Cookie Preferences

We use cookies to enhance your browsing experience, analyze site traffic, and personalize content. By clicking "Accept All", you consent to our use of cookies. See our Privacy Policy for more information.

SVX-AD

ProtocolValidatedSimulation
TransportationV2X/V2IPublic SafetyCritical Infrastructure

SVX-AD is an identity-centric security protocol for Vehicle-to-Infrastructure (V2I) environments that integrates Zero Trust verification with AI/ML-based anomaly detection. The protocol is designed for high-consequence cyber-physical systems where errors or malicious manipulation can translate into unsafe roadway decisions.

Artifact Overview

Problem

Connected transportation systems increasingly rely on V2I services for safety messaging, signal timing, routing optimization, and situational awareness. This dependency creates a security discontinuity: the roadway becomes dependent on networked trust decisions, yet the environment remains adversarial, partially observable, and latency-sensitive.

Operational Context

Intelligent Transportation Systems (ITS) and multi-jurisdiction V2I deployments where infrastructure services must remain trustworthy under adversarial conditions.

Evaluation

Simulation5 metrics

1. Problem Statement & Operational Motivation

Connected transportation systems increasingly rely on V2I services for safety messaging, signal timing, routing optimization, and situational awareness. This dependency creates a security discontinuity: the roadway becomes dependent on networked trust decisions, yet the environment remains adversarial, partially observable, and latency-sensitive.

This problem arises in the context of intelligent transportation systems (its) and multi-jurisdiction v2i deployments where infrastructure services must remain trustworthy under adversarial conditions. and reflects constraints commonly encountered in production systems, including scale, adversarial behavior, regulatory requirements, and operational continuity.

2. Artifact Description

SVX-AD is an identity-centric security protocol for Vehicle-to-Infrastructure (V2I) environments that integrates Zero Trust verification with AI/ML-based anomaly detection. The protocol is designed for high-consequence cyber-physical systems where errors or malicious manipulation can translate into unsafe roadway decisions.

The artifact is designed to be identity-first, treating authentication, authorization, federation, and policy enforcement as the primary control plane. It is intended to function under real operational conditions rather than idealized assumptions.

3. Design Science Research Methodology (DSRM) Mapping

SVX-AD follows DSRM with research contributions expressed as an operational artifact.

• Problem Identification & Motivation

The operational problem was defined based on observed risks and limitations in existing systems.

• Design & Development

SVX-AD is built on the following design principles:

  • IAM as the control plane for V2I service access (AuthN/AuthZ as first-order security controls)
  • Zero Trust by default, using continuous verification rather than implicit trust
  • Behavioral anomaly detection to complement cryptographic and policy controls
  • Operational resilience, ensuring safe behavior under degraded or attacked connectivity

• Build

The artifact is defined as a protocol specification that includes: message exchange and validation flow, identity and authorization checkpoints, detection and control logic for anomalous interactions, and response guidance for safety-aligned outcomes.

• Demonstration

SVX-AD is demonstrated through a simulation framework in which representative V2I message flows are subjected to adversarial attack patterns. The protocol's detection and response behavior is measured across multiple scenarios to evaluate operational feasibility.

• Evaluation

Evaluation is designed around measurable outcomes: detection performance, response latency, and operational stability under attack. Results are reported in a form suitable for publication-grade figures and grant deliverables.

• Communication

The artifact is documented as a citable protocol object and connected to research notes, simulation plans, and deployment guidance.

4. Evaluation & Evidence

Evaluation Method: Simulation

Evaluation Metrics:

  • Detection performance (e.g., ROC/AUC where applicable)
  • Responsiveness by attack type (time-to-detect, time-to-contain)
  • False positive / false negative balance
  • Model efficiency metrics (compute footprint, latency)
  • Operational continuity under attack (service degradation profile)

Evaluation Contexts:

  • Attack simulation suite design for V2I interactions
  • Protocol responsiveness analysis under adversarial conditions
  • Comparative evaluation across attack categories (spoofing, replay, jamming, integrity tampering)

The evaluation approach treats the environment as adversarial and constrained. SVX-AD is not assessed on theoretical correctness alone; it is assessed on whether it can deliver trustworthy behavior under realistic deployment assumptions.

5. Applicability & Use Cases

SVX-AD applies to:

TransportationV2X/V2IPublic SafetyCritical Infrastructure

Use cases include:

  • Architecture design and review
  • Security control implementation
  • Research extension and replication
  • Teaching and laboratory exercises
  • Policy and governance analysis

6. Limitations & Scope

SVX-AD's simulation-driven evaluation depends on the realism of attack modeling, network constraints, and traffic assumptions. Field validation requires access to pilot infrastructure and operational approvals, and may necessitate adaptations for device diversity, regional policy constraints, and integration with existing transportation vendor ecosystems.

7. Iteration & Evolution

SVX-AD is designed to evolve as new attack patterns and adversary capabilities emerge, additional evaluation datasets and simulation fidelity are introduced, deployment feedback is incorporated from pilots and operational stakeholders, and identity federation requirements expand across jurisdictions.

8. How to Cite This Artifact

J. Nsoh, "SVX-AD: An Identity-Centric V2I Security Protocol Artifact for Anomaly Detection," Artifact, Nsoh Research, 2025. Available: https://jovita.io/artifacts/svx-ad

10. License & Availability

License: TBD

Last Updated: 2025-12-20

Where applicable, reference implementations and simulation configurations will be published as linked materials under this artifact record.

SVX-AD represents an applied research contribution produced through Design Science Research Methodology. Its value lies not only in correctness, but in whether it can be implemented, evaluated, and trusted in real operational environments.