2020
DOI: 10.11591/ijece.v10i5.pp5409-5419
|View full text |Cite
|
Sign up to set email alerts
|

A survey on security and privacy issues in IoV

Abstract: As an up-and-coming branch of the internet of things, internet of vehicles (IoV) is imagined to fill in as a fundamental information detecting and processing platform for astute transportation frameworks. Today, vehicles are progressively being associated with the internet of things which empower them to give pervasive access to data to drivers and travelers while moving. Be that as it may, as the quantity of associated vehicles continues expanding, new prerequisites, (for example, consistent, secure, vigorous… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 34 publications
(25 citation statements)
references
References 30 publications
0
21
0
Order By: Relevance
“…It is not difficult to imagine that privacy is intertwined with security when communication networks are considered, and it is a well-established consensus that the IoV will be very vulnerable to a multitude of attacks (e.g. [4], [10], [11], [17], [32]- [34]). Security and privacy are vast topics, and this paper will focus explicitly on privacy in end-user services.…”
Section: Concerns About Privacy and Trust In The Iovmentioning
confidence: 99%
“…It is not difficult to imagine that privacy is intertwined with security when communication networks are considered, and it is a well-established consensus that the IoV will be very vulnerable to a multitude of attacks (e.g. [4], [10], [11], [17], [32]- [34]). Security and privacy are vast topics, and this paper will focus explicitly on privacy in end-user services.…”
Section: Concerns About Privacy and Trust In The Iovmentioning
confidence: 99%
“…(xxii) Forgery attack: the attacker acts as a user device or onboard units (OBUs) and sends commands to control the network. To prevent this kind of attack, the original OBU must be protected with strong authentication steps including trusted third-party validation, so only verified users can enter the network [38]. (xxiii) Attack on fairness: vehicles participate in data collection (crowd sensing) and reporting, which allows them to receive a reward incentive.…”
Section: Possible Attacks On Iovmentioning
confidence: 99%
“…Figure 3 illustrates these security requirements and challenges. Following are the different security requirements of an IoV system [ 87 , 88 , 89 , 90 , 91 ]: Authentication: It means ensuring that the received data is generated by a legitimate sender, or in other words, making sure that the entity that sent the data must be the true actual entity it claims to be. It guarantees that the entities involved in the communication are authentic, not masqueraded by some attacker who forwards the messages on their behalf.…”
Section: Security Issues In Iov and Vanetsmentioning
confidence: 99%