Javascript must be enabled to continue!
A Survey on Security Aspects of Internet of Vehicles
View through CrossRef
An intelligent transportation system (ITS) is a well-developed program that
aims to provide innovative assistance in identifying various methods of transportation
and traffic management. It is empowering clients to be better educated and make more
secure, increasingly prepared, and 'more intelligent utilization of transport systems.
Internet of Vehicles (IoV) is a rising idea in ITS to upgrade the current abilities of
Vehicular Ad-hoc Networks by incorporating them into the Internet of Things. IoV has
commanded the vehicular frameworks because of various exceptional characteristics
like dominant topographic network structures, massive network proportion, consistent
internet connection, a similarity of individual gadgets, and elevated handling ability.
An intelligent transportation framework includes a gigantic measure of transforming
real-time critical information, in which security plays a significant part. In this chapter,
an investigation of IoV and VANETs has been conducted, with distinctive security
aspects of IoV being emphasized, incorporating security requirements, security risks,
and security attacks. Finally, persisting current lightweight cryptographic security
solutions for IoV related attacks are summarized.
BENTHAM SCIENCE PUBLISHERS
Title: A Survey on Security Aspects of Internet of Vehicles
Description:
An intelligent transportation system (ITS) is a well-developed program that
aims to provide innovative assistance in identifying various methods of transportation
and traffic management.
It is empowering clients to be better educated and make more
secure, increasingly prepared, and 'more intelligent utilization of transport systems.
Internet of Vehicles (IoV) is a rising idea in ITS to upgrade the current abilities of
Vehicular Ad-hoc Networks by incorporating them into the Internet of Things.
IoV has
commanded the vehicular frameworks because of various exceptional characteristics
like dominant topographic network structures, massive network proportion, consistent
internet connection, a similarity of individual gadgets, and elevated handling ability.
An intelligent transportation framework includes a gigantic measure of transforming
real-time critical information, in which security plays a significant part.
In this chapter,
an investigation of IoV and VANETs has been conducted, with distinctive security
aspects of IoV being emphasized, incorporating security requirements, security risks,
and security attacks.
Finally, persisting current lightweight cryptographic security
solutions for IoV related attacks are summarized.
Related Results
The Geography of Cyberspace
The Geography of Cyberspace
The Virtual and the Physical
The structure of virtual space is a product of the Internet’s geography and technology. Debates around the nature of the virtual — culture, s...
Internet addiction among school children in the Western Province of Sri Lanka: A cross sectional analytical study (Preprint)
Internet addiction among school children in the Western Province of Sri Lanka: A cross sectional analytical study (Preprint)
BACKGROUND
The internet is widely used across the world and in Sri Lanka for many purposes. Though essential for everyday life there are many negative aspec...
(originally published in October 1997)
(originally published in October 1997)
This paper is included in the First Monday Special Issue #3: Internet banking, e-money, and Internet gift economies, published in December 2005. Special Issue editor Mark A. Fox as...
Internet fraud
Internet fraud
Internet law represents one of the youngest branches of law, which emerged from the need to expand the existing and create a new regulatory framework that would regulate the intern...
UNDERSTANDING CONSUMERS INTENTION TO PURCHASE GREEN VEHICLE: A LITERATURE REVIEW
UNDERSTANDING CONSUMERS INTENTION TO PURCHASE GREEN VEHICLE: A LITERATURE REVIEW
Global warming is one of the main issues discuss by nations leaders. It is a crucial problem that needs to be address immediately. One of the solutions to global warming is green v...
Hubungan Antara Adiksi Internet Dengan Pola Makan Pada Mahasiswa Universitas HKBP Nommensen Medan
Hubungan Antara Adiksi Internet Dengan Pola Makan Pada Mahasiswa Universitas HKBP Nommensen Medan
ABSTRACT
Introduction: Internet addiction is a syndrome that characterized by spending an enormous amount of time using internet and not being able to control internet usage....
Public budget security administration: development of primary mechanisms
Public budget security administration: development of primary mechanisms
The current state of public administration of budget security indicates its actual absence. With the extremely important role of budget security, both in the life of the country as...
Key Technologies of IoT Service Security and Privacy Protection
Key Technologies of IoT Service Security and Privacy Protection
The Internet of Things in the industrial industry has attracted widespread attention from the government, academia, and industry due to its huge application prospects. The core ide...

