2015 International Conference on Identification, Information, and Knowledge in the Internet of Things (IIKI) 2015
DOI: 10.1109/iiki.2015.33
|View full text |Cite
|
Sign up to set email alerts
|

Security and Privacy in the Internet of Vehicles

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
33
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 64 publications
(33 citation statements)
references
References 53 publications
0
33
0
Order By: Relevance
“…Accordingly, due to IoV dynamic topological structures, huge network scale, non-uniform distribution of nodes and mobile limitation, it becomes prone to various forms of attacks such as authentication and identification attacks, availability attacks, confidentiality attacks, routing attacks, data authenticity and etc. It is on this reasons that IoV indeed requires security and privacy mechanisms (Sun et al, 2015).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Accordingly, due to IoV dynamic topological structures, huge network scale, non-uniform distribution of nodes and mobile limitation, it becomes prone to various forms of attacks such as authentication and identification attacks, availability attacks, confidentiality attacks, routing attacks, data authenticity and etc. It is on this reasons that IoV indeed requires security and privacy mechanisms (Sun et al, 2015).…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, blockchain is a technology that is argued to be robust and provide strong security solution. In fact, the block itself is time-stamped which contain all the transaction records (Schutzer and Comer, 2016). In other words, information in IoV operations can be provided by means of the so-called "trusted Timestamping".…”
Section: Introductionmentioning
confidence: 99%
“…Since, very critical information (such as black-ice warnings) is involved in VANET, thus it is paramount that this information is authentic and is generated from legitimate vehicles. Further, network should be capable of satisfying traditional security requirements, i.e., availability, authenticity, privacy, confidentiality, non-repudiation and integrity [ 4 , 5 , 6 , 7 ]. However, ensuring security in VANET is extremely challenging due to its susceptibility to different attacks such as Man-In-The-Middle (MITM) attacks which pose a severe risk in VANET [ 8 , 9 ].…”
Section: Introductionmentioning
confidence: 99%
“…Use of firewalls or intrusion detection system (IDS) for different components of the car to avoid attacks. 32,45 6. VPKI: Relying on the public key encryption method, each car will have its own public and private key along with CA in order to authenticate the cars and the messages.…”
mentioning
confidence: 99%
“…Different attacks on integrity. ,24,27,30,[33][34][35][36][37][38][39][40][41][42][43] Change the content of the messages to send wrong information or fake dataMasquerading 18,[21][22][23][24][25]27,29,30,33,37,38,[40][41][42][44][45][46][47][48][49][50][51][52] Send fake data to the users as a trusted ID to create a chaos in the network Black hole21-26, 30, 33, 37, 38, 40, 42, 44, 47, 48, 52, 53 Not allowing any messages to pass which will increase the time to receive the packet and the vehicles might not have enough time to react Gray hole21, 22, 24, 30, 33-35, 38, 42, 44, 47, 50-52 To give the attacker the ability to join the network without the need to be physically there…”
mentioning
confidence: 99%