0% found this document useful (0 votes)
12 views9 pages

Internet of Vehicles Architecture Protocols and Security

The document discusses the Internet of Vehicles (IoV), which integrates vehicles into the Internet of Things to enhance communication and safety on the roads. It outlines the benefits of IoV, including improved traffic management and reduced accidents, and presents a new seven-layer architecture for IoV that addresses existing limitations in vehicular networks. The paper also highlights future research directions and the potential economic impact of IoV on society and the automotive industry.

Uploaded by

ankit gujaar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views9 pages

Internet of Vehicles Architecture Protocols and Security

The document discusses the Internet of Vehicles (IoV), which integrates vehicles into the Internet of Things to enhance communication and safety on the roads. It outlines the benefits of IoV, including improved traffic management and reduced accidents, and presents a new seven-layer architecture for IoV that addresses existing limitations in vehicular networks. The paper also highlights future research directions and the potential economic impact of IoV on society and the automotive industry.

Uploaded by

ankit gujaar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

IEEE INTERNET OF THINGS JOURNAL, VOL. 5, NO.

5, OCTOBER 2018 3701

Internet of Vehicles: Architecture,


Protocols, and Security
Juan Contreras-Castillo, Sherali Zeadally, and Juan Antonio Guerrero-Ibañez

Abstract—Today, vehicles are increasingly being connected to are being deployed to provide a safer and more convenient
the Internet of Things which enable them to provide ubiq- environment through their interconnection and interoperabil-
uitous access to information to drivers and passengers while ity, creating the new concept of IoT. In addition, as high speed
on the move. However, as the number of connected vehicles
keeps increasing, new requirements (such as seamless, secure, mobile Internet access becomes more affordable and ubiqui-
robust, scalable information exchange among vehicles, humans, tous, opportunities for new products and services for society
and roadside infrastructures) of vehicular networks are emerging. are emerging.
In this context, the original concept of vehicular ad-hoc networks Raymond James’ industry reported that in 2011 the number
is being transformed into a new concept called the Internet of of Internet-connected devices surpassed the number of people
Vehicles (IoV). We discuss the benefits of IoV along with recent
industry standards developed to promote its implementation. We on the planet, and it is expected to reach between 26 billion
further present recently proposed communication protocols to and 50 billion by 2020 [4]. This exponential increase in the
enable the seamless integration and operation of the IoV. Finally, number of connected devices opens the door for different types
we present future research directions of IoV that require further of machine-to-machine (M2M) communications which enable
consideration from the vehicular research community. ubiquitous connectivity among devices thereby enabling the
Index Terms—Internet of Vehicles (IoV), protocol, security, IoT paradigm. Vodafone stated that the automotive indus-
standards, vehicular ad-hoc networks (VANETs). try is one of the fastest growing sectors (with an increase
of approximately 32% and 19% for automotive and logis-
tic and transportation sectors, respectively [5]) where M2M
I. I NTRODUCTION communication is being heavily deployed.
The concept of vehicular ad-hoc networks (VANETs) was
ODAY, the transportation systems in many countries are
T increasingly being stretched to their limits as the number
of people using them keeps increasing. In many cases, these
conceived over a decade ago and has since then been a very
active area of research both in academia and industry [6]–[9].
However, as the number of vehicles connected to the IoT
transportation systems have become inefficient and costly to
increases, new requirements of VANETs (such as intervehic-
maintain or upgrade. A recent report noted that the number
ular, vehicular-infrastructure and vehicular-Internet, vehicular-
of vehicles (passenger and commercial) used worldwide is
personal devices, and intravehicular communications) are
slightly higher than one billion [1] and is expected to reach
emerging. One of the main problems of VANETs is its lim-
two billion by 2035 [2]. The rapid growth in the number of
ited capacity for processing all the information that is collected
vehicles causes an increase in traffic congestion and number
by themselves and other actors (such as sensors and mobile
of fatalities that occur due to accidents on the roads [3]. In the
devices) around the environment. In this context, vehicles
future, we anticipate substantial changes in the transportation
must evolve into “smart” objects equipped with a multisensor
system to cope with emerging requirements of new vehicles,
platform, with a set of communication technologies, robust
passengers, and drivers along with new paradigms such as
computational units, IP-based connectivity to the Internet, and
the Internet of Things (IoT), cloud computing, among others.
a direct or indirect connection to other vehicles and with all
Recent advances in computing and networking technologies
devices around the environment. In this context, the concept
have led to the development of a wide range of intelligent
of VANETs is evolving into the Internet of Vehicle (IoV).
devices often equipped with embedded processors and wire-
The basic principle of a VANET is that a vehicle is a mobile
less communication technologies. These intelligent devices
node that enables it to connect to other vehicles thereby cre-
ating a network. Vehicles are connected or disconnected as
Manuscript received October 1, 2016; revised December 23, 2016; accepted they fall inside or outside of the coverage range. However,
December 30, 2016. Date of publication April 4, 2017; date of current ver-
sion November 14, 2018. The work of S. Zeadally was supported by the we consider a VANET to be a conditioned network with
University Research Professorship Award from the University of Kentucky in mobility constraints, affected by the number of connected
2016. (Corresponding author: Sherali Zeadally.) vehicles, and several factors such as traffic jams, tall build-
J. Contreras-Castillo and J. A. Guerrero-Ibañez are with the School
of Telematics, University of Colima, Colima 28040, Mexico (e-mail: ings, and bad driver behaviors which affect its performance
juancont@ucol.mx; antonio_guerrero@ucol.mx). and use.
S. Zeadally is with the College of Communication and Information, VANETs lack the processing capacity for handling global
University of Kentucky. Lexington, KY 40506 USA (e-mail:
szeadally@uky.edu). information. VANETs does not have the capacity to analyze,
Digital Object Identifier 10.1109/JIOT.2017.2690902 process, and evaluate the global information that is collected
2327-4662 c 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: AMRITA VISHWA VIDYAPEETHAM AMRITA SCHOOL OF ENGINEERING. Downloaded on May 16,2024 at 16:43:41 UTC from IEEE Xplore. Restrictions apply.
3702 IEEE INTERNET OF THINGS JOURNAL, VOL. 5, NO. 5, OCTOBER 2018

from the different vehicles that are part of the network. for supporting different functions (such as intelligent traffic
However, VANETs are well suited for short term applica- management, dynamic information services, intelligent vehicle
tions or for small scale services such as collision prevention control, among others) [12]. IoV is composed of three funda-
or road hazard control notifications services. In contrast, IoV mental components: 1) the intervehicular network; 2) intrave-
integrates two technological visions: 1) vehicle’s networking hicular network; and 3) vehicular mobile Internet. IoV allows
and 2) vehicle’s intelligence [10] and focuses on the integra- vehicles to be permanently connected to the Internet, forming
tion of objects such as humans, vehicles, things, networks, an interconnected set of vehicles that can provide informa-
and environments to create an intelligent network based on tion for different services such as traffic management, road
computing and communication capabilities that supports ser- safety, and infotainment [13]. IoV enables the exchange of
vices (such as global traffic efficiency and management service information among vehicles, road infrastructures, passengers,
based on pollution levels, road conditions, congestion traf- drivers, sensors and electric actuators, and the Internet using
fic level, or vehicular safety services) for large cities or even communication protocols and standards such as IEEE 802.11p,
a whole country. directional medium access control (DMAC), vehicular coop-
By using intelligent systems on vehicles and different erative media access control (VC-MAC), ad hoc on demand
cyber-physical systems (such as sensors, vehicles, and mobile distance vector, dynamic source routing, general packet radio
devices) in cities we can develop a global network that pro- services, and others [14]. IoV differs from ITS because it puts
vides different services to vehicles and the humans associated more emphasis on information interaction among vehicles,
with them. IoV also refers to vehicles, humans, components human, and the surrounding road infrastructures.
of the transportation infrastructure, and a set of devices allo- Every year, approximately 1.3 million people die and more
cated in the environment, connected through an all IP-based than 7 million people are injured in around 8 million traffic
infrastructure, that exchange information directly or indirectly accidents. People waste more than 90 billion hours because of
to contribute toward a more efficient, safer, and greener world traffic problems (accidents and traffic jams), causing a loss of
of transportation [11]. 2% of the global gross domestic product and vehicular travel
The main contributions of this paper include: first, we generates 220 million metric tons of carbon equivalent [15].
describe and discuss how IoV can help to achieve a sustain- The cost of personal transportation in cars (not including pub-
able intelligent transportation system and bring considerable lic or commercial vehicles) is about $3 trillion per year in
benefits to drivers and passengers, society, service providers the United States and 40% of this cost is related to crashes,
and auto manufacturers; second, we propose a new seven- parking, roads, traffic services, and pollution [16].
layered IoV model that addresses some of the deficiencies and The IoV concept opens up many new opportunities and
drawbacks of previously proposed IoV models; and finally, we applications and offers various benefits to drivers, society, and
identify future challenges that must be addressed in order to businesses. Cisco IBSG Automotive and Economics practices
achieve a scalable, robust, secure, and fully operational IoV indicate that IoV will help provide $1400 U.S. in benefits per
environment. vehicle, per year [17]. These include the following.
The remainder of this paper is organized as follows. 1) Vehicle User: It is estimated that the saving will be
Section II describes the concept of the IoV. We present the around $550 U.S. based on lower insurance rates, lower oper-
current architecture or architectures being proposed for IoV in ation costs and less time spent in traffic which increases
Section III. Section IV focuses on message exchange proto- productivity due to reduced traffic congestion by recogniz-
cols for IoV. Section V discusses how security solutions can ing and anticipating risk and dynamically calculating optimal
be deployed to address some of the security and privacy chal- routes.
lenges in IoV. Section VI presents some of the future research 2) Society: Societal benefits could be around $420 U.S. that
challenges for IoV. We make some concluding remarks in could be obtained through lower traffic road operational costs,
Section VII. a decrease in the number of crashes and better control of con-
gestion through traffic management and optimization of road
networks and reduced CO2 emissions.
II. B ENEFITS OF I OV S 3) IoV Service Providers: They could save around $160 U.S.
Recent technological advances and ease of access to mobile through traffic guidance, navigation, emergency services, and
Internet have transformed the car into “the new mobile device” location-based services.
enabling people in these vehicles to become “connected occu- 4) Auto (Original Equipment Manufacturers/Original
pants.” When vehicles and occupants are connected, they Equipment Suppliers): They could save around $300 U.S.
access, consume, create, enrich, and share a lot of digital through lower service/warranty costs and new profit pools
information among businesses, people, organizations, infras- amortized over eight years [18].
tructure, and other cars leading to the emerging concept In 2015, the National Highway Traffic Safety released the
of IoVs. results of a study which showed that the United States spend
The IoVs might be defined as a platform that enables the more than $836 billion on crashes, insurance premiums, and
exchange of information between the car and its surroundings traffic law enforcement accounts [19]. Another report released
through different communication media. As a result of the in 2014 by Seattle-based INRIX and the Centre for Economics
integration of the IoT technology with intelligent transporta- and Business Research revealed that traffic congestions cost
tion systems (ITSs), IoV will create an integrated network Americans $124 billion in direct and indirect losses, and this

Authorized licensed use limited to: AMRITA VISHWA VIDYAPEETHAM AMRITA SCHOOL OF ENGINEERING. Downloaded on May 16,2024 at 16:43:41 UTC from IEEE Xplore. Restrictions apply.
CONTRERAS-CASTILLO et al.: IoV: ARCHITECTURE, PROTOCOLS, AND SECURITY 3703

number is expected to increase to $186 billion in 2030 [20].


Increasing road safety and reducing traffic congestion can yield
major benefits for public health expenditure because if the
number of road accidents reduces then related public health
costs will also be reduced. If drivers spend less time in traf-
fic jams and vehicles are connected all time, real-time traffic
solutions will contribute to increased productivity. Mai market
research shows that IoV might create a total of 400 000 new
jobs in the U.S. [21].
Finally, IoV will create a whole new set of service providers
which will develop new services such as parking spot loca-
tor services, real-time traffic information, and location-based
services that create immediate value not only for drivers but
also for businesses in terms of future services they can sell to
their customers. The European Union estimates that the global
market size for IoV components will be 115.26 billion Euros
by 2020 [22]. Fig. 1. Proposed seven-layer IoV architecture based on [24]–[26].

III. A RCHITECTURE OF I OV proposed a service-based architecture based on the service


Based on the interaction of different technologies in the oriented architecture and the event-driven architecture. V2B
IoV environment, researchers have identified a three-level integration architecture specifies two dedicated components:
architecture [23], [24]. The first level contains all the sensors 1) the vehicle integration platform as a back-end system
within the vehicle that gather environmental data and detect that enables efficient information exchange between vehicles
specific events of interest such as driving patterns and vehicle and enterprise applications and 2) the back-end integration
situations, environmental conditions, among others. manager that connects in-vehicle components [26].
The second level is the communication layer which supports After we analyzed the proposed IoV layered architec-
different wireless communication modes such as vehicle- tures in [24]–[26], we identified the following weaknesses:
to-vehicle (V2V), vehicle-to-infrastructure (V2I), vehicle-to- 1) the previous IoV models proposed do not consider security
pedestrian, and vehicle-to-sensor. The communication layer (authentication, authorization, accounting, and trust relations);
ensures seamless connectivity to existing and emerging net- 2) they do not provide a layer to integrate the communica-
works (such as GSM, Wi-Fi, LTE, Bluetooth, 802.15.4, among tion intelligence (selection of the best network for information
others). transmission/dissemination or accessing a service); 3) in these
The third layer includes statistics tools, support for storage, models the interaction with drivers and passengers is limited
and processing infrastructure which constitutes IoV intelli- to providing notifications through the different car devices;
gence and provides mobile cars with big data-based processing 4) additionally, all the collected information is transmitted
(i.e., accessing computing resources, content searching, spec- without preprocessing, which could lead to network con-
trum sharing, etc.) and is responsible for storage, analysis, gestions he number of vehicles increases. To address these
processing, and decision making about different risk situa- weaknesses, we propose a new seven-layered model archi-
tions (such as traffic congestion, dangerous road conditions, tecture for IoV that allows a transparent interconnection of
among others). The goal is to be able to make unified deci- all the network components and dissemination of data into
sion based on the fusion of information obtained from different an IoV environment. In this seven-layer architecture, we pro-
systems and technologies (big data, wireless sensor network, vide a security layer to manage authentication, authorization,
cloud computing, etc.). and accounting of all the transactions among the different IoV
CISCO has proposed an IoV architecture based on four entities. The IoV model supports a user-vehicle interface to
layers [25]. The end points layer covers the vehicles, software, manage the interactions between the vehicle and the driver.
and the V2V communication through 802.11p. The infras- We also have a communication interface which selects the
tructure layer defines all technologies that allow connections optimal network to transmit. For example, if we are going to
between all actors of IoV. The operation layer monitors the use a Wi-Fi network, it selects the best service provider based
policy enforcement and the flow-based management. Finally, on several factors, such as the requirements of the commu-
the service layer specifies the services that the different types nication, the vehicle profile and quality of the network, and
of cloud (public cloud, private cloud, and enterprise cloud) transaction cost, among others to maintain the quality of the
offer to drivers based on subscription, data center, or on- communication. Fig. 1 shows the proposed architecture.
demand. IoV allows vehicles and drivers to be connected to the User Vehicle Interface Layer: This layer provides direct
Internet, and therefore, enables them to have access to a broad interaction with the driver through a management interface
range of service providers. This access will facilitate commer- to coordinate all driver notifications and select the best dis-
cial business services’ integration with vehicles hence creating play element for the current situation or event to help reduce
the vehicle-to-business (V2B) communication. SAP research driver’s distractions. For example, if there is a collision risk

Authorized licensed use limited to: AMRITA VISHWA VIDYAPEETHAM AMRITA SCHOOL OF ENGINEERING. Downloaded on May 16,2024 at 16:43:41 UTC from IEEE Xplore. Restrictions apply.
3704 IEEE INTERNET OF THINGS JOURNAL, VOL. 5, NO. 5, OCTOBER 2018

with a vehicle ahead, a set of lights on the car’s dashboard


can activate while a sound is emitted to alert the driver.
Data Acquisition Layer: This layer collects data from
various sources (vehicle internal sensors and the naviga-
tion system, data collected from intervehicle communication,
data from sensors, traffic lights, and signals among others)
located on the roads.
Data Filtering and Preprocessing Layer: This layer ana-
lyzes the collected information to avoid the transmission
of irrelevant information and reduce the network traffic.
Transmission decisions are based on a service profile created
for the vehicle which has subscribed or active services.
Communication Layer: This layer selects the best network
to send the information by using several selection parameters Fig. 2. Communication example of the proposed seven-layered architecture.
such as congestion and QoS level in the different available
networks, information relevance, privacy and security, among
others. Based on the vehicle’s profile (service requirements) and
Control and Management Layer: This layer is responsi- the available information in the environment (such as avail-
ble for managing different network service providers that are able network access technologies, available network service
within the IoV environment. In this layer, different policies providers, QoS of each network, costs, and others) the best
(such as traffic management, traffic engineering, and packet network is selected using some intelligent algorithm (imple-
inspection) and functions are applied to better manage the mented in the communication layer). All the information
information received. transmitted through the network is managed through a set of
Processing Layer: This layer processes large amounts of mechanisms (such as policies and rules, network flow pro-
information using various types of cloud computing infras- cessing and classification, packet inspection, among others) to
tructures locally and remotely. The results of the processed maintain high efficiency for all services delivered within the
information can be used by massive data services providers to IoV environment. The preprocessed information is classified
further improve the service or to develop new applications. The (e.g., as private and business), and then sent to the most suit-
results obtained after processing can also be used by various able cloud for analyzing, processing, storing, and availability
government agencies in the development of future infrastruc- based on the information type.
tures, V2B services [27], and policies to help improve or better
manage road traffic.
Security Layer: This is a transversal layer that has direct A. Standards for Internet of Vehicles
communication with the rest of layers. It is responsible of IoV involves many participants and the connectivity must be
all security functions (such as data authentication, integrity, assured between all participants. One of the main challenging
nonrepudiation and confidentiality, access control, availabil- issues for the interconnection of vehicles is interoperability.
ity, among others) within the proposed architecture. The layer To ensure this, we need to develop standards for the IoV
is designed to support mitigating solutions for address vari- framework.
ous types security attacks (such as cyberattacks and others) International organizations and consortia such as the Internet
in IoV. Engineering Task Force, EPCglobal, Institute of Electrical
As shown in Fig. 2, when a vehicle starts its engine, it trig- and Electronics Engineers, the European Committee for
gers the initialization process to authenticate itself with the Standardization (CEN), and the European Telecommunications
IoV network and begins the environmental data acquisition Standards Institute (ETSI), led by the World Wide Web
process. This acquisition step collects all the information gen- Consortium (W3C) are investing a lot of efforts to define
erated by vehicles, humans, and roadside infrastructures (car standards and protocols for IoV.
sensors, location, pollution level sensors, traffic lights, signs, The W3C is focusing on standards for application devel-
cell phones, mobile devices, body area networks, among oth- opers which will provide more accurate access to vehicle
ers) within the mobility area of the vehicular network. The data (such as vehicle identification, acceleration and speed, tire
collected information is filtered and preprocessed to obtain the pressure, battery status, and personalization information) [28].
most relevant information to be transmitted to: 1) the driver, ETSI and CEN published the basic set of standards
using one of the interaction mechanisms such as visual, acous- requested by the European Commission to ensure interop-
tic or haptic; 2) to the network depending on the coverage, type erable communication between vehicles made by different
and sensitivity of the information; or 3) discarded to reduce manufacturers.
the load on the IoV network. Fig. 3 provides some of the most prominent proto-
For example, if a vehicle receives an accident notification, cols defined by the various international standardization
it is displayed to the driver and the notification is then broad- organizations [29]. Although almost all application layer pro-
casted. But if another vehicle receives the same information, tocols have been developed for IoT, however, they can be
without changes, then it will not rebroadcast it a second time. implemented in IoV.

Authorized licensed use limited to: AMRITA VISHWA VIDYAPEETHAM AMRITA SCHOOL OF ENGINEERING. Downloaded on May 16,2024 at 16:43:41 UTC from IEEE Xplore. Restrictions apply.
CONTRERAS-CASTILLO et al.: IoV: ARCHITECTURE, PROTOCOLS, AND SECURITY 3705

TABLE I
I OV P ROJECTS : G OALS AND ACHIEVEMENTS

Fig. 3. Standards for IoV [29].

B. Recent Projects and Solutions on the Market for IoV


To address several of the challenges related to IoV, various
projects (as shown in Table I) are undertaken by academia,
industry, and government recently.
Finally, there are also some recent market develop-
ments regarding the IoV. The IoV market is classi-
fied in two service categories. The first category is
on-board diagnostic which is a service based on the
information that is collected inside the car. Companies
such as Metromile (http://www.metromile.com), Automile
(http://www.automile.com), and Zubie (http://www.zubie.com)
deliver vehicle’s data such as trip information, fuel consump-
tion, car diagnostics, tracking, among other information.
The second category is a service based on environmen-
tal sensors that collect data from the environment of the car
and provides information to the driver about traffic condi-
tions, parking services, and so on. In this context, INRIX
(http://www.inrix.com) offers dynamic data services to assist
drivers. These services provide up-to-date, accurate real-time
traffic, parking information, road hazards, fuel and weather
conditions, and a range of cloud-based services for the
demanding automotive industry. One of the cruise companies
(http://www.getcruise.com) sells a device (mounted on top of
a car) that monitors the road. The device uses a computer, and
switch to auto-pilot mode thereby turning modern Chevrolet
bolt EVs into autonomous vehicle with sensors, radars, and
actuators collecting and processing data to make real-time
decisions based on current traffic conditions.

IV. P ROTOCOLS IN I OV
are caused by the movements of vehicles must be considered.
Intervehicular communication protocols in VANETs play
Some recent efforts have focused on the use of infrared and
an essential role in IoV as they enable different levels of
radio waves for vehicle-vehicle communications because they
interaction among vehicles, humans, and roadside units. They
offer line-of-sight and broadcast communications. Dedicated
can provide alternate routes efficiently and quickly if a prob-
short range communication, also known as IEEE 802.11p wire-
lem arises with the current route. However, IoV extends
less access in vehicular environments (WAVE), is based on
beyond VANETs (as we mentioned earlier) and places more
IEEE 1609 standards and describes techniques and interface
emphasis on information exchange among vehicles, human,
processes controlled by the MAC layer for public safety and
and the surrounding road infrastructures. Next, we briefly
private applications [30]. The frequency band is divided into
present basic VANET communication protocols that can be
six service channels that are used for different application
applied to IoV.
types (frequency range 5.855–5.875 MHz for ITS nonsafety
applications and frequency range 5.875–5.905 MHz for safety
A. Physical Layer Protocols and traffic efficiency applications) and one control channel.
When a protocol for physical layer is designed some fac- The main idea of IEEE 802.11p WAVE protocol is to integrate
tors such as multipath fading and Doppler frequency shifts that PHY and MAC layers of the IEEE 802.11 wireless standards

Authorized licensed use limited to: AMRITA VISHWA VIDYAPEETHAM AMRITA SCHOOL OF ENGINEERING. Downloaded on May 16,2024 at 16:43:41 UTC from IEEE Xplore. Restrictions apply.
3706 IEEE INTERNET OF THINGS JOURNAL, VOL. 5, NO. 5, OCTOBER 2018

in [40]–[44]. However, in IoV, vehicles could have dynamic


behavior where the routing tables may contain inconsistent
information which makes it difficult to find and maintain
routes which in turn require an accurate vehicle’s position to
determine the type of services that can be offered.
Delay-based routing protocols are classified into two cate-
gories: 1) delay sensitive protocols which need to exchange
data as soon as possible and 2) delay-tolerant protocols which
manage connection failures occurrences using a carry and for-
ward mechanism [45]–[47]. However, some challenges need
to be solved: 1) delay-tolerant protocols to need to maintain
substantial network coverage while limiting network trans-
missions and 2) delay-sensitive protocols need to reduce the
Fig. 4. VANETs Routing protocols taxonomy adapted from [35]. probability of congestion of routing paths and maintain a high
delivery ratio with low latency.
Target networks routing protocols refer to the type access
to allow data exchange among vehicles and roadside devices technology that vehicles can use. In this context, traditional
in the 5.9 GHz band [31]. routing protocols in VANETs focus on scenarios in which all
packets are transmitted over short distances using the same
B. MAC Layer Protocols wireless technology [48]–[54]. However, given that the het-
MAC protocols for IoV should support different types of erogeneous nature of IoV will include different radio access
applications with different requirements for QoS (such as low technologies, one of the main challenges is handoff which
delay or failure rates). MAC protocols need to solve several involves real-time switching of access technologies based on:
problems such as hidden station problem or the shared band- network performance, connection availability, packet delay, or
width among the communicating vehicles. Some protocols pricing, while maintaining active connections.
such as IEEE 802.11p or DMAC [32] use OFDM technol- Even though many routing protocols have been published,
ogy and a CSMA mechanism to control the medium access they focus on homogeneous network models instead of hetero-
and to avoid collisions. IEEE 802.11p provides reliability and geneous models (such as those required in IoV) which open up
low latency requirements present in intervehicular commu- several challenges that must be addressed. These challenges
nications. DMAC increases the re-use of the transmission include the handoff timing, the gateway node in a network,
channel to improve the performance and reduce collisions the most suitable wireless technology to transmit packets, IP
using directional antennas. Other type of MAC protocols addressing, and vehicles’ mobility demeanor.
use the ALOHA approach in their transmission scheduler. In Routing protocols in IoV must have an efficient model to
this category, some protocols such as ADHOC MAC [33] or manage dynamic topology variations which is an issue that
VC-MAC [34] have recently been proposed in the literature as has not yet been fully solved by current VANETs routing pro-
alternative protocols for cooperative communication protocols tocols. The heterogeneous model of IoV requires the handling
in VANETs environments to: use spatial reusability to maxi- of different network parameters from applications due to the
mize the network throughput, guarantee QoS, address terminal large scale of IoV. It is worthwhile pointing out that there is
problems, reduce transmission collisions and [15]. a need for hybrid routing protocols that can handle efficient
methods to reduce delay due to rapid topology changes and
traffic density, efficient privacy preserving location services
C. Routing Protocols in IoV that protect the privacy of a vehicle’s navigation information.
Cheng et al. [35] presented a taxonomy on routing protocols In addition, routing protocols should also control the flooding
ranging from protocols with a transmission strategy to those of the network to avoid disruption of nodes’ communications.
for network types (as shown in Fig. 4).
Transmission strategy-based routing protocols focus on
transmitting data from a single node to a destination node, V. S ECURITY IN I OV
either through all nodes within a specified geographical region In IoV, we need to integrate many different technologies,
or all nodes of the network through multihop transmissions services, and standards [35]. However, heterogeneity and the
as discussed in [36]–[39]. However, this type of protocols large number of vehicles will increase the need for data secu-
can incur high delays when finding routes. Consequently, rity. Zhang [55] stated that IoVs, as with other technologies,
their performance is very poor in large networks and could have many security vulnerabilities. Vehicles operate in vul-
cause excessive network flooding, which in turn, could cause nerable and unprotected environments with serious problems
a disruption in nodes’ communications. of security in vehicle-to-infrastructure and cloud communi-
Information-based routing protocols distribute routing infor- cations. IoVs can become very vulnerable to cyberattacks.
mation among nodes by sending entire dumps infrequently Malicious people can exploit vulnerable connection points
and smaller incremental updates based on beacon messages. and manipulate vehicular data streams with devastating effects
Several examples of such routing protocols are described such as: MP3 files infecting a whole network of cars very

Authorized licensed use limited to: AMRITA VISHWA VIDYAPEETHAM AMRITA SCHOOL OF ENGINEERING. Downloaded on May 16,2024 at 16:43:41 UTC from IEEE Xplore. Restrictions apply.
CONTRERAS-CASTILLO et al.: IoV: ARCHITECTURE, PROTOCOLS, AND SECURITY 3707

TABLE II
S ECURITY R EQUIREMENTS FOR I OV As with other markets, the IoV market is driven by various
trends. In this context, Lengton et al. [65] identified four major
trends that will fuel the growth of IoV in the future.
1) Energy Efficiency: This trend is expected to continue
because IoV provides several benefits through its poten-
tial to maximize fuel economy. A reduction of fuel
consumption through better driving and more advanced
traffic control systems will reduce traffic jams and
subsequently fuel consumption.
2) Connected Devices: The trends of integration between
devices and applications will promote the IoV market
by allowing companies to take advantage of new appli-
cation opportunities and have access to a much larger
end-user base.
3) Security: The strong demand for security features in
IoV solutions continues to grow. Robust, cost-effective,
and scalable security are needed to ensure that the IoV
platform conforms with legal requirements for data and
quickly [56]. Once the cybercriminal gets control of the car’s
identity security protection.
data system, he/she could manipulate different components of
4) Safety: This trend is related to various types of safety
the car such as brakes, unlock doors, or even turn the car off.
features. In this context IoV will be able to provide
At a recent Black Hat cybersecurity conference, a demonstra-
drivers with unprecedented safety features on the road.
tion showed how some software allows attackers to control
Furthermore, IoV applications may be able to provide
a Jeep Cherokee while on the move.
personalized safety features, such as the identification
This example demonstrates the potential dangers on the road
of personal health conditions while on the road and
ahead for the IoV [57]. Hickey [58] mentioned that one way
anti-fatigue systems.
to analyze the security problem from an effort-and-impact per-
Another major trend is the improvement of data process-
spective is to identify mitigation techniques that are used in
ing performance and capability. This trend focuses on the
comparable critical infrastructure systems of national impor-
migration from a traditional operating support system to a new
tance. He argued that disrupting a vehicle’s communication
platform that can handle the rapid increase of the amount of
or sensors, for example, would require a more complex and
data collected for the IoV system and the creation of new
sophisticated attack than one designed to simply gather infor-
solutions for data analytics [27].
mation, and disrupting the vehicle’s control commands would
The application of IoV technology collects and dissem-
be even harder. Regardless, the threat is real and a security
inates information and implements supervision and control
breach could have severe consequences on drivers, passen-
to improve traffic efficiency, enhance traffic safety, to make
gers, other vehicles, and infrastructures. For these reasons is
the lives of millions of people more enjoyable and conve-
necessary to make security a high priority for the IoV.
nient, coupled with a wide range of traffic safety services.
Some efforts have been made to address security issues in
Complementary efforts should also focus on the design of
the IoV. The National Institute of Standards and Technology
new middleware platforms to enable analysis and processing
proposed a framework to improve critical infrastructure cyber-
of vehicular information to allow informed decision making.
security that may be incorporated into IoV technologies [59].
Finally, the main IoV challenges include: 1) efficient
Other authors also developed V2V and V2I secure communi-
and scalable coordination and communication among devices
cation schemes for VANET applications [60]–[62].
and 2) the lack of standards to enable robust V2V commu-
nication. Open standards are needed to achieve a uniform
A. Security Requirements communication and information sharing environment which
IoV has several security requirements that must be allows for the transparent and seamless integration with cur-
addressed before it captures a large end-user market. The solu- rent closed standards in order to improve services and user
tions that meet the security requirements must be developed to experiences in the IoV ecosystem.
maintain privacy and security of end-users. Table II presents
a summary of some of the security requirements that IoV must
VII. C ONCLUSION
meet [63].
In this paper, we presented some of the most relevant
technologies that support IoV. IoV provides numerous ben-
VI. F UTURE R ESEARCH D IRECTIONS ON I OV efits including dynamic information services, intelligent vehi-
IoV will improve automotive and information technolo- cle control, and applications to reduce insurance rates and
gies thereby contributing to economic and social development increased productivity due to reduced traffic congestions. We
through a more robust, efficient, and intelligent transportation also proposed a seven-layer architecture for IoV as well as
system that will have a direct impact on users’ lifestyle [64]. the standards used for interoperability of all participants.

Authorized licensed use limited to: AMRITA VISHWA VIDYAPEETHAM AMRITA SCHOOL OF ENGINEERING. Downloaded on May 16,2024 at 16:43:41 UTC from IEEE Xplore. Restrictions apply.
3708 IEEE INTERNET OF THINGS JOURNAL, VOL. 5, NO. 5, OCTOBER 2018

Finally, we discussed the protocols used for wireless access [16] A. Mai, The Internet of Cars, Spawning New Business Models.
communications and routing protocols as well as interve- CISCO, Oct. 2012, pp. 1–9. [Online]. Available: http://www.gsma.com/
connectedliving/wp-content/uploads/2012/07/12-10-24-SCV-GSMA-
hicular communication protocols. We further discussed some Cisco-Perspective-F.pdf
security requirements in IoV followed by future IoV research [17] A. Mai and D. Schlesinger, A Business Case for Connecting Vehicles,
challenges that must be addressed. We argue that IoV will pro- Executive Summary, Cisco Internet Business Solutions Group, San Jose,
CA, USA, 2011.
mote the integration of automotive and information technology [18] L. J. Blincoe, T. R. Miller, E. Zaloshnja, and B. A. Lawrence, “The
which will contribute to the development of applications economic and societal impact of motor vehicle crashes,” U.S. Dept.
related to energy efficiency, connected devices, security, and Transp., Nat. Highway Traffic, Washington, DC, USA, Tech. Rep. DOT
HS 812 013, May 2015.
safety all of which will ultimately help reduce the lack of [19] Traffic Safety Facts Research Note: 2015 Motor Vehicle Crashes
coordination and communication among vehicles and improve Overview, Nat. Highway Traffic Safety, Washington, DC, USA,
products, services, and experiences. Aug. 2016.
[20] “The future economic and environmental costs of gridlock in 2030,”
INRIX, Kirkland, WA, USA, Tech. Rep., Jul. 2014. [Online]. Available:
ACKNOWLEDGMENT http://inrix.com/download-the-inrix-cost-of-congestion-report-2/
[21] A. Mai and D. Schlesinger, Connected Vehicles and Government:
The authors would like to thank the anonymous reviewers A Catalyst to Unlock the Societal Benefits of Transportation, Cisco
for their valuable comments, which helped them to improve Internet Bus. Solutions Group, San Jose, CA, USA, and Safety Admin.,
Washington, DC, USA, 2011.
the presentation of this paper. [22] R. Viereckl, D. Ahlemann, J. Assmann, and S. Bratzel. (2014).
Racing Ahead the Connected c@r 2014 Study. pp. 1–11, accessed on
Apr. 13, 2017. [Online]. Available: https://www.strategyand.pwc.com/
R EFERENCES media/file/Racing-ahead.pdf
[1] Org. Int. Constructeurs d’Automobiles. (2014). Number of Passenger [23] L. Nanjie, “Internet of Vehicles your next connection,” WinWin
Cars and Commercial Vehicles in Use Worldwide From 2006 to Mag., vol. 12, no. 11, pp. 23–28, Dec. 2011. Accessed on
2014 in (1,000 Units). Accessed on Sep. 16, 2016. [Online]. Available: Apr. 13, 2017. [Online] Available: http://www.huawei.com/en/
http://www.statista.com/statistics/281134/number-of-vehicles-in-use- publications/winwin-magazine/11/HW_110848
worldwide/ [24] K. Golestan, R. Soua, F. Karray, and M. Kamel, “Situation
[2] J. Voelcker. (Aug. 2011). It’s Official: We Now Have One Billion awareness within the context of connected cars: A comprehen-
Vehicles on the Planet. Accessed on Sep. 16, 2016. [Online]. Available: sive review and recent trends,” Inf. Fusion, vol. 29, pp. 6–83,
http://www.greencarreports.com/news/1065070_its-official-we-now- May 2016.
have-one-billion-vehicles-on-the-planet [25] F. Bonomi, The Smart and Connected Vehicle and the Internet of Things,
[3] S. Al-Sultan, M. M. Al-Doori, A. H. Al-Bayatti, and H. Zedan, “A com- WSTS, San Jose, CA, USA, 2013.
prehensive survey on vehicular ad hoc network,” J. Netw. Comput. Appl., [26] M. Miche and T. M. Bohnert, “The Internet of Vehicles or the
vol. 37, pp. 380–392, Jan. 2014. second generation of telematic services,” ERCIM News, vol. 77,
[4] J. Raymond, “The Internet of Things: A study in hyper, reality, dis- pp. 43–45, 2009. Accessed on Apr. 13, 2017. [Online]. Available:
ruption and growth,” U.S. Res. Published Raymond James Assoc., https://ercim-news.ercim.eu/images/stories/EN77/EN77-web.pdf
St. Petersburg, FL, USA, Tech. Rep., 2014. [27] J. Contreras-Castillo, S. Zeadally, and J. A. Guerrero-Ibañez, “Solving
[5] M. Chaqfeh, A. Lakas, and I. Jawhar, “A survey on data dissemination in vehicular ad hoc network challenges with big data solutions,” IET Netw.,
vehicular ad hoc networks,” Veh. Commun., vol. 1, no. 4, pp. 214–225, vol. 5, no. 4, pp. 81–84, Jul. 2016.
Oct. 2014. [28] New Connected Car Standards Put Europe Into Top Gear, Eur.
[6] S. Zeadally, R. Hunt, Y.-S. Chen, A. Irwin, and A. Hassan, “Vehicular Commission, Brussels, Belgium, Feb. 2014. [Online]. Available:
ad hoc networks (VANETs): Status, results, and challenges,” Telecomun. http://europa.eu/rapid/press-release_IP-14-141_en.pdf
Syst., vol. 50, no. 4, pp. 217–241, 2012. [29] A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and
[7] J. T. Isaac, S. Zeadally, and J. S. Camara, “Security attacks and solu- M. Ayyash, “Internet of Things: A survey on enabling technologies, pro-
tions for vehicular ad hoc networks,” IET Commun. J., vol. 4, no. 7, tocols, and applications,” IEEE Commun. Surveys Tuts., vol. 17, no. 4,
pp. 894–903, Apr. 2010. pp. 2347–2376, 1st Quart., 2015.
[8] J. Guerrero-Ibanez, C. Flores-Cortes, and S. Zeadally, “Vehicular ad-hoc [30] J. B. Kenney, “Dedicated short-range communications (DSRC) stan-
networks (VANETs): Architecture, protocols, and applications,” in Next dards in the United States,” Proc. IEEE, vol. 99, no. 7, pp. 1162–1182,
Generation Wireless Technologies: 4G and Beyond, N. Chilamkurti, Jul. 2011.
S. Zeadally, and H. Chaouchi, Eds. London, U.K.: Springer, 2013, [31] “Intelligent Transport Systems (ITS); radiocommunications equipment
ch. 5. operating in the 5 855 MHz to 5 925 MHz frequency band,” ETSI,
[9] G. Dimitrakopoulos, “Intelligent transportation systems based on Sophia Antipolis, France, Tech. Rep. ETSI EN 302 571 (V1.1.1),
Internet-connected vehicles: Fundamental research areas and chal- 2013.
lenges,” in Proc. 11th Int. Conf. ITS Telecommun., St. Petersburg, Russia, [32] Y.-B. Ko, V. Shankarkumar, and N. H. Vaidya, “Medium access control
Aug. 2011, pp. 145–151. protocols using directional antennas in ad hoc networks,” in Proc. 19th
[10] Y. Fangchun, W. Shangguang, L. Jinglin, L. Zhihan, and S. Qibo, “An Annu. Joint Conf. IEEE Comput. Commun. Soc. (INFOCOM), Tel Aviv,
overview of Internet of Vehicles,” China Commun. Veh. Netw., vol. 11, Israel, 2000, pp. 13–21.
no. 10, pp. 1–15, Oct. 2014. [33] F. Borgonovo, A. Capone, M. Cesana, and L. Fratta, “ADHOC MAC:
[11] M. Nitti, R. Girau, A. Floris, and L. Atzori, “On adding the social dimen- New MAC architecture for ad hoc networks providing efficient and
sion to the Internet of Vehicles: Friendship and middleware,” in Proc. reliable point-to-point and broadcast services,” Wireless Netw., vol. 10,
IEEE Int. Black Sea Conf. Commun. Netw., Odessa, Ukraine, May 2014, no. 4, pp. 359–366, Jul. 2004.
pp. 134–138. [34] J. Zhang, Q. Zhang, and W. Jia, “Vc-MAC: A cooperative MAC pro-
[12] J. A. Guerrero-Ibanez, S. Zeadally, and J. Contreras-Castillo, tocol in vehicular networks,” IEEE Trans. Veh. Technol., vol. 58, no. 3,
“Integration challenges of intelligent transportation systems with con- pp. 1561–1571, Mar. 2009.
nected vehicle, cloud computing, and Internet of Things technologies,” [35] J. Cheng et al., “Routing in Internet of Vehicles: A review,” IEEE Trans.
IEEE Wireless Commun., vol. 22, no. 6, pp. 122–128, Dec. 2015. Intell. Transp. Syst., vol. 16, no. 5, pp. 2339–2352, Oct. 2015.
[13] IRF World Road Statistics Database, 2008; World Bank Global Road [36] A. Bachir and A. Benslimane, “A multicast protocol in ad hoc networks
Safety Facility, 2010, Cisco IBSG, San Jose, CA, USA, 2011. inter-vehicle geocast,” in Proc. 57th IEEE Semiannu. VTC Spring, vol. 4.
[14] F. Cunha et al., “Data communication in VANETs: Protocols, applica- 2003, pp. 2456–2460.
tions and challenges,” Ad Hoc Netw., vol. 44, pp. 90–103, Jul. 2016. [37] C. Maihofer and R. Eberhardt, “Geocast in vehicular environ-
[15] “Transportation cost and benefits analysis II—Vehicle costs,” Dept. ments: Caching and transmission range control for improved effi-
Transp., Amer. Automobile Assoc., Heathrow, FL, USA, and ciency,” in Proc. IEEE Intell. Veh. Symp., Parma, Italy, 2004,
Victoria Transp. Policy Inst., Victoria, BC, Canada, Tech. Rep., 2015. pp. 951–956.

Authorized licensed use limited to: AMRITA VISHWA VIDYAPEETHAM AMRITA SCHOOL OF ENGINEERING. Downloaded on May 16,2024 at 16:43:41 UTC from IEEE Xplore. Restrictions apply.
CONTRERAS-CASTILLO et al.: IoV: ARCHITECTURE, PROTOCOLS, AND SECURITY 3709

[38] G. Korkmaz, E. Ekici, F. Özgüner, and Ü. Özgüner, “Urban multi-hop [58] J. Hickey, Vice President, Vínsula. Telephone Interview, Seattle, WA,
broadcast protocol for inter-vehicle communication systems,” in Proc. USA, Oct. 2012.
1st ACM Int. Workshop Veh. Ad Hoc Netw., Philadelphia, PA, USA, [59] (Feb. 12, 2014). National Institute of Standards and
2004, pp. 76–85. Technology (NIST): Framework for Improving Critical
[39] M. Durresi, A. Durresi, and L. Barolli, “Emergency broadcast proto- Infrastructure Cybersecurity. [Online]. Available: http://www.nist.gov/
col for inter-vehicle communications,” in Proc. 11th Int. Conf. Parallel cyberframework/upload/cybersecurity-framework-021214-final.pdf
Distrib. Syst., vol. 2. Fukuoka, Japan, 2005, pp. 402–406. [60] L. Zhang, Q. Wu, B. Qin, J. Domingo-Ferrer, and B. Liu, “Practical
[40] M. Hager, L. Wernecke, C. Schneider, and J. Seitz, “Vehicular ad hoc secure and privacy-preserving scheme for value-added applications in
networks: Multi-hop information dissemination in an urban scenario,” in VANETs,” Comput. Commun., vol. 71, pp. 50–60, Nov. 2015.
38th Int. Conf. Telecommun. Signal Process., Prague, Czech Republic, [61] K. Emara, W. Woerndl, and J. Schlichter, “On evaluation of location
2015. pp. 65–70, doi: 10.1109/TSP.2015.7296225. privacy preserving schemes for VANET safety applications,” Comput.
[41] R. S. Yokoyama, B. Y. L. Kimura, L. M. S. Jaimes, and E. D. S. Moreira, Commun., vol. 63, pp. 11–23, Jun. 2015.
“A beaconing-based opportunistic service discovery protocol for vehic- [62] D. A. Rivas, J. M. Barceló-Ordinas, M. G. Zapata, and
ular networks,” in Proc. 28th Int. Conf. Adv. Inf. Netw. Appl. J. D. Morillo-Pozo, “Security on VANETs: Privacy, misbehaving
Workshops (WAINA), Victoria, BC, Canada, May 2014, pp. 498–503. nodes, false information and secure data aggregation,” J. Netw. Comput.
[42] S. E. Carpenter, “Obstacle shadowing influences in VANET safety,” in Appl., vol. 34, no. 6, pp. 1942–1955, 2011.
Proc. IEEE 22nd Int. Conf. Netw. Protocols (ICNP), Raleigh, NC, USA, [63] B. Mokhtar and M. Azab, “Survey on security issues in vehicular ad
2014, pp. 480–482. hoc networks,” Alexandria Eng. J., vol. 54, no. 4, pp. 1115–1126, 2015.
[43] A. Tahmasbi-Sarvestani, Y. P. Fallah, and V. Kulathumani, “Network- [64] “White paper of Internet of Vehicles,” in Proc. 50th Telecommun. Inf.
aware double-layer distance-dependent broadcast protocol for VANETs,” Working Group Meeting, Brisbane, QLD, Australia, Sep./Oct. 2014,
IEEE Trans. Veh. Technol., vol. 64, no. 12, pp. 5536–5546, Dec. 2015. pp. 1–7.
[44] J. Zhao and G. Cao, “VADD: Vehicle-assisted data delivery in vehic- [65] M. Lengton, D. Verzijl, and K. Dervojeda, Internet of Things, Connected
ular ad hoc networks,” IEEE Trans. Veh. Technol., vol. 57, no. 3, Cars. Business Innovation Observatory, Eur. Union, Brussels, Belgium,
pp. 1910–1922, May 2008. Feb. 2015.
[45] G. Li and L. Boukhatem, “A delay-sensitive vehicular routing protocol
using ant colony optimization,” in Proc. 12th MED-HOC-NET, Ajaccio,
France, 2013, pp. 49–54.
[46] B. Khanna, J. Redi, P. Basu, and R. Ramanathan, “Disrupted adaptive
routing: Gossip-based routing in delay-tolerant networks,” in Proc. IEEE
MILCOM, San Diego, CA, USA, 2013, pp. 1099–1104.
[47] U. Lee, S. Y. Oh, K.-W. Lee, and M. Gerla, “RelayCast: Scalable Juan Contreras-Castillo received the B.S. degree in computer systems from
multicast routing in delay tolerant networks,” in Proc. IEEE ICNP, the University of Colima, Colima, Mexico, in 1996, and the M.Sc. degree in
Orlando, FL, USA, 2008, pp. 218–227. computer sciences and Ph.D. degree in telecommunications from the Centro de
[48] K.-Y. Ho, P.-C. Kang, C.-H. Hsu, and C.-H. Lin, “Implementation of Investigación Científica y Educaci Superior de Ensenada (CICESE), Ensenada,
WAVE/DSRC devices for vehicular communications,” in Proc. 3CA, Mexico, in 1998 and 2003, respectively.
vol. 2. Tainan, Taiwan, 2010, pp. 522–525. He is a Full Professor of computer sciences with the School of Telematics,
[49] P. D. Dorge, S. S. Dorle, M. B. Chakole, and D. K. Thote, “Improvement University of Colima. His current research interests include ubiquitous com-
of QoS in VANET with different mobility patterns,” in Proc. ICRCC, puting, distance learning, mobile learning, wireless sensor networks, and
Tiruvannamalai, India, 2012, pp. 206–209. vehicular ad hoc networks.
[50] K. Shafiee, A. Attar, and V. C. M. Leung, “Optimal distributed vertical
handoff strategies in vehicular heterogeneous networks,” IEEE J. Sel.
Areas Commun., vol. 29, no. 3, pp. 534–544, Mar. 2011.
[51] Y. Li, K. Ying, P. Cheng, H. Yu, and H. Luo, “Cooperative data dissem-
ination in cellular-VANET heterogeneous wireless networks,” in Proc.
4th HSIC, Nanjing, China, 2012, pp. 1–4. Sherali Zeadally received the bachelor’s degree in computer science from the
[52] Q. Zhao, Y. Zhu, C. Chen, H. Zhu, and B. Li, “When 3G Meets VANET: University of Cambridge, Cambridge, U.K., in 1991, and the doctoral degree
3G-assisted data delivery in VANETs,” IEEE Sensors J., vol. 13, no. 10, in computer science from the University of Buckingham, Buckingham, U.K.,
pp. 3575–3584, Oct. 2013. in 1996.
[53] S. H. Ahmed et al., “CODIE: Controlled data and interest evaluation He is an Associate Professor with the College of Communication and
in vehicular named data networks,” IEEE Trans. Veh. Technol., vol. 65, Information, University of Kentucky, Lexington, KY, USA.
no. 6, pp. 3954–3963, Jun. 2016. Dr. Zeadally is a Fellow of the British Computer Society and the Institution
[54] S. H. Ahmed, M. A. Yaqub, S. H. Bouk, and D. Kim, “SmartCop: of Engineering Technology, U.K.
Enabling smart traffic violations ticketing in vehicular named data net-
works,” Mobile Inf. Syst., vol. 2016, May 2016, Art. no. 1353290,
doi: 10.1155/2016/1353290.
[55] T. Zhang, Securing Connected Vehicles: Challenges and Opportunities,
CISCO Syst., San Jose, CA, USA, Dec. 2015. [Online]. Available:
http: // sites.ieee.org/ denver-com/ files/2016/02/ IoV-Security-Challenges-
and-Opportunities-zhang.pdf Juan Antonio Guerrero-Ibañez received the M.Sc. degree from the
[56] L. Reger, Addressing the Security of the Connected Car, University of Colima (UDC), Colima, Mexico, in 1999, and the Ph.D. degree
NXP Blog, Eindhoven, The Netherlands, 2014. [Online]. Available: in telematics engineering from the Universitat Politecnica de Catalunya (UPC),
http://blog.nxp.com/addressing-the-security-of-the-connected-car/ Barcelona, Spain, in 2008.
[57] D. Yadron, “Hackers demonstrate how to take control of cars,” He is a Full Professor and a member of the Telecommunication and
in Proc. Black Hat Security Conf., Las Vegas, NV, USA, Networks Group, School of Telematics, UDC. His current research inter-
2015. [Online]. Available: http://www.wsj.com/articles/hacking-cars- ests include networking and QoS provision, wireless sensor networks, and
to-take-focus-at-black-hat-conference-1438723360?mod=videorelated vehicular ad hoc networks.

Authorized licensed use limited to: AMRITA VISHWA VIDYAPEETHAM AMRITA SCHOOL OF ENGINEERING. Downloaded on May 16,2024 at 16:43:41 UTC from IEEE Xplore. Restrictions apply.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy