27 research outputs found
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Networks
Vehicular Ad-hoc Network (VANET) technology is the basis of Intelligent Transportation System (ITS) connectivity that enables the delivery of useful information to and fro between vehicles in vehicle-to-vehicle communication mode; or between vehicle and infrastructure in vehicle-to-infrastructure mode for safety and comfort. However, due to the openness of the wireless medium used by VANET, the technology is vulnerable to security threats in both communication modes. In this study, the essential background of VANET from architectural point of view and communication types are discussed. Then, the overview of modification attack in VANET is presented. In addition, this paper thoroughly reviews the existing prevention schemes for modification attack in VANET. This review paper reveals that there is still a need for a better and more efficient preventive scheme to address the modification attack in VANET
LEAP: A Lightweight Encryption and Authentication Protocol for In-Vehicle Communications
The Controller Area Network (CAN) is considered as the de-facto standard for
the in-vehicle communications due to its real-time performance and high
reliability. Unfortunately, the lack of security protection on the CAN bus
gives attackers the opportunity to remotely compromise a vehicle. In this
paper, we propose a Lightweight Encryption and Authentication Protocol (LEAP)
with low cost and high efficiency to address the security issue of the CAN bus.
LEAP exploits the security-enhanced stream cipher primitive to provide
encryption and authentication for the CAN messages. Compared with the
state-of-the-art Message Authentication Code (MAC) based approaches, LEAP
requires less memory, is 8X faster, and thwarts the most recently proposed
attacks.Comment: 7 pages, 9 figures, 3 table
Review Vehicular Ad hoc Networks Security Challenges and Future Technology
Vehicular Ad hok Networks (VANET) is an emerging technology with both a bright future and significant concerns, particularly in terms of security. This study focuses on three-part VANET security frameworks. The first gives a thorough review of the needs, difficulties, and characteristics of VANET security. In order to create a secure VANET architecture with effective party communication, certain needs should be taken into account. We provide information on current security designs as well as widely used security standard protocols. The second concentrates on a brand-new categorization of the various assaults described in the VANET literature and the remedies that go with them. The third compares a few of these options using established security standards for VANET. Then, in order to assist researchers for future usage, we call attention to many outstanding topics and technological obstacles linked to VANET securit
Survey on QoE/QoS Correlation Models for Video Streaming over Vehicular Ad-hoc Networks
Vehicular Ad-hoc Networks (VANETs) are a new emerging technology which has attracted enormous interest over the last few years. It enables vehicles to communicate with each other and with roadside infrastructures for many applications. One of the promising applications is multimedia services for traffic safety or infotainment. The video service requires a good quality to satisfy the end-user known as the Quality of Experience (QoE). Several models have been suggested in the literature to measure or predict this metric. In this paper, we present an overview of interesting researches, which propose QoE models for video streaming over VANETs. The limits and deficiencies of these models are identified, which shed light on the challenges and real problems to overcome in the future
Autonomous Vehicles: Open-Source Technologies, Considerations, and Development
Autonomous vehicles are the culmination of advances in many areas such as
sensor technologies, artificial intelligence (AI), networking, and more. This
paper will introduce the reader to the technologies that build autonomous
vehicles. It will focus on open-source tools and libraries for autonomous
vehicle development, making it cheaper and easier for developers and
researchers to participate in the field. The topics covered are as follows.
First, we will discuss the sensors used in autonomous vehicles and summarize
their performance in different environments, costs, and unique features. Then
we will cover Simultaneous Localization and Mapping (SLAM) and algorithms for
each modality. Third, we will review popular open-source driving simulators, a
cost-effective way to train machine learning models and test vehicle software
performance. We will then highlight embedded operating systems and the security
and development considerations when choosing one. After that, we will discuss
Vehicle-to-Vehicle (V2V) and Internet-of-Vehicle (IoV) communication, which are
areas that fuse networking technologies with autonomous vehicles to extend
their functionality. We will then review the five levels of vehicle automation,
commercial and open-source Advanced Driving Assistance Systems, and their
features. Finally, we will touch on the major manufacturing and software
companies involved in the field, their investments, and their partnerships.
These topics will give the reader an understanding of the industry, its
technologies, active research, and the tools available for developers to build
autonomous vehicles.Comment: 13 pages, 7 figure
A Review of Research on Privacy Protection of Internet of Vehicles Based on Blockchain
Numerous academic and industrial fields, such as healthcare, banking, and supply chain management, are rapidly adopting and relying on blockchain technology. It has also been suggested for application in the internet of vehicles (IoV) ecosystem as a way to improve service availability and reliability. Blockchain offers decentralized, distributed and tamper-proof solutions that bring innovation to data sharing and management, but do not themselves protect privacy and data confidentiality. Therefore, solutions using blockchain technology must take user privacy concerns into account. This article reviews the proposed solutions that use blockchain technology to provide different vehicle services while overcoming the privacy leakage problem which inherently exists in blockchain and vehicle services. We analyze the key features and attributes of prior schemes and identify their contributions to provide a comprehensive and critical overview. In addition, we highlight prospective future research topics and present research problems
A Sensory Similarities Approach to Load Disaggregation of Charging Stations in Internet of Electric Vehicles
Intelligent transportation systems (ITSs) have become popular in recent years as an essential requirement for safer and more efficient transportation systems. Internet of Electric vehicles (IoEV) as well as their hybrid forms provide an ideal means of supporting sustainability within an ITS. The control of charging/discharging of EV is still a challenge, despite the tremendous research progress to date in the field. In this paper, the use of charging station data and binary vectorization are proposed in order to provide timely insights on the dynamic behavior of charging processes. A Bag-of-Power-States model has been created for similarity measurement of charging stations within given time periods. The results of experimentations using synthetic data have shown that the proposed Bag-of-Power-States model is computationally feasible and provides useful results for optimizing the scheduling of power supply to charging stations that may be located across a wide range of distances, over the same period of time