7 research outputs found
A survey on security and privacy issues in IoV
As an up-and-coming branch of the internet of things, internet of vehicles (IoV) is imagined to fill in as a fundamental information detecting and processing platform for astute transportation frameworks. Today, vehicles are progressively being associated with the internet of things which empower them to give pervasive access to data to drivers and travelers while moving. Be that as it may, as the quantity of associated vehicles continues expanding, new prerequisites, (for example, consistent, secure, vigorous, versatile data trade among vehicles, people, and side of the road frameworks) of vehicular systems are developing. Right now, the unique idea of vehicular specially appointed systems is being changed into another idea called the internet of vehicles (IoV). We talk about the issues faced in implementing a secure IoV architecture. We examine the various challenges in implementing security and privacy in IoV by reviewing past papers along with pointing out research gaps and possible future work and putting forth our on inferences relating to each paper
Recommended from our members
MobileTrust: Secure Knowledge Integration in VANETs
Vehicular Ad hoc NETworks (VANET) are becoming popular due to the emergence of the Internet of Things and ambient intelligence applications. In such networks, secure resource sharing functionality is accomplished by incorporating trust schemes. Current solutions adopt peer-to-peer technologies that can cover the large operational area. However, these systems fail to capture some inherent properties of VANETs, such as fast and ephemeral interaction, making robust trust evaluation of crowdsourcing challenging. In this article, we propose MobileTrust—a hybrid trust-based system for secure resource sharing in VANETs. The proposal is a breakthrough in centralized trust computing that utilizes cloud and upcoming 5G technologies to provide robust trust establishment with global scalability. The ad hoc communication is energy-efficient and protects the system against threats that are not countered by the current settings. To evaluate its performance and effectiveness, MobileTrust is modelled in the SUMO simulator and tested on the traffic features of the small-size German city of Eichstatt. Similar schemes are implemented in the same platform to provide a fair comparison. Moreover, MobileTrust is deployed on a typical embedded system platform and applied on a real smart car installation for monitoring traffic and road-state parameters of an urban application. The proposed system is developed under the EU-founded THREAT-ARREST project, to provide security, privacy, and trust in an intelligent and energy-aware transportation scenario, bringing closer the vision of sustainable circular economy
Digital Twins and Blockchain for IoT Management
Security and privacy are primary concerns in IoT management. Security
breaches in IoT resources, such as smart sensors, can leak sensitive data and
compromise the privacy of individuals. Effective IoT management requires a
comprehensive approach to prioritize access security and data privacy
protection. Digital twins create virtual representations of IoT resources.
Blockchain adds decentralization, transparency, and reliability to IoT systems.
This research integrates digital twins and blockchain to manage access to IoT
data streaming. Digital twins are used to encapsulate data access and view
configurations. Access is enabled on digital twins, not on IoT resources
directly. Trust structures programmed as smart contracts are the ones that
manage access to digital twins. Consequently, IoT resources are not exposed to
third parties, and access security breaches can be prevented. Blockchain has
been used to validate digital twins and store their configuration. The research
presented in this paper enables multitenant access and customization of data
streaming views and abstracts the complexity of data access management. This
approach provides access and configuration security and data privacy
protection.Comment: Reference: Mayra, Samaniego and Ralph, Deters. 2023. Digital Twins
and Blockchain for IoT Management. In The 5th ACM International Symposium on
Blockchain and Secure Critical Infrastructure (BSCI '23), July 10-14, 2023,
Melbourne, VIC, Australia. ACM, New York, NY, USA, 11 pages.
https://doi.org/10.1145/3594556.359461
Towards Cyber Security for Low-Carbon Transportation: Overview, Challenges and Future Directions
In recent years, low-carbon transportation has become an indispensable part
as sustainable development strategies of various countries, and plays a very
important responsibility in promoting low-carbon cities. However, the security
of low-carbon transportation has been threatened from various ways. For
example, denial of service attacks pose a great threat to the electric vehicles
and vehicle-to-grid networks. To minimize these threats, several methods have
been proposed to defense against them. Yet, these methods are only for certain
types of scenarios or attacks. Therefore, this review addresses security aspect
from holistic view, provides the overview, challenges and future directions of
cyber security technologies in low-carbon transportation. Firstly, based on the
concept and importance of low-carbon transportation, this review positions the
low-carbon transportation services. Then, with the perspective of network
architecture and communication mode, this review classifies its typical attack
risks. The corresponding defense technologies and relevant security suggestions
are further reviewed from perspective of data security, network management
security and network application security. Finally, in view of the long term
development of low-carbon transportation, future research directions have been
concerned.Comment: 34 pages, 6 figures, accepted by journal Renewable and Sustainable
Energy Review
Recommended from our members
MobileTrust: Secure Knowledge Integration in VANETs
Vehicular Ad hoc NETworks (VANET) are becoming popular due to the emergence of the Internet of
Things and ambient intelligence applications. In such networks, secure resource sharing functionality is
accomplished by incorporating trust schemes. Current solutions adopt peer-to-peer technologies that can
cover the large operational area. However, these systems fail to capture some inherent properties of
VANETs, such as fast and ephemeral interaction, making robust trust evaluation of crowdsourcing
challenging. In this article, we propose MobileTrust – a hybrid trust-based system for secure resource
sharing in VANETs. The proposal is a breakthrough in centralized trust computing that utilizes cloud and
upcoming 5G technologies in order to provide robust trust establishment with global scalability. The ad hoc
communication is energy-efficient and protects the system against threats that are not countered by the
current settings. To evaluate its performance and effectiveness, MobileTrust is modelled in the SUMO
simulator and tested on the traffic features of the small-size German city of Eichstatt. Similar schemes are
implemented in the same platform in order to provide a fair comparison. Moreover, MobileTrust is deployed
on a typical embedded system platform and applied on a real smart car installation for monitoring traffic and
road-state parameters of an urban application. The proposed system is developed under the EU-founded
THREAT-ARREST project, to provide security, privacy, and trust in an intelligent and energy-aware
transportation scenario, bringing closer the vision of sustainable circular economy
Cyber-storms come from clouds:Security of cloud computing in the IoT era
The Internet of Things (IoT) is rapidly changing our society to a world where every “thing” is connected to the Internet, making computing pervasive like never before. This tsunami of connectivity and data collection relies more and more on the Cloud, where data analytics and intelligence actually reside. Cloud computing has indeed revolutionized the way computational resources and services can be used and accessed, implementing the concept of utility computing whose advantages are undeniable for every business. However, despite the benefits in terms of flexibility, economic savings, and support of new services, its widespread adoption is hindered by the security issues arising with its usage. From a security perspective, the technological revolution introduced by IoT and Cloud computing can represent a disaster, as each object might become inherently remotely hackable and, as a consequence, controllable by malicious actors. While the literature mostly focuses on the security of IoT and Cloud computing as separate entities, in this article we provide an up-to-date and well-structured survey of the security issues of cloud computing in the IoT era. We give a clear picture of where security issues occur and what their potential impact is. As a result, we claim that it is not enough to secure IoT devices, as cyber-storms come from Clouds
A privacy-preserving sensory data sharing scheme in Internet of Vehicles
Internet of Vehicles (IoV), which enables information gathering and disseminating among vehicles, roadside infrastructures and surrounding environments, has received considerable attention recently. However, the flourishing of IoV still faces several challenges in terms of location privacy preservation, vehicular sensory data collection and vehicular sensory data acquisition. Aiming at these challenges, in this paper, we propose a novel efficient and location privacy-preserving data sharing scheme with collusion resistance in IoV, which enables the collection and distribution of the data captured by vehicular sensors. During the vehicular sensory data collection phase, each vehicle structures the multi-dimensional sensory data captured at different locations and exploits the modified Paillier Cryptosystem to achieve the location privacy-preserving sensory data aggregation, while the data aggregation result of multiple vehicles can be recovered by the trusted central entity. During the vehicular sensory data acquisition phase, the proposed scheme exploits the proxy re-encryption technique to achieve the location privacy-preserving data querying at the network edge, i.e., the vehicles query the RSU instead of the trusted central entity. Numerical analysis are performed to validate the effectiveness of the proposed scheme, i.e., low data querying failure probability. Security analysis and performance evaluations are also carried out to validate the security properties and show the computation and communication efficiency of the proposed scheme.EDB (Economic Devt. Board, S’pore