Internet of Vehicles Architecture Protocols and Security
Internet of Vehicles Architecture Protocols and Security
Abstract—Today, vehicles are increasingly being connected to are being deployed to provide a safer and more convenient
the Internet of Things which enable them to provide ubiq- environment through their interconnection and interoperabil-
uitous access to information to drivers and passengers while ity, creating the new concept of IoT. In addition, as high speed
on the move. However, as the number of connected vehicles
keeps increasing, new requirements (such as seamless, secure, mobile Internet access becomes more affordable and ubiqui-
robust, scalable information exchange among vehicles, humans, tous, opportunities for new products and services for society
and roadside infrastructures) of vehicular networks are emerging. are emerging.
In this context, the original concept of vehicular ad-hoc networks Raymond James’ industry reported that in 2011 the number
is being transformed into a new concept called the Internet of of Internet-connected devices surpassed the number of people
Vehicles (IoV). We discuss the benefits of IoV along with recent
industry standards developed to promote its implementation. We on the planet, and it is expected to reach between 26 billion
further present recently proposed communication protocols to and 50 billion by 2020 [4]. This exponential increase in the
enable the seamless integration and operation of the IoV. Finally, number of connected devices opens the door for different types
we present future research directions of IoV that require further of machine-to-machine (M2M) communications which enable
consideration from the vehicular research community. ubiquitous connectivity among devices thereby enabling the
Index Terms—Internet of Vehicles (IoV), protocol, security, IoT paradigm. Vodafone stated that the automotive indus-
standards, vehicular ad-hoc networks (VANETs). try is one of the fastest growing sectors (with an increase
of approximately 32% and 19% for automotive and logis-
tic and transportation sectors, respectively [5]) where M2M
I. I NTRODUCTION communication is being heavily deployed.
The concept of vehicular ad-hoc networks (VANETs) was
ODAY, the transportation systems in many countries are
T increasingly being stretched to their limits as the number
of people using them keeps increasing. In many cases, these
conceived over a decade ago and has since then been a very
active area of research both in academia and industry [6]–[9].
However, as the number of vehicles connected to the IoT
transportation systems have become inefficient and costly to
increases, new requirements of VANETs (such as intervehic-
maintain or upgrade. A recent report noted that the number
ular, vehicular-infrastructure and vehicular-Internet, vehicular-
of vehicles (passenger and commercial) used worldwide is
personal devices, and intravehicular communications) are
slightly higher than one billion [1] and is expected to reach
emerging. One of the main problems of VANETs is its lim-
two billion by 2035 [2]. The rapid growth in the number of
ited capacity for processing all the information that is collected
vehicles causes an increase in traffic congestion and number
by themselves and other actors (such as sensors and mobile
of fatalities that occur due to accidents on the roads [3]. In the
devices) around the environment. In this context, vehicles
future, we anticipate substantial changes in the transportation
must evolve into “smart” objects equipped with a multisensor
system to cope with emerging requirements of new vehicles,
platform, with a set of communication technologies, robust
passengers, and drivers along with new paradigms such as
computational units, IP-based connectivity to the Internet, and
the Internet of Things (IoT), cloud computing, among others.
a direct or indirect connection to other vehicles and with all
Recent advances in computing and networking technologies
devices around the environment. In this context, the concept
have led to the development of a wide range of intelligent
of VANETs is evolving into the Internet of Vehicle (IoV).
devices often equipped with embedded processors and wire-
The basic principle of a VANET is that a vehicle is a mobile
less communication technologies. These intelligent devices
node that enables it to connect to other vehicles thereby cre-
ating a network. Vehicles are connected or disconnected as
Manuscript received October 1, 2016; revised December 23, 2016; accepted they fall inside or outside of the coverage range. However,
December 30, 2016. Date of publication April 4, 2017; date of current ver-
sion November 14, 2018. The work of S. Zeadally was supported by the we consider a VANET to be a conditioned network with
University Research Professorship Award from the University of Kentucky in mobility constraints, affected by the number of connected
2016. (Corresponding author: Sherali Zeadally.) vehicles, and several factors such as traffic jams, tall build-
J. Contreras-Castillo and J. A. Guerrero-Ibañez are with the School
of Telematics, University of Colima, Colima 28040, Mexico (e-mail: ings, and bad driver behaviors which affect its performance
juancont@ucol.mx; antonio_guerrero@ucol.mx). and use.
S. Zeadally is with the College of Communication and Information, VANETs lack the processing capacity for handling global
University of Kentucky. Lexington, KY 40506 USA (e-mail:
szeadally@uky.edu). information. VANETs does not have the capacity to analyze,
Digital Object Identifier 10.1109/JIOT.2017.2690902 process, and evaluate the global information that is collected
2327-4662 c 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: AMRITA VISHWA VIDYAPEETHAM AMRITA SCHOOL OF ENGINEERING. Downloaded on May 16,2024 at 16:43:41 UTC from IEEE Xplore. Restrictions apply.
3702 IEEE INTERNET OF THINGS JOURNAL, VOL. 5, NO. 5, OCTOBER 2018
from the different vehicles that are part of the network. for supporting different functions (such as intelligent traffic
However, VANETs are well suited for short term applica- management, dynamic information services, intelligent vehicle
tions or for small scale services such as collision prevention control, among others) [12]. IoV is composed of three funda-
or road hazard control notifications services. In contrast, IoV mental components: 1) the intervehicular network; 2) intrave-
integrates two technological visions: 1) vehicle’s networking hicular network; and 3) vehicular mobile Internet. IoV allows
and 2) vehicle’s intelligence [10] and focuses on the integra- vehicles to be permanently connected to the Internet, forming
tion of objects such as humans, vehicles, things, networks, an interconnected set of vehicles that can provide informa-
and environments to create an intelligent network based on tion for different services such as traffic management, road
computing and communication capabilities that supports ser- safety, and infotainment [13]. IoV enables the exchange of
vices (such as global traffic efficiency and management service information among vehicles, road infrastructures, passengers,
based on pollution levels, road conditions, congestion traf- drivers, sensors and electric actuators, and the Internet using
fic level, or vehicular safety services) for large cities or even communication protocols and standards such as IEEE 802.11p,
a whole country. directional medium access control (DMAC), vehicular coop-
By using intelligent systems on vehicles and different erative media access control (VC-MAC), ad hoc on demand
cyber-physical systems (such as sensors, vehicles, and mobile distance vector, dynamic source routing, general packet radio
devices) in cities we can develop a global network that pro- services, and others [14]. IoV differs from ITS because it puts
vides different services to vehicles and the humans associated more emphasis on information interaction among vehicles,
with them. IoV also refers to vehicles, humans, components human, and the surrounding road infrastructures.
of the transportation infrastructure, and a set of devices allo- Every year, approximately 1.3 million people die and more
cated in the environment, connected through an all IP-based than 7 million people are injured in around 8 million traffic
infrastructure, that exchange information directly or indirectly accidents. People waste more than 90 billion hours because of
to contribute toward a more efficient, safer, and greener world traffic problems (accidents and traffic jams), causing a loss of
of transportation [11]. 2% of the global gross domestic product and vehicular travel
The main contributions of this paper include: first, we generates 220 million metric tons of carbon equivalent [15].
describe and discuss how IoV can help to achieve a sustain- The cost of personal transportation in cars (not including pub-
able intelligent transportation system and bring considerable lic or commercial vehicles) is about $3 trillion per year in
benefits to drivers and passengers, society, service providers the United States and 40% of this cost is related to crashes,
and auto manufacturers; second, we propose a new seven- parking, roads, traffic services, and pollution [16].
layered IoV model that addresses some of the deficiencies and The IoV concept opens up many new opportunities and
drawbacks of previously proposed IoV models; and finally, we applications and offers various benefits to drivers, society, and
identify future challenges that must be addressed in order to businesses. Cisco IBSG Automotive and Economics practices
achieve a scalable, robust, secure, and fully operational IoV indicate that IoV will help provide $1400 U.S. in benefits per
environment. vehicle, per year [17]. These include the following.
The remainder of this paper is organized as follows. 1) Vehicle User: It is estimated that the saving will be
Section II describes the concept of the IoV. We present the around $550 U.S. based on lower insurance rates, lower oper-
current architecture or architectures being proposed for IoV in ation costs and less time spent in traffic which increases
Section III. Section IV focuses on message exchange proto- productivity due to reduced traffic congestion by recogniz-
cols for IoV. Section V discusses how security solutions can ing and anticipating risk and dynamically calculating optimal
be deployed to address some of the security and privacy chal- routes.
lenges in IoV. Section VI presents some of the future research 2) Society: Societal benefits could be around $420 U.S. that
challenges for IoV. We make some concluding remarks in could be obtained through lower traffic road operational costs,
Section VII. a decrease in the number of crashes and better control of con-
gestion through traffic management and optimization of road
networks and reduced CO2 emissions.
II. B ENEFITS OF I OV S 3) IoV Service Providers: They could save around $160 U.S.
Recent technological advances and ease of access to mobile through traffic guidance, navigation, emergency services, and
Internet have transformed the car into “the new mobile device” location-based services.
enabling people in these vehicles to become “connected occu- 4) Auto (Original Equipment Manufacturers/Original
pants.” When vehicles and occupants are connected, they Equipment Suppliers): They could save around $300 U.S.
access, consume, create, enrich, and share a lot of digital through lower service/warranty costs and new profit pools
information among businesses, people, organizations, infras- amortized over eight years [18].
tructure, and other cars leading to the emerging concept In 2015, the National Highway Traffic Safety released the
of IoVs. results of a study which showed that the United States spend
The IoVs might be defined as a platform that enables the more than $836 billion on crashes, insurance premiums, and
exchange of information between the car and its surroundings traffic law enforcement accounts [19]. Another report released
through different communication media. As a result of the in 2014 by Seattle-based INRIX and the Centre for Economics
integration of the IoT technology with intelligent transporta- and Business Research revealed that traffic congestions cost
tion systems (ITSs), IoV will create an integrated network Americans $124 billion in direct and indirect losses, and this
Authorized licensed use limited to: AMRITA VISHWA VIDYAPEETHAM AMRITA SCHOOL OF ENGINEERING. Downloaded on May 16,2024 at 16:43:41 UTC from IEEE Xplore. Restrictions apply.
CONTRERAS-CASTILLO et al.: IoV: ARCHITECTURE, PROTOCOLS, AND SECURITY 3703
Authorized licensed use limited to: AMRITA VISHWA VIDYAPEETHAM AMRITA SCHOOL OF ENGINEERING. Downloaded on May 16,2024 at 16:43:41 UTC from IEEE Xplore. Restrictions apply.
3704 IEEE INTERNET OF THINGS JOURNAL, VOL. 5, NO. 5, OCTOBER 2018
Authorized licensed use limited to: AMRITA VISHWA VIDYAPEETHAM AMRITA SCHOOL OF ENGINEERING. Downloaded on May 16,2024 at 16:43:41 UTC from IEEE Xplore. Restrictions apply.
CONTRERAS-CASTILLO et al.: IoV: ARCHITECTURE, PROTOCOLS, AND SECURITY 3705
TABLE I
I OV P ROJECTS : G OALS AND ACHIEVEMENTS
IV. P ROTOCOLS IN I OV
are caused by the movements of vehicles must be considered.
Intervehicular communication protocols in VANETs play
Some recent efforts have focused on the use of infrared and
an essential role in IoV as they enable different levels of
radio waves for vehicle-vehicle communications because they
interaction among vehicles, humans, and roadside units. They
offer line-of-sight and broadcast communications. Dedicated
can provide alternate routes efficiently and quickly if a prob-
short range communication, also known as IEEE 802.11p wire-
lem arises with the current route. However, IoV extends
less access in vehicular environments (WAVE), is based on
beyond VANETs (as we mentioned earlier) and places more
IEEE 1609 standards and describes techniques and interface
emphasis on information exchange among vehicles, human,
processes controlled by the MAC layer for public safety and
and the surrounding road infrastructures. Next, we briefly
private applications [30]. The frequency band is divided into
present basic VANET communication protocols that can be
six service channels that are used for different application
applied to IoV.
types (frequency range 5.855–5.875 MHz for ITS nonsafety
applications and frequency range 5.875–5.905 MHz for safety
A. Physical Layer Protocols and traffic efficiency applications) and one control channel.
When a protocol for physical layer is designed some fac- The main idea of IEEE 802.11p WAVE protocol is to integrate
tors such as multipath fading and Doppler frequency shifts that PHY and MAC layers of the IEEE 802.11 wireless standards
Authorized licensed use limited to: AMRITA VISHWA VIDYAPEETHAM AMRITA SCHOOL OF ENGINEERING. Downloaded on May 16,2024 at 16:43:41 UTC from IEEE Xplore. Restrictions apply.
3706 IEEE INTERNET OF THINGS JOURNAL, VOL. 5, NO. 5, OCTOBER 2018
Authorized licensed use limited to: AMRITA VISHWA VIDYAPEETHAM AMRITA SCHOOL OF ENGINEERING. Downloaded on May 16,2024 at 16:43:41 UTC from IEEE Xplore. Restrictions apply.
CONTRERAS-CASTILLO et al.: IoV: ARCHITECTURE, PROTOCOLS, AND SECURITY 3707
TABLE II
S ECURITY R EQUIREMENTS FOR I OV As with other markets, the IoV market is driven by various
trends. In this context, Lengton et al. [65] identified four major
trends that will fuel the growth of IoV in the future.
1) Energy Efficiency: This trend is expected to continue
because IoV provides several benefits through its poten-
tial to maximize fuel economy. A reduction of fuel
consumption through better driving and more advanced
traffic control systems will reduce traffic jams and
subsequently fuel consumption.
2) Connected Devices: The trends of integration between
devices and applications will promote the IoV market
by allowing companies to take advantage of new appli-
cation opportunities and have access to a much larger
end-user base.
3) Security: The strong demand for security features in
IoV solutions continues to grow. Robust, cost-effective,
and scalable security are needed to ensure that the IoV
platform conforms with legal requirements for data and
quickly [56]. Once the cybercriminal gets control of the car’s
identity security protection.
data system, he/she could manipulate different components of
4) Safety: This trend is related to various types of safety
the car such as brakes, unlock doors, or even turn the car off.
features. In this context IoV will be able to provide
At a recent Black Hat cybersecurity conference, a demonstra-
drivers with unprecedented safety features on the road.
tion showed how some software allows attackers to control
Furthermore, IoV applications may be able to provide
a Jeep Cherokee while on the move.
personalized safety features, such as the identification
This example demonstrates the potential dangers on the road
of personal health conditions while on the road and
ahead for the IoV [57]. Hickey [58] mentioned that one way
anti-fatigue systems.
to analyze the security problem from an effort-and-impact per-
Another major trend is the improvement of data process-
spective is to identify mitigation techniques that are used in
ing performance and capability. This trend focuses on the
comparable critical infrastructure systems of national impor-
migration from a traditional operating support system to a new
tance. He argued that disrupting a vehicle’s communication
platform that can handle the rapid increase of the amount of
or sensors, for example, would require a more complex and
data collected for the IoV system and the creation of new
sophisticated attack than one designed to simply gather infor-
solutions for data analytics [27].
mation, and disrupting the vehicle’s control commands would
The application of IoV technology collects and dissem-
be even harder. Regardless, the threat is real and a security
inates information and implements supervision and control
breach could have severe consequences on drivers, passen-
to improve traffic efficiency, enhance traffic safety, to make
gers, other vehicles, and infrastructures. For these reasons is
the lives of millions of people more enjoyable and conve-
necessary to make security a high priority for the IoV.
nient, coupled with a wide range of traffic safety services.
Some efforts have been made to address security issues in
Complementary efforts should also focus on the design of
the IoV. The National Institute of Standards and Technology
new middleware platforms to enable analysis and processing
proposed a framework to improve critical infrastructure cyber-
of vehicular information to allow informed decision making.
security that may be incorporated into IoV technologies [59].
Finally, the main IoV challenges include: 1) efficient
Other authors also developed V2V and V2I secure communi-
and scalable coordination and communication among devices
cation schemes for VANET applications [60]–[62].
and 2) the lack of standards to enable robust V2V commu-
nication. Open standards are needed to achieve a uniform
A. Security Requirements communication and information sharing environment which
IoV has several security requirements that must be allows for the transparent and seamless integration with cur-
addressed before it captures a large end-user market. The solu- rent closed standards in order to improve services and user
tions that meet the security requirements must be developed to experiences in the IoV ecosystem.
maintain privacy and security of end-users. Table II presents
a summary of some of the security requirements that IoV must
VII. C ONCLUSION
meet [63].
In this paper, we presented some of the most relevant
technologies that support IoV. IoV provides numerous ben-
VI. F UTURE R ESEARCH D IRECTIONS ON I OV efits including dynamic information services, intelligent vehi-
IoV will improve automotive and information technolo- cle control, and applications to reduce insurance rates and
gies thereby contributing to economic and social development increased productivity due to reduced traffic congestions. We
through a more robust, efficient, and intelligent transportation also proposed a seven-layer architecture for IoV as well as
system that will have a direct impact on users’ lifestyle [64]. the standards used for interoperability of all participants.
Authorized licensed use limited to: AMRITA VISHWA VIDYAPEETHAM AMRITA SCHOOL OF ENGINEERING. Downloaded on May 16,2024 at 16:43:41 UTC from IEEE Xplore. Restrictions apply.
3708 IEEE INTERNET OF THINGS JOURNAL, VOL. 5, NO. 5, OCTOBER 2018
Finally, we discussed the protocols used for wireless access [16] A. Mai, The Internet of Cars, Spawning New Business Models.
communications and routing protocols as well as interve- CISCO, Oct. 2012, pp. 1–9. [Online]. Available: http://www.gsma.com/
connectedliving/wp-content/uploads/2012/07/12-10-24-SCV-GSMA-
hicular communication protocols. We further discussed some Cisco-Perspective-F.pdf
security requirements in IoV followed by future IoV research [17] A. Mai and D. Schlesinger, A Business Case for Connecting Vehicles,
challenges that must be addressed. We argue that IoV will pro- Executive Summary, Cisco Internet Business Solutions Group, San Jose,
CA, USA, 2011.
mote the integration of automotive and information technology [18] L. J. Blincoe, T. R. Miller, E. Zaloshnja, and B. A. Lawrence, “The
which will contribute to the development of applications economic and societal impact of motor vehicle crashes,” U.S. Dept.
related to energy efficiency, connected devices, security, and Transp., Nat. Highway Traffic, Washington, DC, USA, Tech. Rep. DOT
HS 812 013, May 2015.
safety all of which will ultimately help reduce the lack of [19] Traffic Safety Facts Research Note: 2015 Motor Vehicle Crashes
coordination and communication among vehicles and improve Overview, Nat. Highway Traffic Safety, Washington, DC, USA,
products, services, and experiences. Aug. 2016.
[20] “The future economic and environmental costs of gridlock in 2030,”
INRIX, Kirkland, WA, USA, Tech. Rep., Jul. 2014. [Online]. Available:
ACKNOWLEDGMENT http://inrix.com/download-the-inrix-cost-of-congestion-report-2/
[21] A. Mai and D. Schlesinger, Connected Vehicles and Government:
The authors would like to thank the anonymous reviewers A Catalyst to Unlock the Societal Benefits of Transportation, Cisco
for their valuable comments, which helped them to improve Internet Bus. Solutions Group, San Jose, CA, USA, and Safety Admin.,
Washington, DC, USA, 2011.
the presentation of this paper. [22] R. Viereckl, D. Ahlemann, J. Assmann, and S. Bratzel. (2014).
Racing Ahead the Connected c@r 2014 Study. pp. 1–11, accessed on
Apr. 13, 2017. [Online]. Available: https://www.strategyand.pwc.com/
R EFERENCES media/file/Racing-ahead.pdf
[1] Org. Int. Constructeurs d’Automobiles. (2014). Number of Passenger [23] L. Nanjie, “Internet of Vehicles your next connection,” WinWin
Cars and Commercial Vehicles in Use Worldwide From 2006 to Mag., vol. 12, no. 11, pp. 23–28, Dec. 2011. Accessed on
2014 in (1,000 Units). Accessed on Sep. 16, 2016. [Online]. Available: Apr. 13, 2017. [Online] Available: http://www.huawei.com/en/
http://www.statista.com/statistics/281134/number-of-vehicles-in-use- publications/winwin-magazine/11/HW_110848
worldwide/ [24] K. Golestan, R. Soua, F. Karray, and M. Kamel, “Situation
[2] J. Voelcker. (Aug. 2011). It’s Official: We Now Have One Billion awareness within the context of connected cars: A comprehen-
Vehicles on the Planet. Accessed on Sep. 16, 2016. [Online]. Available: sive review and recent trends,” Inf. Fusion, vol. 29, pp. 6–83,
http://www.greencarreports.com/news/1065070_its-official-we-now- May 2016.
have-one-billion-vehicles-on-the-planet [25] F. Bonomi, The Smart and Connected Vehicle and the Internet of Things,
[3] S. Al-Sultan, M. M. Al-Doori, A. H. Al-Bayatti, and H. Zedan, “A com- WSTS, San Jose, CA, USA, 2013.
prehensive survey on vehicular ad hoc network,” J. Netw. Comput. Appl., [26] M. Miche and T. M. Bohnert, “The Internet of Vehicles or the
vol. 37, pp. 380–392, Jan. 2014. second generation of telematic services,” ERCIM News, vol. 77,
[4] J. Raymond, “The Internet of Things: A study in hyper, reality, dis- pp. 43–45, 2009. Accessed on Apr. 13, 2017. [Online]. Available:
ruption and growth,” U.S. Res. Published Raymond James Assoc., https://ercim-news.ercim.eu/images/stories/EN77/EN77-web.pdf
St. Petersburg, FL, USA, Tech. Rep., 2014. [27] J. Contreras-Castillo, S. Zeadally, and J. A. Guerrero-Ibañez, “Solving
[5] M. Chaqfeh, A. Lakas, and I. Jawhar, “A survey on data dissemination in vehicular ad hoc network challenges with big data solutions,” IET Netw.,
vehicular ad hoc networks,” Veh. Commun., vol. 1, no. 4, pp. 214–225, vol. 5, no. 4, pp. 81–84, Jul. 2016.
Oct. 2014. [28] New Connected Car Standards Put Europe Into Top Gear, Eur.
[6] S. Zeadally, R. Hunt, Y.-S. Chen, A. Irwin, and A. Hassan, “Vehicular Commission, Brussels, Belgium, Feb. 2014. [Online]. Available:
ad hoc networks (VANETs): Status, results, and challenges,” Telecomun. http://europa.eu/rapid/press-release_IP-14-141_en.pdf
Syst., vol. 50, no. 4, pp. 217–241, 2012. [29] A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and
[7] J. T. Isaac, S. Zeadally, and J. S. Camara, “Security attacks and solu- M. Ayyash, “Internet of Things: A survey on enabling technologies, pro-
tions for vehicular ad hoc networks,” IET Commun. J., vol. 4, no. 7, tocols, and applications,” IEEE Commun. Surveys Tuts., vol. 17, no. 4,
pp. 894–903, Apr. 2010. pp. 2347–2376, 1st Quart., 2015.
[8] J. Guerrero-Ibanez, C. Flores-Cortes, and S. Zeadally, “Vehicular ad-hoc [30] J. B. Kenney, “Dedicated short-range communications (DSRC) stan-
networks (VANETs): Architecture, protocols, and applications,” in Next dards in the United States,” Proc. IEEE, vol. 99, no. 7, pp. 1162–1182,
Generation Wireless Technologies: 4G and Beyond, N. Chilamkurti, Jul. 2011.
S. Zeadally, and H. Chaouchi, Eds. London, U.K.: Springer, 2013, [31] “Intelligent Transport Systems (ITS); radiocommunications equipment
ch. 5. operating in the 5 855 MHz to 5 925 MHz frequency band,” ETSI,
[9] G. Dimitrakopoulos, “Intelligent transportation systems based on Sophia Antipolis, France, Tech. Rep. ETSI EN 302 571 (V1.1.1),
Internet-connected vehicles: Fundamental research areas and chal- 2013.
lenges,” in Proc. 11th Int. Conf. ITS Telecommun., St. Petersburg, Russia, [32] Y.-B. Ko, V. Shankarkumar, and N. H. Vaidya, “Medium access control
Aug. 2011, pp. 145–151. protocols using directional antennas in ad hoc networks,” in Proc. 19th
[10] Y. Fangchun, W. Shangguang, L. Jinglin, L. Zhihan, and S. Qibo, “An Annu. Joint Conf. IEEE Comput. Commun. Soc. (INFOCOM), Tel Aviv,
overview of Internet of Vehicles,” China Commun. Veh. Netw., vol. 11, Israel, 2000, pp. 13–21.
no. 10, pp. 1–15, Oct. 2014. [33] F. Borgonovo, A. Capone, M. Cesana, and L. Fratta, “ADHOC MAC:
[11] M. Nitti, R. Girau, A. Floris, and L. Atzori, “On adding the social dimen- New MAC architecture for ad hoc networks providing efficient and
sion to the Internet of Vehicles: Friendship and middleware,” in Proc. reliable point-to-point and broadcast services,” Wireless Netw., vol. 10,
IEEE Int. Black Sea Conf. Commun. Netw., Odessa, Ukraine, May 2014, no. 4, pp. 359–366, Jul. 2004.
pp. 134–138. [34] J. Zhang, Q. Zhang, and W. Jia, “Vc-MAC: A cooperative MAC pro-
[12] J. A. Guerrero-Ibanez, S. Zeadally, and J. Contreras-Castillo, tocol in vehicular networks,” IEEE Trans. Veh. Technol., vol. 58, no. 3,
“Integration challenges of intelligent transportation systems with con- pp. 1561–1571, Mar. 2009.
nected vehicle, cloud computing, and Internet of Things technologies,” [35] J. Cheng et al., “Routing in Internet of Vehicles: A review,” IEEE Trans.
IEEE Wireless Commun., vol. 22, no. 6, pp. 122–128, Dec. 2015. Intell. Transp. Syst., vol. 16, no. 5, pp. 2339–2352, Oct. 2015.
[13] IRF World Road Statistics Database, 2008; World Bank Global Road [36] A. Bachir and A. Benslimane, “A multicast protocol in ad hoc networks
Safety Facility, 2010, Cisco IBSG, San Jose, CA, USA, 2011. inter-vehicle geocast,” in Proc. 57th IEEE Semiannu. VTC Spring, vol. 4.
[14] F. Cunha et al., “Data communication in VANETs: Protocols, applica- 2003, pp. 2456–2460.
tions and challenges,” Ad Hoc Netw., vol. 44, pp. 90–103, Jul. 2016. [37] C. Maihofer and R. Eberhardt, “Geocast in vehicular environ-
[15] “Transportation cost and benefits analysis II—Vehicle costs,” Dept. ments: Caching and transmission range control for improved effi-
Transp., Amer. Automobile Assoc., Heathrow, FL, USA, and ciency,” in Proc. IEEE Intell. Veh. Symp., Parma, Italy, 2004,
Victoria Transp. Policy Inst., Victoria, BC, Canada, Tech. Rep., 2015. pp. 951–956.
Authorized licensed use limited to: AMRITA VISHWA VIDYAPEETHAM AMRITA SCHOOL OF ENGINEERING. Downloaded on May 16,2024 at 16:43:41 UTC from IEEE Xplore. Restrictions apply.
CONTRERAS-CASTILLO et al.: IoV: ARCHITECTURE, PROTOCOLS, AND SECURITY 3709
[38] G. Korkmaz, E. Ekici, F. Özgüner, and Ü. Özgüner, “Urban multi-hop [58] J. Hickey, Vice President, Vínsula. Telephone Interview, Seattle, WA,
broadcast protocol for inter-vehicle communication systems,” in Proc. USA, Oct. 2012.
1st ACM Int. Workshop Veh. Ad Hoc Netw., Philadelphia, PA, USA, [59] (Feb. 12, 2014). National Institute of Standards and
2004, pp. 76–85. Technology (NIST): Framework for Improving Critical
[39] M. Durresi, A. Durresi, and L. Barolli, “Emergency broadcast proto- Infrastructure Cybersecurity. [Online]. Available: http://www.nist.gov/
col for inter-vehicle communications,” in Proc. 11th Int. Conf. Parallel cyberframework/upload/cybersecurity-framework-021214-final.pdf
Distrib. Syst., vol. 2. Fukuoka, Japan, 2005, pp. 402–406. [60] L. Zhang, Q. Wu, B. Qin, J. Domingo-Ferrer, and B. Liu, “Practical
[40] M. Hager, L. Wernecke, C. Schneider, and J. Seitz, “Vehicular ad hoc secure and privacy-preserving scheme for value-added applications in
networks: Multi-hop information dissemination in an urban scenario,” in VANETs,” Comput. Commun., vol. 71, pp. 50–60, Nov. 2015.
38th Int. Conf. Telecommun. Signal Process., Prague, Czech Republic, [61] K. Emara, W. Woerndl, and J. Schlichter, “On evaluation of location
2015. pp. 65–70, doi: 10.1109/TSP.2015.7296225. privacy preserving schemes for VANET safety applications,” Comput.
[41] R. S. Yokoyama, B. Y. L. Kimura, L. M. S. Jaimes, and E. D. S. Moreira, Commun., vol. 63, pp. 11–23, Jun. 2015.
“A beaconing-based opportunistic service discovery protocol for vehic- [62] D. A. Rivas, J. M. Barceló-Ordinas, M. G. Zapata, and
ular networks,” in Proc. 28th Int. Conf. Adv. Inf. Netw. Appl. J. D. Morillo-Pozo, “Security on VANETs: Privacy, misbehaving
Workshops (WAINA), Victoria, BC, Canada, May 2014, pp. 498–503. nodes, false information and secure data aggregation,” J. Netw. Comput.
[42] S. E. Carpenter, “Obstacle shadowing influences in VANET safety,” in Appl., vol. 34, no. 6, pp. 1942–1955, 2011.
Proc. IEEE 22nd Int. Conf. Netw. Protocols (ICNP), Raleigh, NC, USA, [63] B. Mokhtar and M. Azab, “Survey on security issues in vehicular ad
2014, pp. 480–482. hoc networks,” Alexandria Eng. J., vol. 54, no. 4, pp. 1115–1126, 2015.
[43] A. Tahmasbi-Sarvestani, Y. P. Fallah, and V. Kulathumani, “Network- [64] “White paper of Internet of Vehicles,” in Proc. 50th Telecommun. Inf.
aware double-layer distance-dependent broadcast protocol for VANETs,” Working Group Meeting, Brisbane, QLD, Australia, Sep./Oct. 2014,
IEEE Trans. Veh. Technol., vol. 64, no. 12, pp. 5536–5546, Dec. 2015. pp. 1–7.
[44] J. Zhao and G. Cao, “VADD: Vehicle-assisted data delivery in vehic- [65] M. Lengton, D. Verzijl, and K. Dervojeda, Internet of Things, Connected
ular ad hoc networks,” IEEE Trans. Veh. Technol., vol. 57, no. 3, Cars. Business Innovation Observatory, Eur. Union, Brussels, Belgium,
pp. 1910–1922, May 2008. Feb. 2015.
[45] G. Li and L. Boukhatem, “A delay-sensitive vehicular routing protocol
using ant colony optimization,” in Proc. 12th MED-HOC-NET, Ajaccio,
France, 2013, pp. 49–54.
[46] B. Khanna, J. Redi, P. Basu, and R. Ramanathan, “Disrupted adaptive
routing: Gossip-based routing in delay-tolerant networks,” in Proc. IEEE
MILCOM, San Diego, CA, USA, 2013, pp. 1099–1104.
[47] U. Lee, S. Y. Oh, K.-W. Lee, and M. Gerla, “RelayCast: Scalable Juan Contreras-Castillo received the B.S. degree in computer systems from
multicast routing in delay tolerant networks,” in Proc. IEEE ICNP, the University of Colima, Colima, Mexico, in 1996, and the M.Sc. degree in
Orlando, FL, USA, 2008, pp. 218–227. computer sciences and Ph.D. degree in telecommunications from the Centro de
[48] K.-Y. Ho, P.-C. Kang, C.-H. Hsu, and C.-H. Lin, “Implementation of Investigación Científica y Educaci Superior de Ensenada (CICESE), Ensenada,
WAVE/DSRC devices for vehicular communications,” in Proc. 3CA, Mexico, in 1998 and 2003, respectively.
vol. 2. Tainan, Taiwan, 2010, pp. 522–525. He is a Full Professor of computer sciences with the School of Telematics,
[49] P. D. Dorge, S. S. Dorle, M. B. Chakole, and D. K. Thote, “Improvement University of Colima. His current research interests include ubiquitous com-
of QoS in VANET with different mobility patterns,” in Proc. ICRCC, puting, distance learning, mobile learning, wireless sensor networks, and
Tiruvannamalai, India, 2012, pp. 206–209. vehicular ad hoc networks.
[50] K. Shafiee, A. Attar, and V. C. M. Leung, “Optimal distributed vertical
handoff strategies in vehicular heterogeneous networks,” IEEE J. Sel.
Areas Commun., vol. 29, no. 3, pp. 534–544, Mar. 2011.
[51] Y. Li, K. Ying, P. Cheng, H. Yu, and H. Luo, “Cooperative data dissem-
ination in cellular-VANET heterogeneous wireless networks,” in Proc.
4th HSIC, Nanjing, China, 2012, pp. 1–4. Sherali Zeadally received the bachelor’s degree in computer science from the
[52] Q. Zhao, Y. Zhu, C. Chen, H. Zhu, and B. Li, “When 3G Meets VANET: University of Cambridge, Cambridge, U.K., in 1991, and the doctoral degree
3G-assisted data delivery in VANETs,” IEEE Sensors J., vol. 13, no. 10, in computer science from the University of Buckingham, Buckingham, U.K.,
pp. 3575–3584, Oct. 2013. in 1996.
[53] S. H. Ahmed et al., “CODIE: Controlled data and interest evaluation He is an Associate Professor with the College of Communication and
in vehicular named data networks,” IEEE Trans. Veh. Technol., vol. 65, Information, University of Kentucky, Lexington, KY, USA.
no. 6, pp. 3954–3963, Jun. 2016. Dr. Zeadally is a Fellow of the British Computer Society and the Institution
[54] S. H. Ahmed, M. A. Yaqub, S. H. Bouk, and D. Kim, “SmartCop: of Engineering Technology, U.K.
Enabling smart traffic violations ticketing in vehicular named data net-
works,” Mobile Inf. Syst., vol. 2016, May 2016, Art. no. 1353290,
doi: 10.1155/2016/1353290.
[55] T. Zhang, Securing Connected Vehicles: Challenges and Opportunities,
CISCO Syst., San Jose, CA, USA, Dec. 2015. [Online]. Available:
http: // sites.ieee.org/ denver-com/ files/2016/02/ IoV-Security-Challenges-
and-Opportunities-zhang.pdf Juan Antonio Guerrero-Ibañez received the M.Sc. degree from the
[56] L. Reger, Addressing the Security of the Connected Car, University of Colima (UDC), Colima, Mexico, in 1999, and the Ph.D. degree
NXP Blog, Eindhoven, The Netherlands, 2014. [Online]. Available: in telematics engineering from the Universitat Politecnica de Catalunya (UPC),
http://blog.nxp.com/addressing-the-security-of-the-connected-car/ Barcelona, Spain, in 2008.
[57] D. Yadron, “Hackers demonstrate how to take control of cars,” He is a Full Professor and a member of the Telecommunication and
in Proc. Black Hat Security Conf., Las Vegas, NV, USA, Networks Group, School of Telematics, UDC. His current research inter-
2015. [Online]. Available: http://www.wsj.com/articles/hacking-cars- ests include networking and QoS provision, wireless sensor networks, and
to-take-focus-at-black-hat-conference-1438723360?mod=videorelated vehicular ad hoc networks.
Authorized licensed use limited to: AMRITA VISHWA VIDYAPEETHAM AMRITA SCHOOL OF ENGINEERING. Downloaded on May 16,2024 at 16:43:41 UTC from IEEE Xplore. Restrictions apply.