《当信任遇上车联网:机遇、挑战与未来展望》

A. Mahmood, Quan Z. Sheng, S. A. Siddiqui, S. Sagar, Wei Emma Zhang, Hajime Suzuki, Wei Ni
{"title":"《当信任遇上车联网:机遇、挑战与未来展望》","authors":"A. Mahmood, Quan Z. Sheng, S. A. Siddiqui, S. Sagar, Wei Emma Zhang, Hajime Suzuki, Wei Ni","doi":"10.1109/CIC52973.2021.00018","DOIUrl":null,"url":null,"abstract":"Recent technological breakthroughs in vehicular ad hoc networks and the Internet of Things (IoT) have transformed vehicles into smart objects thus paving the way for the evolution of the promising paradigm of the Internet of Vehicles (IoV), which is an integral constituent of the modern intelligent transportation systems. Simply put, IoV attributes to the IoT-on-wheels, wherein vehicles broadcast safety-critical information among one another (and their immediate ambiences) for guaranteeing highly reliable and efficacious traffic flows. This, therefore, necessitates the need to fully secure an IoV network since a single malicious message is capable enough of jeopardizing the safety of the nearby vehicles (and their respective passengers) and vulnerable pedestrians. It is also pertinent to mention that a malicious attacker, i.e., vehicle, is not only able to send counterfeited safety-critical messages to its nearby vehicles and the traffic management authorities but could further enable a compromised vehicle to broadcast both spoofed coordinates and speed-related information. It is, therefore, of the utmost importance that malicious entities and their messages be identified and subsequently eliminated from the network before they are able to manipulate the entire network for their malicious gains. This paper, therefore, delineates on the convergence of the notion of trust with the IoV primarily in terms of its underlying rationale. It further highlights the opportunities which transpire as a result of this convergence to secure an IoV network. Finally, open research challenges, together with the recommendations for addressing the same, have been discussed.","PeriodicalId":170121,"journal":{"name":"2021 IEEE 7th International Conference on Collaboration and Internet Computing (CIC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"When Trust Meets the Internet of Vehicles: Opportunities, Challenges, and Future Prospects\",\"authors\":\"A. Mahmood, Quan Z. Sheng, S. A. Siddiqui, S. Sagar, Wei Emma Zhang, Hajime Suzuki, Wei Ni\",\"doi\":\"10.1109/CIC52973.2021.00018\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recent technological breakthroughs in vehicular ad hoc networks and the Internet of Things (IoT) have transformed vehicles into smart objects thus paving the way for the evolution of the promising paradigm of the Internet of Vehicles (IoV), which is an integral constituent of the modern intelligent transportation systems. Simply put, IoV attributes to the IoT-on-wheels, wherein vehicles broadcast safety-critical information among one another (and their immediate ambiences) for guaranteeing highly reliable and efficacious traffic flows. This, therefore, necessitates the need to fully secure an IoV network since a single malicious message is capable enough of jeopardizing the safety of the nearby vehicles (and their respective passengers) and vulnerable pedestrians. It is also pertinent to mention that a malicious attacker, i.e., vehicle, is not only able to send counterfeited safety-critical messages to its nearby vehicles and the traffic management authorities but could further enable a compromised vehicle to broadcast both spoofed coordinates and speed-related information. It is, therefore, of the utmost importance that malicious entities and their messages be identified and subsequently eliminated from the network before they are able to manipulate the entire network for their malicious gains. This paper, therefore, delineates on the convergence of the notion of trust with the IoV primarily in terms of its underlying rationale. It further highlights the opportunities which transpire as a result of this convergence to secure an IoV network. Finally, open research challenges, together with the recommendations for addressing the same, have been discussed.\",\"PeriodicalId\":170121,\"journal\":{\"name\":\"2021 IEEE 7th International Conference on Collaboration and Internet Computing (CIC)\",\"volume\":\"37 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE 7th International Conference on Collaboration and Internet Computing (CIC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CIC52973.2021.00018\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE 7th International Conference on Collaboration and Internet Computing (CIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIC52973.2021.00018","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12

摘要

车辆自组织网络和物联网(IoT)的最新技术突破已将车辆转变为智能对象,从而为有前途的车联网(IoV)范式的发展铺平了道路,这是现代智能交通系统的一个组成部分。简而言之,物联网属于车轮上的物联网,其中车辆之间(及其周围环境)广播安全关键信息,以保证高度可靠和有效的交通流量。因此,由于单个恶意信息足以危及附近车辆(及其乘客)和脆弱行人的安全,因此有必要完全保护车联网网络。值得一提的是,恶意攻击者(即车辆)不仅能够向附近的车辆和交通管理部门发送伪造的安全关键信息,而且还可以进一步使受感染的车辆广播欺骗的坐标和速度相关信息。因此,在恶意实体能够操纵整个网络以获取恶意收益之前,识别并随后从网络中消除恶意实体及其消息是至关重要的。因此,本文主要从其基本原理方面描述了信任概念与IoV的趋同。它进一步强调了由于这种融合而产生的机会,以确保物联网网络的安全。最后,讨论了开放的研究挑战,以及解决这些挑战的建议。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
When Trust Meets the Internet of Vehicles: Opportunities, Challenges, and Future Prospects
Recent technological breakthroughs in vehicular ad hoc networks and the Internet of Things (IoT) have transformed vehicles into smart objects thus paving the way for the evolution of the promising paradigm of the Internet of Vehicles (IoV), which is an integral constituent of the modern intelligent transportation systems. Simply put, IoV attributes to the IoT-on-wheels, wherein vehicles broadcast safety-critical information among one another (and their immediate ambiences) for guaranteeing highly reliable and efficacious traffic flows. This, therefore, necessitates the need to fully secure an IoV network since a single malicious message is capable enough of jeopardizing the safety of the nearby vehicles (and their respective passengers) and vulnerable pedestrians. It is also pertinent to mention that a malicious attacker, i.e., vehicle, is not only able to send counterfeited safety-critical messages to its nearby vehicles and the traffic management authorities but could further enable a compromised vehicle to broadcast both spoofed coordinates and speed-related information. It is, therefore, of the utmost importance that malicious entities and their messages be identified and subsequently eliminated from the network before they are able to manipulate the entire network for their malicious gains. This paper, therefore, delineates on the convergence of the notion of trust with the IoV primarily in terms of its underlying rationale. It further highlights the opportunities which transpire as a result of this convergence to secure an IoV network. Finally, open research challenges, together with the recommendations for addressing the same, have been discussed.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Towards an Integrated Micro-services Architecture for Campus environments When Trust Meets the Internet of Vehicles: Opportunities, Challenges, and Future Prospects A Collaborative and Adaptive Feedback System for Physical Exercises 2021 IEEE 7th International Conference on Collaboration and Internet Computing CIC 2021 Cost-aware & Fault-tolerant Geo-distributed Edge Computing for Low-latency Stream Processing
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1