- Start
- Enhancing Security for Internet of Vehicles
Enhancing Security for Internet of Vehicles
Angebote / Angebote:
Internet of Vehicles (IoV) is an emerging concept in Intelligent Transportation Systems (ITS)
to enhance the existing capabilities of VANETs by integrating with the Internet of Things
(IoT). IoV introduces the vision of smart transportation and smart cities as it gives prior
information regarding accidents, traffic, route optimization, vacant parking, better navigation,
etc. due to this, cities will be properly organized, and life-threatening risks are also minimized.
An immense amount of services and applications are being supported by IoV and can impart
voluminous crucial information to on-road drivers and travelers. Applications of IoVs can be
divided into the following broad categories: Safety-related applications, Comfort and
infotainment, Traffic efficiency and management, and Healthcare applications. IoV has
numerous key technologies, and one of them is Radio-Frequency Identification Technology
(RFID) which has a plethora of applications in IoV like automatic toll collection, intelligent
parking, data dissemination, tracking the location of the vehicle, etc. which enhances the
overall performance of IoV networks.
IoV network should be robust and effective as it involves real-time critical data. Thus, its
security can't be compromised as well as the timely delivery of information is also essential.
IoV networks are exposed to various types of attacks and threats like Sybil attacks, Black Hole
attacks, Masquerading attacks, etc. IoV being a real-time sensitive network and delay intolerant
needs to be secure otherwise it may lead to hazardous situations.
As RFID technology relies on wireless communication, it is also vulnerable to various security
threats. Compromising the security of RFID impacts the security of the IoV system which may
lead to hazardous results, so RFID based IoV system must be secure from all security attacks.
Various authentication schemes are suggested by researchers to secure the RFID-based systems
but all have limitations as some focus on preventing the security attacks while few focus on
computational resources of RFID tags.
Folgt in ca. 10 Arbeitstagen