Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

A Survey on Security Aspects of Internet of Vehicles

View through CrossRef
An intelligent transportation system (ITS) is a well-developed program that aims to provide innovative assistance in identifying various methods of transportation and traffic management. It is empowering clients to be better educated and make more secure, increasingly prepared, and 'more intelligent utilization of transport systems. Internet of Vehicles (IoV) is a rising idea in ITS to upgrade the current abilities of Vehicular Ad-hoc Networks by incorporating them into the Internet of Things. IoV has commanded the vehicular frameworks because of various exceptional characteristics like dominant topographic network structures, massive network proportion, consistent internet connection, a similarity of individual gadgets, and elevated handling ability. An intelligent transportation framework includes a gigantic measure of transforming real-time critical information, in which security plays a significant part. In this chapter, an investigation of IoV and VANETs has been conducted, with distinctive security aspects of IoV being emphasized, incorporating security requirements, security risks, and security attacks. Finally, persisting current lightweight cryptographic security solutions for IoV related attacks are summarized.
Title: A Survey on Security Aspects of Internet of Vehicles
Description:
An intelligent transportation system (ITS) is a well-developed program that aims to provide innovative assistance in identifying various methods of transportation and traffic management.
It is empowering clients to be better educated and make more secure, increasingly prepared, and 'more intelligent utilization of transport systems.
Internet of Vehicles (IoV) is a rising idea in ITS to upgrade the current abilities of Vehicular Ad-hoc Networks by incorporating them into the Internet of Things.
IoV has commanded the vehicular frameworks because of various exceptional characteristics like dominant topographic network structures, massive network proportion, consistent internet connection, a similarity of individual gadgets, and elevated handling ability.
An intelligent transportation framework includes a gigantic measure of transforming real-time critical information, in which security plays a significant part.
In this chapter, an investigation of IoV and VANETs has been conducted, with distinctive security aspects of IoV being emphasized, incorporating security requirements, security risks, and security attacks.
Finally, persisting current lightweight cryptographic security solutions for IoV related attacks are summarized.

Related Results

The Geography of Cyberspace
The Geography of Cyberspace
The Virtual and the Physical The structure of virtual space is a product of the Internet’s geography and technology. Debates around the nature of the virtual — culture, s...
(originally published in October 1997)
(originally published in October 1997)
This paper is included in the First Monday Special Issue #3: Internet banking, e-money, and Internet gift economies, published in December 2005. Special Issue editor Mark A. Fox as...
Internet fraud
Internet fraud
Internet law represents one of the youngest branches of law, which emerged from the need to expand the existing and create a new regulatory framework that would regulate the intern...
UNDERSTANDING CONSUMERS INTENTION TO PURCHASE GREEN VEHICLE: A LITERATURE REVIEW
UNDERSTANDING CONSUMERS INTENTION TO PURCHASE GREEN VEHICLE: A LITERATURE REVIEW
Global warming is one of the main issues discuss by nations leaders. It is a crucial problem that needs to be address immediately. One of the solutions to global warming is green v...
Hubungan Antara Adiksi Internet Dengan Pola Makan Pada Mahasiswa Universitas HKBP Nommensen Medan
Hubungan Antara Adiksi Internet Dengan Pola Makan Pada Mahasiswa Universitas HKBP Nommensen Medan
ABSTRACT Introduction: Internet addiction is a syndrome that characterized by spending an enormous amount of time using internet and not being able to control internet usage....
Public budget security administration: development of primary mechanisms
Public budget security administration: development of primary mechanisms
The current state of public administration of budget security indicates its actual absence. With the extremely important role of budget security, both in the life of the country as...
Key Technologies of IoT Service Security and Privacy Protection
Key Technologies of IoT Service Security and Privacy Protection
The Internet of Things in the industrial industry has attracted widespread attention from the government, academia, and industry due to its huge application prospects. The core ide...

Back to Top