2020
DOI: 10.1016/j.jisa.2020.102637
|View full text |Cite
|
Sign up to set email alerts
|

Towards a secure ITS: Overview, challenges and solutions

Abstract: Intelligent Transportation Systems (ITS), the heart of the new revolution of smart transport, has evolved from the well-known Vehicular Ad-hoc Networks (VANETs) to become the Internet of Vehicles (IoV). In fact, the increase in the number of vehicles and the newly born technologies have stimulated the new Internet of Vehicles (IoV) or the Internet of Cars. In general, ITS aims at ensuring better traffic efficiency and reducing road accidents. However, due to different limitations and issues, these systems suff… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
20
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(20 citation statements)
references
References 162 publications
(195 reference statements)
0
20
0
Order By: Relevance
“…The highly dynamic, open-access medium, distributed infrastructure, and protocol designing issues have made VANETs vulnerable to many security attacks, such as a denial of service (DoS) attack, Sybil attack, wormhole attack, flooding attack, impersonation attack, jellyfish attack, GHA, and BHA [2,16,24,25]. Due to the presence of these attacks, the applications and services of VANETs can be compromised.…”
Section: Black Hole Attacks (Bhas) In Vanetsmentioning
confidence: 99%
See 3 more Smart Citations
“…The highly dynamic, open-access medium, distributed infrastructure, and protocol designing issues have made VANETs vulnerable to many security attacks, such as a denial of service (DoS) attack, Sybil attack, wormhole attack, flooding attack, impersonation attack, jellyfish attack, GHA, and BHA [2,16,24,25]. Due to the presence of these attacks, the applications and services of VANETs can be compromised.…”
Section: Black Hole Attacks (Bhas) In Vanetsmentioning
confidence: 99%
“…The accuracy metric measures how accurate the model is in detecting malicious or normal node behavior. It is defined as the percentage of all those correctly predicted instances to the overall instances calculated using Equation (25). In order to maximize the performance of a model, FPR and FNR must be minimized, while TPR and TNR must be maximized.…”
Section: Accuracy Ratementioning
confidence: 99%
See 2 more Smart Citations
“…How can we avoid alterations in the content of the messages? It is critical to analyse the vulnerabilities of the system and to provide a security design architecture that considers confidentiality and integrity of the data and messages, authentication and authorisation of the users or systems, and non-repudiation of data [8].…”
Section: Introductionmentioning
confidence: 99%