scispace - formally typeset
Search or ask a question
Journal ArticleDOI

A survey on security and privacy issues in IoV

01 Oct 2020-International Journal of Electrical and Computer Engineering (Institute of Advanced Engineering and Science)-Vol. 10, Iss: 5, pp 5409-5419
TL;DR: The issues faced in implementing a secure IoV architecture are discussed and the various challenges in implementing security and privacy in IoV are examined by reviewing past papers along with pointing out research gaps and possible future work and putting forth on inferences relating to each paper.
Abstract: As an up-and-coming branch of the internet of things, internet of vehicles (IoV) is imagined to fill in as a fundamental information detecting and processing platform for astute transportation frameworks. Today, vehicles are progressively being associated with the internet of things which empower them to give pervasive access to data to drivers and travelers while moving. Be that as it may, as the quantity of associated vehicles continues expanding, new prerequisites, (for example, consistent, secure, vigorous, versatile data trade among vehicles, people, and side of the road frameworks) of vehicular systems are developing. Right now, the unique idea of vehicular specially appointed systems is being changed into another idea called the internet of vehicles (IoV). We talk about the issues faced in implementing a secure IoV architecture. We examine the various challenges in implementing security and privacy in IoV by reviewing past papers along with pointing out research gaps and possible future work and putting forth our on inferences relating to each paper.

Content maybe subject to copyright    Report

Citations
More filters
Journal Article
TL;DR: Calculations are developed and examined to reduce the entire quantity of Wireless access points as well as their locations in almost any given atmosphere while with the throughput needs and the necessity to ensure every place in the area can achieve a minimum of k APs.
Abstract: More particularly, calculations are developed and examined to reduce the entire quantity of Wireless access points as well as their locations in almost any given atmosphere while with the throughput needs and the necessity to ensure every place in the area can achieve a minimum of k APs. This paper concentrates on using Wireless for interacting with and localizing the robot. We've carried out thorough studies of Wireless signal propagation qualities both in indoor and outside conditions, which forms the foundation for Wireless AP deployment and communication to be able to augment how human operators communicate with this atmosphere, a mobile automatic platform is developed. Gas and oil refineries could be a harmful atmosphere for various reasons, including heat, toxic gasses, and unpredicted catastrophic failures. When multiple Wireless APs are close together, there's a possible for interference. A graph-coloring heuristic can be used to find out AP funnel allocation. Additionally, Wireless fingerprinting based localization is developed. All of the calculations implemented are examined in real life situations using the robot developed and answers are promising. For example, within the gas and oil industry, during inspection, maintenance, or repair of facilities inside a refinery, people might be uncovered to seriously high temps to have a long time, to toxic gasses including methane and H2S, and also to unpredicted catastrophic failures.

455 citations

Journal ArticleDOI
TL;DR: This article provides a comprehensive survey of research efforts to secure the industrial Internet of Things, discusses their applicability, and analyzes their security benefits.
Abstract: Given the tremendous success of the Internet of Things in interconnecting consumer devices, we observe a natural trend to likewise interconnect devices in industrial settings, referred to as industrial Internet of Things or Industry 4.0. While this coupling of industrial components provides many benefits, it also introduces serious security challenges. Although sharing many similarities with the consumer Internet of Things, securing the industrial Internet of Things introduces its own challenges but also opportunities, mainly resulting from a longer lifetime of components and a larger scale of networks. In this article, we identify the unique security goals and challenges of the industrial Internet of Things, which, unlike consumer deployments, mainly follow from safety and productivity requirements. To address these security goals and challenges, we provide a comprehensive survey of research efforts to secure the industrial Internet of Things, discuss their applicability, and analyze their security benefits.

107 citations

Journal ArticleDOI
TL;DR: This survey investigates the major research efforts over the period of 2013–2019 that address IoT security and privacy issues and provides extensive discussions on securing cloud-based IoT solutions, which include access control, integrity, and authentication.
Abstract: Since the term first coined in 1999, the Internet of Things (IoT) has gained significant momentum in connecting physical objects to the Internet and facilitating machine-to-human and machine-to-machine communications. By offering the capability to connect and integrate both digital and physical entities, IoT becomes an important paradigm that enables a whole new class of applications and services. Security is one of the most challenging issues that need to be addressed before these IoT applications and services can be fully embraced. In this survey, we investigate the major research efforts over the period of 2013–2019 that address IoT security and privacy issues. We provide extensive discussions on securing cloud-based IoT solutions. The main focus of these discussions is on securing the information in transit between IoT devices and IoT applications, where most of the data processing and modelling tasks take place. These discussions include all security aspects and challenges facing the data in transit. Specifically, a number of common attacks that target IoT solutions are first discussed, while presenting the main challenges of IoT security (e.g., the resource limitation of IoT devices, which hinder the ability of such devices to do expensive computations for securing the data). Then we present the main security requirements needed by IoT systems, which include access control, integrity, and authentication. We review recent research work in providing security and privacy services, which delegate the expensive computations to an edge or cloud, to cope with the low computations restrictions in IoT devices. Open research issues and possible research directions in securing cloud-based IoT systems are discussed, while proposing some possible solutions.

66 citations


Cites background from "A survey on security and privacy is..."

  • ...The authors of [36] abstracted IoT systems into four layers, and presented a high level overview of the security challenges and solutions for each of the proposed layers....

    [...]

Journal ArticleDOI
TL;DR: The extent to which some data categories have been used with ML-based solutions to preserve privacy and proposed novel opportunities for ML- based solutions to leverage these data sources in the IoT ecosystem are examined.

39 citations

Journal ArticleDOI
TL;DR: In this paper, the applicability of blockchain-based self-sovereign identity (SSI) solution in healthcare, their advantages and requirements, and a model use case for demonstrating the SSI application in healthcare.

38 citations

References
More filters
Journal ArticleDOI
TL;DR: In this article, the authors present aspects related to this field to help researchers and developers to understand and distinguish the main features surrounding VANET in one solid document, without the need to go through other relevant papers and articles.

1,216 citations


"A survey on security and privacy is..." refers background in this paper

  • ...The gigantic development in the number of vehicles causes an increment in vehicle blockage on streets, expanded fatalities and mishaps [3], and expanded contamination levels....

    [...]

Journal ArticleDOI
TL;DR: This work discusses the benefits of IoV along with recent industry standards developed to promote its implementation, and presents recently proposed communication protocols to enable the seamless integration and operation of the IoV.
Abstract: Today, vehicles are increasingly being connected to the Internet of Things which enable them to provide ubiquitous access to information to drivers and passengers while on the move. However, as the number of connected vehicles keeps increasing, new requirements (such as seamless, secure, robust, scalable information exchange among vehicles, humans, and roadside infrastructures) of vehicular networks are emerging. In this context, the original concept of vehicular ad-hoc networks is being transformed into a new concept called the Internet of Vehicles (IoV). We discuss the benefits of IoV along with recent industry standards developed to promote its implementation. We further present recently proposed communication protocols to enable the seamless integration and operation of the IoV. Finally, we present future research directions of IoV that require further consideration from the vehicular research community.

471 citations


"A survey on security and privacy is..." refers background in this paper

  • ...In [22], the paper reviews the benefits of IoVs, a proposed seven-layer architecture of IoV along with the protocols involved with IoVs....

    [...]

  • ...[13] [15] [26] [22] [23] [24] [12] [21] [25] [17] [19] [16]...

    [...]

Journal Article
TL;DR: Calculations are developed and examined to reduce the entire quantity of Wireless access points as well as their locations in almost any given atmosphere while with the throughput needs and the necessity to ensure every place in the area can achieve a minimum of k APs.
Abstract: More particularly, calculations are developed and examined to reduce the entire quantity of Wireless access points as well as their locations in almost any given atmosphere while with the throughput needs and the necessity to ensure every place in the area can achieve a minimum of k APs. This paper concentrates on using Wireless for interacting with and localizing the robot. We've carried out thorough studies of Wireless signal propagation qualities both in indoor and outside conditions, which forms the foundation for Wireless AP deployment and communication to be able to augment how human operators communicate with this atmosphere, a mobile automatic platform is developed. Gas and oil refineries could be a harmful atmosphere for various reasons, including heat, toxic gasses, and unpredicted catastrophic failures. When multiple Wireless APs are close together, there's a possible for interference. A graph-coloring heuristic can be used to find out AP funnel allocation. Additionally, Wireless fingerprinting based localization is developed. All of the calculations implemented are examined in real life situations using the robot developed and answers are promising. For example, within the gas and oil industry, during inspection, maintenance, or repair of facilities inside a refinery, people might be uncovered to seriously high temps to have a long time, to toxic gasses including methane and H2S, and also to unpredicted catastrophic failures.

455 citations


"A survey on security and privacy is..." refers background in this paper

  • ...LITERATURE REVIEW In [7], the author has stated that an autonomous vehicle unit (AUV) must have security requirements such as privacy, confidentiality, integrity, distributed denial of service (DDoS) protection and authentication....

    [...]

Journal ArticleDOI
TL;DR: This article formalizes the vehicular fog computing architecture and presents a typical use case in vehicular Fog Computing, and discusses several key security and forensic challenges and potential solutions.
Abstract: Vehicular fog computing extends the fog computing paradigm to conventional vehicular networks. This allows us to support more ubiquitous vehicles, achieve better communication efficiency, and address limitations in conventional vehicular networks in terms of latency, location awareness, and real-time response (typically required in smart traffic control, driving safety applications, entertainment services, and other applications). Such requirements are particularly important in adversarial environments (e.g., urban warfare and battlefields in the Internet of Battlefield Things involving military vehicles). However, there is no one widely accepted definition for vehicular fog computing and use cases. Thus, in this article, we formalize the vehicular fog computing architecture and present a typical use case in vehicular fog computing. Then we discuss several key security and forensic challenges and potential solutions.

268 citations


"A survey on security and privacy is..." refers background in this paper

  • ...[13] [15] [26] [22] [23] [24] [12] [21] [25] [17] [19] [16]...

    [...]

  • ...In [16], this paper discusses the several key security and scientific difficulties in haze helped vehicles....

    [...]

Journal ArticleDOI
TL;DR: This work proposes an improved authentication protocol for IoV that performs better in terms of security and performance and provides a formal proof to the proposed protocol to demonstrate that the protocol is indeed secure.
Abstract: An Internet of Vehicles (IoV) allows forming a self-organized network and broadcasting messages for the vehicles on roads. However, as the data are transmitted in an insecure network, it is essential to use an authentication mechanism to protect the privacy of vehicle users. Recently, Ying et al. proposed an authentication protocol for IoV and claimed that the protocol could resist various attacks. Unfortunately, we discovered that their protocol suffered from an offline identity guessing attack, location spoofing attack, and replay attack, and consumed a considerable amount of time for authentication. To resolve these shortcomings, we propose an improved protocol. In addition, we provide a formal proof to the proposed protocol to demonstrate that our protocol is indeed secure. Compared with previous methods, the proposed protocol performs better in terms of security and performance.

240 citations


"A survey on security and privacy is..." refers background in this paper

  • ...In [24], the paper reviews the ASC protocol and points out the problems plaguing the ASC protocol such as scalability problem, security problems like location spoofing attack, offline identity guessing attack, etc....

    [...]

  • ...[13] [15] [26] [22] [23] [24] [12] [21] [25] [17] [19] [16]...

    [...]