. U. Khan, “A review: Cybersecurity challenges and their solutions in connected and
autonomous vehicles (cavs),” JAREE (Journal on Advanced Research in Electrical Engineering), vol. 7, no. 1, 2023.
[84] Z. El-Rewini, K. Sadatsharan, N. Sugunaraj, D. F. Selvaraj, S. J. Plathottam, and P. Ranganathan, “Cybersecurity
attacks in vehicular sensors,” IEEE Sensors Journal, vol. 20, no. 22, pp. 13 752–13 767, 2020.
[85] A. Anwar, A. Anwar, L. Moukahal, and M. Zulkernine, “Security assessment of in-vehicle communication protocols,”
Vehicular Communications, vol. 44, p. 100639, 2023.
[86] G. Zhang, Q. Liu, C. Cao, J. Li, and Y. Li, “Bit scanner: Anomaly detection for in-vehicle can bus using binary sequence
whitelisting,” Computers & Security, vol. 134, p. 103436, 2023.
[87] R. S. Rathore, C. Hewage, O. Kaiwartya, and J. Lloret, “In-vehicle communication cyber security: challenges and
solutions,” Sensors, vol. 22, no. 17, p. 6679, 2022.
[88] J. Takahashi, Y. Aragane, T. Miyazawa, H. Fuji, H. Yamashita, K. Hayakawa, S. Ukai, and H. Hayakawa, “Automotive
attacks and countermeasures on lin-bus,” Journal of Information Processing, vol. 25, pp. 220–228, 2017.
[89] S. Kim, R. Shrestha, S. Kim, and R. Shrestha, “In-vehicle communication and cyber security,” Automotive Cyber Security:
Introduction, Challenges, and Standardization, pp. 67–96, 2020.
[90] A. Quyoom, A. A. Mir, D. A. Sarwar et al., “Security attacks and challenges of vanets: a literature survey,” Journal of
Multimedia Information System, vol. 7, no. 1, pp. 45–54, 2020.
[91] M. S. Sheikh, J. Liang, and W. Wang, “A survey of security services, attacks, and applications for vehicular ad hoc
networks (vanets),” Sensors, vol. 19, no. 16, p. 3589, 2019.
[92] S. A. Jan, N. U. Amin, M. Othman, M. Ali, A. I. Umar, and A. Basir, “A survey on privacy-preserving authentication
schemes in vanets: Attacks, challenges and open issues,” IEEE Access, vol. 9, pp. 153 701–153 726, 2021.
[93] M. M. Hamdi, L. Audah, M. S. Abood, S. A. Rashid, A. S. Mustafa, H. Mahdi, and A. S. Al-Hiti, “A review on various
security attacks in vehicular ad hoc networks,” Bulletin of Electrical Engineering and Informatics, vol. 10, no. 5, pp.
2627–2635, 2021.
[94] J. R. Douceur, “The sybil attack,” in International workshop on peer-to-peer systems. Springer, 2002, pp. 251–260.
[95] M. Safwat, A. Elgammal, E. G. AbdAllah, and M. A. Azer, “Survey and taxonomy of information-centric vehicular
networking security attacks,” Ad Hoc Networks, vol. 124, p. 102696, 2022.
[96] M. M. Hamdi, Y. A. Yussen, and A. S. Mustafa, “Integrity and authentications for service security in vehicular ad hoc
networks (vanets): A review,” in 2021 3rd International Congress on Human-Computer Interaction, Optimization and
Robotic Applications (HORA). IEEE, 2021, pp. 1–7.
[97] M. Azees, P. Vijayakumar, and L. Jegatha Deborah, “Comprehensive survey on security services in vehicular ad-hoc
55
networks,” IET Intelligent Transport Systems, vol. 10, no. 6, pp. 379–388, 2016.
[98] J. Ahmad, M. U. Zia, I. H. Naqvi, J. N. Chattha, F. A. Butt, T. Huang, and W. Xiang, “Machine learning and blockchain
technologies for cybersecurity in connected vehicles,” Wiley Interdisciplinary Reviews: Data Mining and Knowledge
Discovery, vol. 14, no. 1, p. e1515, 2024.
[99] A. Hankins, T. Das, S. Sengupta, and D. Feil-Seifer, “Eyes on the road: A survey on cyber attacks and defense solutions
for vehicular ad-hoc networks,” in 2023 IEEE 13th Annual Computing and Communication Workshop and Conference
(CCWC). IEEE, 2023, pp. 0585–0592.
[100] F. G. Mármol and G. M. Pérez, “Trip, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks,”
Journal of network and computer applications, vol. 35, no. 3, pp. 934–941, 2012.
[101] H. Xia, S.-s. Zhang, Y. Li, Z.-k. Pan, X. Peng, and X.-z. Cheng, “An attack-resistant trust inference model for securing
routing in vehicular ad hoc networks,” IEEE Transactions on Vehicular Technology, vol. 68, no. 7, pp. 7108–7120, 2019.
[102] U. F. Minhas, J. Zhang, T. Tran, and R. Cohen, “A multifaceted approach to modeling agent trust for effective commu-
nication in the application of mobile ad hoc vehicular networks,” IEEE Transactions on Systems, Man, and Cybernetics,
Part C (Applications and Reviews), vol. 41, no. 3, pp. 407–420, 2010.
[103] J. Cui, X. Zhang, H. Zhong, Z. Ying, and L. Liu, “Rsma: Reputation system-based lightweight message authentication
framework and protocol for 5g-enabled vehicular networks,” IEEE Internet of Things Journal, vol. 6, no. 4, pp. 6417–6428,
2019.
[104] H. Hu, R. Lu, Z. Zhang, and J. Shao, “Replace: A reliable trust-based platoon service recommendation scheme in vanet,”
IEEE Transactions on Vehicular Technology, vol. 66, no. 2, pp. 1786–1797, 2016.
[105] X. Li, J. Liu, X. Li, and W. Sun, “Rgte: A reputation-based global trust establishment in vanets,” in 2013 5th International
Conference on Intelligent Networking and Col laborative Systems. IEEE, 2013, pp. 210–214.
[106] Y. Wang, J. Song, Y. Zhang, and Y. Cao, “Decentralized trust management system for vanets,” in Automated and Electric
Vehicle: Design, Informatics and Sustainability. Springer, 2022, pp. 241–255.
[107] Y. Zhang, C. Lv, C. Cheong, and Y. Cao, “An introduction to trust management in internet of vehicles,” in Communi-
cation, Computation and Perception Technologies for Internet of Vehicles. Springer, 2023, pp. 245–260.
[108] K. Zaidi, M. Milojevic, V. Rakocevic, and M. Rajarajan, “Data-centric rogue node detection in vanets,” in 2014 IEEE
13th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, 2014, pp.
398–405.
[109] R. A. Shaikh and A. S. Alzahrani, “Trust management method for vehicular ad hoc networks,” in Quality, Reliability,
Security and Robustness in Heterogeneous Networks: 9th International Conference, QShine 2013, Greader Noida, India,
January 11-12, 2013, Revised Selected Papers 9. Springer, 2013, pp. 801–815.
[110] Y.-C. Wei and Y.-M. Chen, “An efficient trust management system for balancing the safety and location privacy in vanets,”
in 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE,
2012, pp. 393–400.
[111] A. Wu, J. Ma, and S. Zhang, “Rate: a rsu-aided scheme for data-centric trust establishment in vanets,” in 2011 7th
International Conference on Wireless Communications, Networking and Mobile Computing. IEEE, 2011, pp. 1–6.
[112] M. Raya, P. Papadimitratos, V. D. Gligor, and J.-P. Hubaux, “On data-centric trust establishment in ephemeral ad hoc
networks,” in IEEE INFOCOM 2008-The 27th Conference on Computer Communications. IEEE, 2008, pp. 1238–1246.
[113] S. Khan, I. Sharma, M. Aslam, M. Z. Khan, and S. Khan, “Security challenges of location privacy in vanets and state-
of-the-art solutions: A survey,” Future Internet, vol. 13, no. 4, p. 96, 2021.
[114] Y.-C. Wei and Y.-M. Chen, “Adaptive decision making for improving trust establishment in vanet,” in The 16th Asia-
Pacific Network Operations and Management Symposium. IEEE, 2014, pp. 1–4.
[115] N.-W. Lo and H.-C. Tsai, “A reputation system for traffic safety event on vehicular ad hoc networks,” EURASIP Journal
56
on wireless communications and networking, vol. 2009, pp. 1–10, 2009.
[116] Y.-M. Chen and Y.-C. Wei, “A beacon-based trust management system for enhancing user centric location privacy in
vanets,” Journal of Communications and Networks, vol. 15, no. 2, pp. 153–163, 2013.
[117] B. Płaczek and M. Bernas, “Detection of malicious data in vehicular ad hoc networks for traffic signal control applications,”
in Computer Networks: 23rd International Conference, CN 2016, Brunów, Poland, June 14-17, 2016, Proceedings 23.
Springer, 2016, pp. 72–82.
[118] W. Li and H. Song, “Art: An attack-resistant trust management scheme for securing vehicular ad hoc networks,” IEEE
transactions on intelligent transportation systems, vol. 17, no. 4, pp. 960–969, 2015.
[119] D. Huang, Y. Na, Y. Liu, Z. Zhang, and B. Mi, “Overview of cooperative fault-tolerant control driven by the full
information chain of intelligent connected vehicle platoons under the zero-trust framework: Opportunities and challenges,”
IEEE Intelligent Transportation Systems Magazine, 2023.
[120] J. Cui, Y. Na, and D. Huang, “Trust evaluation of topological nodes in intelligent connected vehicles communication net-
work under zero-trust environment,” in 2023 CAA Symposium on Fault Detection, Supervision and Safety for Technical
Processes (SAFEPROCESS). IEEE, 2023, pp. 1–6.
[121] X. Li, Y. Na, D. Huang, and L. Zhu, “Adrc controller design for autonomous vehicles queuing systems in zero-trust
environment,” in 2023 6th International Conference on Robotics, Control and Automation Engineering (RCAE). IEEE,
2023, pp. 457–462.
[122] L. Zhang, D. Huang, and Y. Na, “Distributed fault-tolerant control of connected vehicle platoon in a zero-trust environ-
ment,” in 2023 CAA Symposium on Fault Detection, Supervision and Safety for Technical Processes (SAFEPROCESS).
IEEE, 2023, pp. 1–6.
[123] Y. Song, F. Jiang, S. W. A. Shah, and R. Doss, “A new zero-trust aided smart key authentication scheme in iov,” in 2022
IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events
(PerCom Workshops). IEEE, 2022, pp. 630–636.
[124] H. Fang, Y. Zhu, Y. Zhang, and X. Wang, “Decentralized edge collaboration for seamless handover authentication in
zero-trust iov,” IEEE Transactions on Wireless Communications, 2024.
[125] M. Zhang, Q. Ye, and K. Deng, “Based on linkable ring signature map review scheme for zero-trust autonomous vehicles,”
in 2023 8th International Conference on Data Science in Cyberspace (DSC). IEEE, 2023, pp. 106–113.
[126] Y. Wang, Y. Na, S. Xu, and D. Huang, “Distributed fault detection scheme for intelligent connected vehicles in a zero-
trust environment,” in 2023 2nd Conference on Fully Actuated System Theory and Applications (CFASTA). IEEE,
2023, pp. 526–531.
[127] J. Blåberg Kristoffersson, “Zero trust in autonomous vehicle networks utilizing automotive ethernet,” 2022.
[128] V. B. Kondaveety, H. Lamkuche, and S. Prasad, “A zero trust architecture for next generation automobiles,” in AIP
Conference Proceedings, vol. 2519, no. 1. AIP Publishing, 2022.
[129] B. Sullivan and J. A. Khan, “Observe: Blockchain-based zero trust security protocol for connected and autonomous
vehicles (cavs) data using simple machine learning,” in 2024 International Conference on Computing, Networking and
Communications (ICNC). IEEE, 2024, pp. 554–559.
[130] D. S. Fowler, C. Maple, and G. Epiphaniou, “A practical implementation of quantum-derived keys for secure vehicle-to-
infrastructure communications,” Vehicles, vol. 5, no. 4, pp. 1586–1604, 2023.
[131] Y. Liu, X. Hao, W. Ren, R. Xiong, T. Zhu, K.-K. R. Choo, and G. Min, “A blockchain-based decentralized, fair and
authenticated information sharing scheme in zero trust internet-of-things,” IEEE Transactions on Computers, vol. 72,
no. 2, pp. 501–512, 2022.
[132] M. Hao, D. Ye, S. Wang, B. Tan, and R. Yu, “Urllc resource slicing and scheduling for trustworthy 6g vehicular services:
A federated reinforcement learning approach,” Physical Communication, vol. 49, p. 101470, 2021.
57
[133] Y. Bao, D. Huang, and Y. Na, “Stability analysis for heterogeneous vehicle platoon in a zero-trust environment,” in 2023
2nd Conference on Fully Actuated System Theory and Applications (CFASTA). IEEE, 2023, pp. 372–377.
[134] P. Phiayura and S. Teerakanok, “A comprehensive framework for migrating to zero trust architecture,” IEEE Access,
vol. 11, pp. 19487–19 511, 2023.
[135] M. J. Khan, “Zero trust architecture: Redefining network security paradigms in the digital age,” World Journal of
Advanced Research and Reviews, vol. 19, no. 3, pp. 105–116, 2023.
[136] H. Sateesh and P. Zavarsky, “State-of-the-art vanet trust models: Challenges and recommendations,” in 2020 11th IEEE
Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON). IEEE, 2020, pp.
0757–0764.
[137] M. Hao, B. Tan, S. Wang, R. Yu, R. W. Liu, and L. Yu, “Exploiting blockchain for dependable services in zero-trust
vehicular networks,” Frontiers of Computer Science, vol. 18, no. 2, p. 182805, 2024.
58
ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
Zero trust architecture (ZTA) is a paradigm shift in how we protect data, stay connected and access resources. ZTA is non-perimeter-based defence, which has been emerging as a promising revolution in the cyber security field. It can be used to continuously maintain security by safeguarding against attacks both from inside and outside of the network system. However, ZTA automation and orchestration, towards seamless deployment on real-world networks, has been limited to be reviewed in the existing literature. In this paper, we first identify the bottlenecks, discuss the background of ZTA and compare it with traditional perimeter-based security architectures. More importantly, we provide an in-depth analysis of state-of-the-art AI techniques that have the potential in the automation and orchestration of ZTA. Overall, in this review paper, we develop a foundational view on the challenges and potential enablers for the automation and orchestration of ZTA.
Article
Full-text available
While technological advancements and their deep integration in connected and automated vehicles is a central aspect in the evolving trend of automotive industry, they also depict a growing size attack surface for malicious actors: the latter ones typically aim at exploiting known and unknown security vulnerabilities, with potentially disastrous consequences on the safety of vehicles, people, and infrastructures. In recent years, remarkable efforts have been spent to mitigate security vulnerabilities in intelligent and connected vehicles, in particular in the inside of vehicles, the so-called intra-vehicle networks. Despite those efforts, securing intra-vehicle networks remains a non-trivial task due to their heterogeneous and increasingly complex context. Starting from the above remarks and motivated by the industrial research and innovation project EMERGE, in this paper we report on a novel cryptographic hardware-software solution that we have designed and developed for securing the intra-vehicle network of intelligent connected vehicles: the Crypto-Engine. The Crypto-Engine relies on a lightweight hybrid-key cryptographic scheme to provide confidentiality and authentication without compromising the normal communication performance. We tested the Crypto-Engine and demonstrated that, once configured according to application-defined performance requirements, it can authenticate parties and secure the communications with a negligible overhead.
Article
Full-text available
The Internet of Vehicles (IoV) is an innovative area of interest in modern mobility that is rapidly evolving while facing complex challenges. Traditional IoV networks are susceptible to intrusion threats, which can lead to data leakage and seizure of vehicle control by attackers, thereby endangering vehicle users’ privacy and personal safety. An Attribute and User Trust Score-based Zero Trust Access Control Model (AU-ZTAC) is proposed, combining the zero-trust and attribute-based access control models to meet network protection requirements while achieving fine-grained dynamic access control and incorporating trust evaluation in the access control process to better reflect users’ intent. Experimental results demonstrate the effectiveness and feasibility of trust assessment through the proposed model. A comparison with the classical schemes illustrates that AU-ZTAC allows for more flexible and fine-grained access control in complex access control environments while improving IoV security.
Article
Full-text available
As cross-border access becomes more frequent, traditional perimeter-based network security models can no longer cope with evolving security requirements. Zero trust is a novel paradigm for cybersecurity based on the core concept of “never trust, always verify”. It attempts to protect against security risks related to internal threats by eliminating the demarcations between the internal and external network of traditional network perimeters. Nevertheless, research on the theory and application of zero trust is still in its infancy, and more extensive research is necessary to facilitate a deeper understanding of the paradigm in academia and the industry. In this paper, trust in cybersecurity is discussed, following which the origin, concepts, and principles related to zero trust are elaborated on. The characteristics, strengths, and weaknesses of the existing research are analysed in the context of zero trust achievements and their technical applications in Cloud and IoT environments. Finally, to support the development and application of zero trust in the future, the concept and its current challenges are analysed.
Article
Full-text available
We provide a practical implementation of a free space optical quantum key distribution (FSO-QKD) system within a vehicle-to-infrastructure (V2I) application developed under the Innovate UK AirQKD project. The FSO-QKD system provides the quantum secure encryption keys that serve as the foundation for secure communications throughout the V2I application to address known concerns over V2I security. This document includes summaries of the quantum key generation process and the deployed V2I technology. Subsequently, a high-level view of the system design, the practical experiment, and its execution are presented. Multiple AirQKD project partners developed technologies ranging from semiconductors and hardware to security protocols and software, to enable the QKD-secured V2I system. The developed technology includes a novel zero-trust security protocol used to protect the V2I communications, ensuring that spoofed V2I messages from a compromised device are not accepted by the system.
Article
Given the frequently changing and potentially unreliable environment, the seamless handover authentication is essential to achieve zero-trust Internet of Vehicles (IoV) network with dramatically enhanced communication and transportation safety. The traditional centralized handover authentication schemes may suffer from the excessive latency and situation agnostic limitation, leading to potential interruption of critical services for fast moving vehicles. To overcome the above challenges, this paper proposes a novel decentralized edge collaboration-based handover authentication scheme with the assistance of blockchain for providing continuous protections in zero-trust IoV. A distributed learning process is designed by involving multiple authentication cooperators (ACs) to collect device/location-related features of vehicles at network edge and then to verify their identities. During the movement of vehicles, the access point (AP) could select new ACs by transferring the security information from existing ACs to the new members for seamless handover authentication. A situation-aware AC selection and update algorithm is proposed for maximizing handover authentication accuracy. Moreover, a hierarchical blockchain-assisted security information transfer and reputation management mechanism is designed for reliable collaboration and efficient management in zero-trust IoV. Compared with the existing schemes, our results characterize the outperformance of the proposed scheme in authentication accuracy and time cost of handover.