Enhancing Security for Internet of Vehicles


Price:
Sale price$32.00

Description

Internet of Vehicles (IoV) is an emerging concept in Intelligent Transportation Systems (ITS)

to enhance the existing capabilities of VANETs by integrating with the Internet of Things

(IoT). IoV introduces the vision of smart transportation and smart cities as it gives prior

information regarding accidents, traffic, route optimization, vacant parking, better navigation,

etc. due to this, cities will be properly organized, and life-threatening risks are also minimized.

An immense amount of services and applications are being supported by IoV and can impart

voluminous crucial information to on-road drivers and travelers. Applications of IoVs can be

divided into the following broad categories: Safety-related applications, Comfort and

infotainment, Traffic efficiency and management, and Healthcare applications. IoV has

numerous key technologies, and one of them is Radio-Frequency Identification Technology

(RFID) which has a plethora of applications in IoV like automatic toll collection, intelligent

parking, data dissemination, tracking the location of the vehicle, etc. which enhances the

overall performance of IoV networks.

IoV network should be robust and effective as it involves real-time critical data. Thus, its

security can't be compromised as well as the timely delivery of information is also essential.

IoV networks are exposed to various types of attacks and threats like Sybil attacks, Black Hole

attacks, Masquerading attacks, etc. IoV being a real-time sensitive network and delay intolerant

needs to be secure otherwise it may lead to hazardous situations.

As RFID technology relies on wireless communication, it is also vulnerable to various security

threats. Compromising the security of RFID impacts the security of the IoV system which may

lead to hazardous results, so RFID based IoV system must be secure from all security attacks.

Various authentication schemes are suggested by researchers to secure the RFID-based systems

but all have limitations as some focus on preventing the security attacks while few focus on

computational resources of RFID tags.

Author: Surbhi Sharma
Publisher: Ary Publisher
Published: 12/21/2022
Pages: 138
Binding Type: Paperback
Weight: 0.43lbs
Size: 9.00h x 6.00w x 0.30d
ISBN13: 9785231261208
ISBN10: 5231261203
BISAC Categories:
- History | General
- Computers | Internet | General