2019 SoutheastCon 2019
DOI: 10.1109/southeastcon42311.2019.9020476
|View full text |Cite
|
Sign up to set email alerts
|

Towards an Analysis of the Architecture, Security, and Privacy Issues in Vehicular Fog Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(18 citation statements)
references
References 24 publications
0
18
0
Order By: Relevance
“…In the 5G IoV environment, different attacks on information security and privacy are possible. Attackers can target information such as the vehicle's speed and health, current location and destination route information of vehicles, and the personal information of vehicle users or owners that are stored in infotainment systems (Hoque & Hasan, 2019). Furthermore, due to the wireless medium of the 5G IoV environment, vehicles are open to several types of attacks.…”
Section: Security Attacks In 5g Iov Environmentmentioning
confidence: 99%
“…In the 5G IoV environment, different attacks on information security and privacy are possible. Attackers can target information such as the vehicle's speed and health, current location and destination route information of vehicles, and the personal information of vehicle users or owners that are stored in infotainment systems (Hoque & Hasan, 2019). Furthermore, due to the wireless medium of the 5G IoV environment, vehicles are open to several types of attacks.…”
Section: Security Attacks In 5g Iov Environmentmentioning
confidence: 99%
“…A bogus information attack implies that wrong information is sent in the network such that the integrity in the VFC system is affected [E-3], [E-5], [60]. Bogus information could be wrong messages [E-7], [18], [55], [56] or injected information [E-8], [50], [52] which is deliberately manipulated [E-1], or forged GPS signals to mislead vehicles due to wrong location information [55]. When attackers are able to access a fog node, they could adjust or fake signals that are sent to a vehicle [E-8].…”
Section: ) Tamperingmentioning
confidence: 99%
“…However, the knowledge is scattered across different research articles and disciplines, and lacks empirical validation. For example, Hoque and Hasan [18] discuss important security risks in the context of VFC. However, physical attacks have been neglected so far, mostly because physical attacks are not explicitly emphasized as relevant threats in popular threat models like STRIDE [19], [20].…”
Section: Introductionmentioning
confidence: 99%
“…Also, the personal information of vehicle users or owners that are stored in infotainment systems can be a target for attackers. Below [15] are some outlined areas of concern regarding privacy in an IoV environment.…”
Section: Privacy Requirementmentioning
confidence: 99%
“…Destination routes and location information of vehicles in the environment should be kept safe to prevent possible attacks [15].…”
Section: Location Privacymentioning
confidence: 99%