technology risk 8 min read | February 4, 2026 | Brandon Thomas, Managing Partner

V2X Security: How to Protect Vehicle-to-Infrastructure Communications Before Attackers Exploit Them

The first time you see a V2X-enabled intersection in action — traffic signals dynamically adjusting to approaching emergency vehicles, connected vehicles negotiating right-of-way through digital handshakes — it feels like the future finally arrived. Then you start thinking like an attacker.

V2X autonomous vehicles smart city threat intelligence
Red traffic lights glow at a dark city intersection.

Photo by Denis Bayer on Unsplash

The first time you see a V2X-enabled intersection in action — traffic signals dynamically adjusting to approaching emergency vehicles, connected vehicles negotiating right-of-way through digital handshakes — it feels like the future finally arrived. Then you start thinking like an attacker, and the excitement turns into something closer to professional concern.

Vehicle-to-infrastructure (V2I) communications represent one of the most consequential attack surfaces in modern transportation. We’re not talking about theoretical risks or academic exercises. We’re talking about systems that will make real-time safety decisions for vehicles carrying real people, based on data transmitted over radio frequencies that anyone with the right equipment can intercept, analyze, and potentially manipulate.

If you’re operating an AV fleet or managing smart city infrastructure, understanding V2X cybersecurity isn’t optional — it’s foundational to your operational security posture. This piece breaks down the actual attack surfaces, the protocol-level vulnerabilities you need to understand, and the defense architecture that can meaningfully reduce your risk exposure.

Understanding the V2X Attack Surface

V2X encompasses several communication modes: vehicle-to-vehicle (V2V), vehicle-to-infrastructure (V2I), vehicle-to-network (V2N), and vehicle-to-pedestrian (V2P). For infrastructure operators and fleet managers, V2I is where your direct responsibility lies, but the interconnected nature of these systems means a compromise in one domain can cascade into others.

The primary communication technologies in play are DSRC (Dedicated Short-Range Communications) operating in the 5.9 GHz band and C-V2X (Cellular Vehicle-to-Everything) leveraging LTE and 5G infrastructure. Each carries distinct security characteristics:

  • DSRC security relies on IEEE 1609.2 certificates managed through the Security Credential Management System (SCMS). The architecture is sound in theory, but implementation gaps are common in deployed systems.
  • C-V2X inherits cellular security mechanisms but introduces dependencies on mobile network operators and exposes V2X traffic to the broader cellular threat landscape.

From a MITRE ATT&CK perspective, V2X infrastructure presents opportunities across multiple tactics. Initial access can come through compromised roadside units (RSUs), rogue base stations, or supply chain attacks on V2X hardware. Lateral movement becomes possible when RSUs connect back to traffic management centers over inadequately segmented networks. Impact — the end goal for most adversaries targeting transportation — can range from traffic disruption to physical harm.

The attack surface breaks down into three primary categories:

  1. Radio frequency layer: Signal jamming, spoofing, replay attacks, and man-in-the-middle positioning
  2. Protocol and application layer: Malformed message injection, certificate manipulation, and exploitation of message validation weaknesses
  3. Backend infrastructure: RSU management systems, traffic management center integrations, and certificate authority infrastructure

Protocol-Level Vulnerabilities That Matter

Let’s get specific about where the weaknesses actually live. The Basic Safety Message (BSM) is the workhorse of V2V/V2I communication — a standardized packet containing vehicle position, speed, heading, acceleration, and other kinematic data. BSMs broadcast 10 times per second, creating a continuous stream of data that connected infrastructure uses for traffic management, signal timing, and safety applications.

The security model assumes every BSM is signed using ECDSA certificates issued through the SCMS. In practice, several vulnerabilities emerge:

Certificate validation latency: Verifying signatures on 10+ BSMs per second from dozens of vehicles creates computational load. Some implementations take shortcuts — caching validation results longer than they should, or degrading to statistical sampling under load. An attacker who understands these thresholds can time malicious messages to slip through.

Misbehavior detection gaps: The SCMS includes a Misbehavior Authority designed to identify and revoke certificates from devices sending implausible data. But “implausible” is surprisingly hard to define algorithmically. A vehicle reporting it’s traveling 200 mph on a residential street is obviously wrong. A vehicle reporting it’s 50 feet from its actual position — close enough to cause a collision but within GPS error margins — is much harder to flag automatically.

Certificate revocation distribution: When a certificate is revoked, that information needs to reach every RSU and connected vehicle. The Certificate Revocation List (CRL) distribution mechanism has inherent latency. During that window, a compromised device can continue operating with trusted credentials.

Signal Phase and Timing (SPaT) message integrity: SPaT messages tell vehicles what the traffic signal is currently showing and when it will change. Infrastructure operators broadcast these from RSUs. If an attacker can inject false SPaT messages — either by compromising an RSU or spoofing transmissions — they can tell vehicles that a red light is green. The downstream implications for AV systems that trust this data are severe.

DSRC security fundamentally depends on the integrity of the certificate chain. Compromise the root certificate authority, and you can sign anything. Compromise a single enrollment certificate authority, and you can mint valid credentials for non-existent vehicles. These aren’t hypothetical concerns — they’re the logical targets for any sophisticated adversary.

Threat Scenarios AV Operators Must Plan For

Generic threat modeling doesn’t help operators make real decisions. Here are the scenarios that should drive your security architecture:

Scenario 1: RSU Compromise via Management Interface

Roadside units are edge computing devices deployed in physically accessible locations. Many RSUs include management interfaces — SSH, SNMP, web consoles — that were configured during installation and never hardened. An attacker who gains access to the RSU management network can push malicious firmware, modify message signing behavior, or use the RSU as a pivot point into the traffic management center.

We’ve seen RSUs deployed with default credentials, management interfaces exposed to the internet through misconfigured cellular backhaul, and firmware update mechanisms that don’t validate code signatures. Each of these represents a realistic initial access vector.

Scenario 2: GPS Spoofing to Poison BSM Data

BSMs include GPS-derived position data. GPS spoofing equipment is commercially available and increasingly sophisticated. An attacker can create a localized GPS spoofing field that causes vehicles in a specific area to report incorrect positions. Connected infrastructure receiving these poisoned BSMs may make incorrect decisions — adjusting signal timing based on phantom traffic, or providing misleading data to other connected vehicles.

For AV fleets specifically, GPS spoofing can create dangerous disagreements between what the vehicle’s sensors perceive and what V2X messages claim. How your autonomy stack resolves these conflicts determines whether this attack causes confusion or collisions.

Scenario 3: Replay Attacks on SPaT Messages

An attacker captures legitimate SPaT messages from an intersection, then replays them at a different time or location. If message freshness validation is weak — or if receiving systems don’t correlate SPaT data with other environmental inputs — replayed messages can cause vehicles to act on stale or inapplicable signal information.

The IEEE 1609.2 standard includes generation time fields specifically to prevent replay attacks, but the tolerance windows in many implementations are generous enough to allow meaningful replay within safety-critical timeframes.

Building a Defensible V2X Architecture

Defense starts with accepting that V2X systems will be targeted and designing for resilience rather than assuming prevention. Here’s how to structure your approach:

Network Segmentation and Zero Trust

RSUs should never have direct network paths to critical traffic management systems. Implement a proper DMZ architecture with security inspection at each boundary. RSU management traffic should traverse separate VLANs from operational V2X data. Apply zero trust principles — authenticate and authorize every connection, even between infrastructure components you control.

For Azure-based deployments, leverage Azure Private Link to keep management traffic off the public internet. Use Azure Firewall or third-party NGFWs to enforce protocol-level inspection on traffic from field devices.

Defense-in-Depth Message Validation

Don’t rely solely on cryptographic validation. Implement plausibility checks at the application layer:

  • Cross-reference BSM position claims against known road geometry
  • Flag vehicles reporting speeds inconsistent with road classifications
  • Correlate V2X data with independent sources — loop detectors, camera-based traffic monitoring, connected vehicle telematics
  • Implement rate limiting on message processing to prevent flooding attacks

For AV fleets, your autonomy stack should treat V2X data as one input among many, not as authoritative truth. Sensor fusion that includes healthy skepticism of external data sources is essential.

Monitoring and Detection

You can’t secure what you can’t see. V2X environments need continuous monitoring that understands the specific threat landscape. Configure your SIEM to baseline normal V2X message patterns and alert on anomalies — sudden changes in message volume, unexpected certificate usage patterns, RSUs going offline or behaving inconsistently.

Build detection rules aligned to MITRE ATT&CK techniques relevant to ICS and connected vehicle environments. T1557 (Adversary-in-the-Middle) maps directly to V2X interception attacks. T1499 (Endpoint Denial of Service) captures jamming scenarios. T1565 (Data Manipulation) covers message spoofing and injection.

Incident Response Planning

When — not if — a V2X security incident occurs, you need predetermined response procedures. Can you isolate a compromised RSU without disrupting the entire intersection? Do you have fallback operational modes that don’t depend on V2X data? How do you communicate with connected vehicles when the trust infrastructure itself may be compromised?

Tabletop these scenarios before you face them in production. Coordinate with your AV operators, traffic management center staff, and security operations team to ensure everyone understands their role.

Bottom Line

Vehicle to infrastructure security isn’t a feature you bolt on after deployment. It’s a fundamental design consideration that shapes every architectural decision from certificate management to network topology to incident response procedures.

The threat is real and growing. Nation-state actors have demonstrated interest in transportation infrastructure. Criminal organizations are increasingly sophisticated. And the attack surface expands with every RSU deployed and every vehicle equipped with V2X capability.

For AV operators and smart city managers, the imperative is clear: get ahead of this now. Conduct rigorous security assessments of your V2X infrastructure. Verify that your implementations actually enforce the security controls the standards describe. Build detection capabilities that can identify attacks before they cause harm. And assume that sophisticated adversaries are already studying your systems, looking for the gaps.

V2X technology offers genuine safety and efficiency benefits. Realizing those benefits without creating catastrophic new vulnerabilities requires treating security as a first-class operational concern — with the resources, expertise, and leadership attention that implies.

Begin a Confidential Conversation