Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of Vehicles (IoV)
Citations
440 citations
Cites background or methods from "Trust-IoV: A Trustworthy Forensic I..."
...vehicles via the V2V and V2I interface [47]....
[...]
...Since RSUs are usually left unattended, a potential attacker might try to tamper with the RSUs and disable the forensics support [47]....
[...]
...This could significantly slow down the investigation, unless the RSUs are embedded with tamper-resistant packaging to protect them from the anti-forensics techniques [47]....
[...]
...a malicious smartphone app could attack a smart vehicle or a roadsite unit (RSU) via the vehicle-to-consumer electronics (V2CE) interface [47]....
[...]
...as [47], [142], [143] presented blockchain-based forensic applications for connected vehicles (see Section Mobility Forensics Frameworks)....
[...]
232 citations
Cites methods from "Trust-IoV: A Trustworthy Forensic I..."
...To address the forensics related challenges, the study [45] has proposed a trustworthy investigation framework called Trust-IoV for the Internet of Vehicles systems....
[...]
67 citations
64 citations
64 citations
Cites background from "Trust-IoV: A Trustworthy Forensic I..."
...[17] proposed a trust model for collecting evidence from IoV infrastructures, store them in vehicles tamper-proof devices, and then start intervehicle trust-based communication....
[...]
References
9,593 citations
1,866 citations
1,463 citations
1,216 citations
1,132 citations