27 research outputs found

    Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Networks

    Get PDF
    Vehicular Ad-hoc Network (VANET) technology is the basis of Intelligent Transportation System (ITS) connectivity that enables the delivery of useful information to and fro between vehicles in vehicle-to-vehicle communication mode; or between vehicle and infrastructure in vehicle-to-infrastructure mode for safety and comfort. However, due to the openness of the wireless medium used by VANET, the technology is vulnerable to security threats in both communication modes. In this study, the essential background of VANET from architectural point of view and communication types are discussed. Then, the overview of modification attack in VANET is presented. In addition, this paper thoroughly reviews the existing prevention schemes for modification attack in VANET. This review paper reveals that there is still a need for a better and more efficient preventive scheme to address the modification attack in VANET

    LEAP: A Lightweight Encryption and Authentication Protocol for In-Vehicle Communications

    Full text link
    The Controller Area Network (CAN) is considered as the de-facto standard for the in-vehicle communications due to its real-time performance and high reliability. Unfortunately, the lack of security protection on the CAN bus gives attackers the opportunity to remotely compromise a vehicle. In this paper, we propose a Lightweight Encryption and Authentication Protocol (LEAP) with low cost and high efficiency to address the security issue of the CAN bus. LEAP exploits the security-enhanced stream cipher primitive to provide encryption and authentication for the CAN messages. Compared with the state-of-the-art Message Authentication Code (MAC) based approaches, LEAP requires less memory, is 8X faster, and thwarts the most recently proposed attacks.Comment: 7 pages, 9 figures, 3 table

    Review Vehicular Ad hoc Networks Security Challenges and Future Technology

    Get PDF
    Vehicular Ad hok Networks (VANET) is an emerging technology with both a bright future and significant concerns, particularly in terms of security. This study focuses on three-part VANET security frameworks. The first gives a thorough review of the needs, difficulties, and characteristics of VANET security. In order to create a secure VANET architecture with effective party communication, certain needs should be taken into account. We provide information on current security designs as well as widely used security standard protocols. The second concentrates on a brand-new categorization of the various assaults described in the VANET literature and the remedies that go with them. The third compares a few of these options using established security standards for VANET. Then, in order to assist researchers for future usage, we call attention to many outstanding topics and technological obstacles linked to VANET securit

    Vehicular Platoon Communication: Cybersecurity Threats and Open Challenges

    Get PDF

    Survey on QoE/QoS Correlation Models for Video Streaming over Vehicular Ad-hoc Networks

    Get PDF
    Vehicular Ad-hoc Networks (VANETs) are a new emerging technology which has attracted enormous interest over the last few years. It enables vehicles to communicate with each other and with roadside infrastructures for many applications. One of the promising applications is multimedia services for traffic safety or infotainment. The video service requires a good quality to satisfy the end-user known as the Quality of Experience (QoE). Several models have been suggested in the literature to measure or predict this metric. In this paper, we present an overview of interesting researches, which propose QoE models for video streaming over VANETs. The limits and deficiencies of these models are identified, which shed light on the challenges and real problems to overcome in the future

    Autonomous Vehicles: Open-Source Technologies, Considerations, and Development

    Full text link
    Autonomous vehicles are the culmination of advances in many areas such as sensor technologies, artificial intelligence (AI), networking, and more. This paper will introduce the reader to the technologies that build autonomous vehicles. It will focus on open-source tools and libraries for autonomous vehicle development, making it cheaper and easier for developers and researchers to participate in the field. The topics covered are as follows. First, we will discuss the sensors used in autonomous vehicles and summarize their performance in different environments, costs, and unique features. Then we will cover Simultaneous Localization and Mapping (SLAM) and algorithms for each modality. Third, we will review popular open-source driving simulators, a cost-effective way to train machine learning models and test vehicle software performance. We will then highlight embedded operating systems and the security and development considerations when choosing one. After that, we will discuss Vehicle-to-Vehicle (V2V) and Internet-of-Vehicle (IoV) communication, which are areas that fuse networking technologies with autonomous vehicles to extend their functionality. We will then review the five levels of vehicle automation, commercial and open-source Advanced Driving Assistance Systems, and their features. Finally, we will touch on the major manufacturing and software companies involved in the field, their investments, and their partnerships. These topics will give the reader an understanding of the industry, its technologies, active research, and the tools available for developers to build autonomous vehicles.Comment: 13 pages, 7 figure

    A Review of Research on Privacy Protection of Internet of Vehicles Based on Blockchain

    Get PDF
    Numerous academic and industrial fields, such as healthcare, banking, and supply chain management, are rapidly adopting and relying on blockchain technology. It has also been suggested for application in the internet of vehicles (IoV) ecosystem as a way to improve service availability and reliability. Blockchain offers decentralized, distributed and tamper-proof solutions that bring innovation to data sharing and management, but do not themselves protect privacy and data confidentiality. Therefore, solutions using blockchain technology must take user privacy concerns into account. This article reviews the proposed solutions that use blockchain technology to provide different vehicle services while overcoming the privacy leakage problem which inherently exists in blockchain and vehicle services. We analyze the key features and attributes of prior schemes and identify their contributions to provide a comprehensive and critical overview. In addition, we highlight prospective future research topics and present research problems

    A Sensory Similarities Approach to Load Disaggregation of Charging Stations in Internet of Electric Vehicles

    Get PDF
    Intelligent transportation systems (ITSs) have become popular in recent years as an essential requirement for safer and more efficient transportation systems. Internet of Electric vehicles (IoEV) as well as their hybrid forms provide an ideal means of supporting sustainability within an ITS. The control of charging/discharging of EV is still a challenge, despite the tremendous research progress to date in the field. In this paper, the use of charging station data and binary vectorization are proposed in order to provide timely insights on the dynamic behavior of charging processes. A Bag-of-Power-States model has been created for similarity measurement of charging stations within given time periods. The results of experimentations using synthetic data have shown that the proposed Bag-of-Power-States model is computationally feasible and provides useful results for optimizing the scheduling of power supply to charging stations that may be located across a wide range of distances, over the same period of time
    corecore