Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (61)

Search Parameters:
Keywords = iov safety

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
36 pages, 8047 KiB  
Article
Fed-DTB: A Dynamic Trust-Based Framework for Secure and Efficient Federated Learning in IoV Networks: Securing V2V/V2I Communication
by Ahmed Alruwaili, Sardar Islam and Iqbal Gondal
J. Cybersecur. Priv. 2025, 5(3), 48; https://doi.org/10.3390/jcp5030048 - 19 Jul 2025
Viewed by 484
Abstract
The Internet of Vehicles (IoV) presents a vast opportunity for optimised traffic flow, road safety, and enhanced usage experience with the influence of Federated Learning (FL). However, the distributed nature of IoV networks creates certain inherent problems regarding data privacy, security from adversarial [...] Read more.
The Internet of Vehicles (IoV) presents a vast opportunity for optimised traffic flow, road safety, and enhanced usage experience with the influence of Federated Learning (FL). However, the distributed nature of IoV networks creates certain inherent problems regarding data privacy, security from adversarial attacks, and the handling of available resources. This paper introduces Fed-DTB, a new dynamic trust-based framework for FL that aims to overcome these challenges in the context of IoV. Fed-DTB integrates the adaptive trust evaluation that is capable of quickly identifying and excluding malicious clients to maintain the authenticity of the learning process. A performance comparison with previous approaches is shown, where the Fed-DTB method improves accuracy in the first two training rounds and decreases the per-round training time. The Fed-DTB is robust to non-IID data distributions and outperforms all other state-of-the-art approaches regarding the final accuracy (87–88%), convergence rate, and adversary detection (99.86% accuracy). The key contributions include (1) a multi-factor trust evaluation mechanism with seven contextual factors, (2) correlation-based adaptive weighting that dynamically prioritises trust factors based on vehicular conditions, and (3) an optimisation-based client selection strategy that maximises collaborative reliability. This work opens up opportunities for more accurate, secure, and private collaborative learning in future intelligent transportation systems with the help of federated learning while overcoming the conventional trade-off of security vs. efficiency. Full article
Show Figures

Figure 1

9 pages, 3532 KiB  
Article
Design and Validation of a Lightweight Entropy-Based Intrusion Detection Algorithm for Automotive CANs
by Jiacheng Chen and Zhifu Wang
World Electr. Veh. J. 2025, 16(6), 334; https://doi.org/10.3390/wevj16060334 - 18 Jun 2025
Viewed by 504
Abstract
The rapid devolopment of Internet of Vehicles (IoV) and Autonomous Connected Vehicles (ACVs) has increased the complexity of in-vehicle networks, exposing security vulnerabilities in traditional Controller Area Network (CAN) systems. CAN security faces dual challenges: stringent computational constraints imposed by automotive functional safety [...] Read more.
The rapid devolopment of Internet of Vehicles (IoV) and Autonomous Connected Vehicles (ACVs) has increased the complexity of in-vehicle networks, exposing security vulnerabilities in traditional Controller Area Network (CAN) systems. CAN security faces dual challenges: stringent computational constraints imposed by automotive functional safety requirements and the impracticality of protocol modifications in multi-device networks. To address this, we propose a lightweight intrusion detection algorithm leveraging information entropy to analyze side-channel CAN message ID distributions. Evaluated in terms of detection accuracy, false positive rate, and sensitivity to bus load variations, the algorithm was implemented on an NXP MPC-5748G embedded platform through the AutoSar Framework. Experimental results demonstrate robust performance under low computational resources, achieving high detection accuracy with high recall (>80%) even at 10% bus load fluctuation thresholds. This work provides a resource-efficient security framework compatible with existing CAN infrastructures, effectively balancing attack detection efficacy with the operational constraints of automotive embedded systems. Full article
Show Figures

Figure 1

28 pages, 1881 KiB  
Article
Enabling Collaborative Forensic by Design for the Internet of Vehicles
by Ahmed M. Elmisery and Mirela Sertovic
Information 2025, 16(5), 354; https://doi.org/10.3390/info16050354 - 28 Apr 2025
Viewed by 564
Abstract
The progress in automotive technology, communication protocols, and embedded systems has propelled the development of the Internet of Vehicles (IoV). In this system, each vehicle acts as a sophisticated sensing platform that collects environmental and vehicular data. These data assist drivers and infrastructure [...] Read more.
The progress in automotive technology, communication protocols, and embedded systems has propelled the development of the Internet of Vehicles (IoV). In this system, each vehicle acts as a sophisticated sensing platform that collects environmental and vehicular data. These data assist drivers and infrastructure engineers in improving navigation safety, pollution control, and traffic management. Digital artefacts stored within vehicles can serve as critical evidence in road crime investigations. Given the interconnected and autonomous nature of intelligent vehicles, the effective identification of road crimes and the secure collection and preservation of evidence from these vehicles are essential for the successful implementation of the IoV ecosystem. Traditional digital forensics has primarily focused on in-vehicle investigations. This paper addresses the challenges of extending artefact identification to an IoV framework and introduces the Collaborative Forensic Platform for Electronic Artefacts (CFPEA). The CFPEA framework implements a collaborative forensic-by-design mechanism that is designed to securely collect, store, and share artefacts from the IoV environment. It enables individuals and groups to manage artefacts collected by their intelligent vehicles and store them in a non-proprietary format. This approach allows crime investigators and law enforcement agencies to gain access to real-time and highly relevant road crime artefacts that have been previously unknown to them or out of their reach, while enabling vehicle owners to monetise the use of their sensed artefacts. The CFPEA framework assists in identifying pertinent roadside units and evaluating their datasets, enabling the autonomous extraction of evidence for ongoing investigations. Leveraging CFPEA for artefact collection in road crime cases offers significant benefits for solving crimes and conducting thorough investigations. Full article
(This article belongs to the Special Issue Information Sharing and Knowledge Management)
Show Figures

Figure 1

20 pages, 1435 KiB  
Article
Hardware Acceleration-Based Privacy-Aware Authentication Scheme for Internet of Vehicles Using Physical Unclonable Function
by Ujunwa Madububa Mbachu, Rabeea Fatima, Ahmed Sherif, Elbert Dockery, Mohamed Mahmoud, Maazen Alsabaan and Kasem Khalil
Sensors 2025, 25(5), 1629; https://doi.org/10.3390/s25051629 - 6 Mar 2025
Viewed by 1195
Abstract
Due to technological advancement, the advent of smart cities has facilitated the deployment of advanced urban management systems. This integration has been made possible through the Internet of Vehicles (IoV), a foundational technology. By connecting smart cities with vehicles, the IoV enhances the [...] Read more.
Due to technological advancement, the advent of smart cities has facilitated the deployment of advanced urban management systems. This integration has been made possible through the Internet of Vehicles (IoV), a foundational technology. By connecting smart cities with vehicles, the IoV enhances the safety and efficiency of transportation. This interconnected system facilitates wireless communication among vehicles, enabling the exchange of crucial traffic information. However, this significant technological advancement also raises concerns regarding privacy for individual users. This paper presents an innovative privacy-preserving authentication scheme focusing on IoV using physical unclonable functions (PUFs). This scheme employs the k-nearest neighbor (KNN) encryption technique, which possesses a multi-multi searching property. The main objective of this scheme is to authenticate autonomous vehicles (AVs) within the IoV framework. An innovative PUF design is applied to generate random keys for our authentication scheme to enhance security. This two-layer security approach protects against various cyber-attacks, including fraudulent identities, man-in-the-middle attacks, and unauthorized access to individual user information. Due to the substantial amount of information that needs to be processed for authentication purposes, our scheme is implemented using hardware acceleration on an Nexys A7-100T FPGA board. Our analysis of privacy and security illustrates the effective accomplishment of specified design goals. Furthermore, the performance analysis reveals that our approach imposes a minimal communication and computational burden and optimally utilizes hardware resources to accomplish design objectives. The results show that the proposed authentication scheme exhibits a non-linear increase in encryption time with a growing AV ID size, starting at 5μs for 100 bits and rising to 39 μs for 800 bits. Also, the result demonstrates a more gradual, linear increase in the search time with a growing AV ID size, starting at less than 1 μs for 100 bits and rising to less than 8 μs for 800 bits. Additionally, for hardware utilization, our scheme uses only 25% from DSP slides and IO pins, 22.2% from BRAM, 5.6% from flip-flops, and 24.3% from LUTs. Full article
Show Figures

Figure 1

23 pages, 4200 KiB  
Article
IoV and Blockchain for Traffic Optimization in Ro-Ro Terminals: A Case Study in the Spanish Port System
by Nicoletta González-Cancelas, Javier Vaca-Cabrero and Alberto Camarero-Orive
Future Internet 2025, 17(3), 99; https://doi.org/10.3390/fi17030099 - 22 Feb 2025
Cited by 1 | Viewed by 1044
Abstract
This study examines the integration of the Internet of Vehicles (IoV) and blockchain as tools to optimize traffic management in Roll-on/Roll-off (Ro-Ro) terminals within the Spanish port system. Faced with increasing operational complexity, these technologies present innovative solutions to enhance efficiency, reduce waiting [...] Read more.
This study examines the integration of the Internet of Vehicles (IoV) and blockchain as tools to optimize traffic management in Roll-on/Roll-off (Ro-Ro) terminals within the Spanish port system. Faced with increasing operational complexity, these technologies present innovative solutions to enhance efficiency, reduce waiting times, and ensure transparency in data management. The methodology follows five main phases: analysis of the current scenario, establishment of a baseline, calculations to evaluate key outcomes, analysis of blockchain implementation, and discussion of results. Key variables include waiting times, vehicular flow, CO2 emissions, and operational costs, comparing manual and automated scenarios. The findings reveal that the combined use of IoV and blockchain can increase vehicular flow by up to 70%, reduce waiting times by 2.56 min, and decrease CO2 emissions by 57.74 kg per hour. Additionally, automation significantly reduces operational costs, yielding average savings of over EUR 500 per hour. This study concludes that adopting these technologies transforms port operations by fostering sustainability, efficiency, and safety. However, challenges remain, including high initial implementation costs and system interoperability issues. This work underscores the need for strategic approaches to overcome these barriers and positions Spanish ports as potential leaders in logistics innovation, aligning with global demands for sustainable, efficient, and transparent port operations. Full article
(This article belongs to the Special Issue Blockchain-Based Internet of Vehicles)
Show Figures

Figure 1

57 pages, 21747 KiB  
Review
Innovative Driver Monitoring Systems and On-Board-Vehicle Devices in a Smart-Road Scenario Based on the Internet of Vehicle Paradigm: A Literature and Commercial Solutions Overview
by Paolo Visconti, Giuseppe Rausa, Carolina Del-Valle-Soto, Ramiro Velázquez, Donato Cafagna and Roberto De Fazio
Sensors 2025, 25(2), 562; https://doi.org/10.3390/s25020562 - 19 Jan 2025
Cited by 3 | Viewed by 9202
Abstract
In recent years, the growing number of vehicles on the road have exacerbated issues related to safety and traffic congestion. However, the advent of the Internet of Vehicles (IoV) holds the potential to transform mobility, enhance traffic management and safety, and create smarter, [...] Read more.
In recent years, the growing number of vehicles on the road have exacerbated issues related to safety and traffic congestion. However, the advent of the Internet of Vehicles (IoV) holds the potential to transform mobility, enhance traffic management and safety, and create smarter, more interconnected road networks. This paper addresses key road safety concerns, focusing on driver condition detection, vehicle monitoring, and traffic and road management. Specifically, various models proposed in the literature for monitoring the driver’s health and detecting anomalies, drowsiness, and impairment due to alcohol consumption are illustrated. The paper describes vehicle condition monitoring architectures, including diagnostic solutions for identifying anomalies, malfunctions, and instability while driving on slippery or wet roads. It also covers systems for classifying driving style, as well as tire and emissions monitoring. Moreover, the paper provides a detailed overview of the proposed traffic monitoring and management solutions, along with systems for monitoring road and environmental conditions, including the sensors used and the Machine Learning (ML) algorithms implemented. Finally, this review also presents an overview of innovative commercial solutions, illustrating advanced devices for driver monitoring, vehicle condition assessment, and traffic and road management. Full article
Show Figures

Figure 1

21 pages, 1422 KiB  
Article
Multi-Agent Reinforcement Learning for Efficient Resource Allocation in Internet of Vehicles
by Jun-Han Wang, He He, Jaesang Cha, Incheol Jeong and Chang-Jun Ahn
Electronics 2025, 14(1), 192; https://doi.org/10.3390/electronics14010192 - 5 Jan 2025
Cited by 2 | Viewed by 2387
Abstract
The Internet of Vehicles (IoV), a burgeoning technology, merges advancements in the internet, vehicle electronics, and wireless communications to foster intelligent vehicle interactions, thereby enhancing the efficiency and safety of transportation systems. Nonetheless, the continual and high-frequency communications among vehicles, coupled with regional [...] Read more.
The Internet of Vehicles (IoV), a burgeoning technology, merges advancements in the internet, vehicle electronics, and wireless communications to foster intelligent vehicle interactions, thereby enhancing the efficiency and safety of transportation systems. Nonetheless, the continual and high-frequency communications among vehicles, coupled with regional limitations in system capacity, precipitate significant challenges in allocating wireless resources for vehicular networks. In addressing these challenges, this study formulates the resource allocation issue as a multi-agent deep reinforcement learning scenario and introduces a novel multi-agent actor-critic framework. This framework incorporates a prioritized experience replay mechanism focused on distributed execution, which facilitates decentralized computing by structuring the training processes and defining specific reward functions, thus optimizing resource allocation. Furthermore, the framework prioritizes empirical data during the training phase based on the temporal difference error (TD error), selectively updating the network with high-priority data at each sampling point. This strategy not only accelerates model convergence but also enhances the learning efficacy. The empirical validations confirm that our algorithm augments the total capacity of vehicle-to-infrastructure (V2I) links by 9.36% and the success rate of vehicle-to-vehicle (V2V) transmissions by 6.74% compared with a benchmark algorithm. Full article
Show Figures

Figure 1

30 pages, 6901 KiB  
Article
EPRNG: Effective Pseudo-Random Number Generator on the Internet of Vehicles Using Deep Convolution Generative Adversarial Network
by Chenyang Fei, Xiaomei Zhang, Dayu Wang, Haomin Hu, Rong Huang and Zejie Wang
Information 2025, 16(1), 21; https://doi.org/10.3390/info16010021 - 3 Jan 2025
Cited by 1 | Viewed by 1293
Abstract
With the increasing connectivity and automation on the Internet of Vehicles, safety, security, and privacy have become stringent challenges. In the last decade, several cryptography-based protocols have been proposed as intuitive solutions to protect vehicles from information leakage and intrusions. Before generating the [...] Read more.
With the increasing connectivity and automation on the Internet of Vehicles, safety, security, and privacy have become stringent challenges. In the last decade, several cryptography-based protocols have been proposed as intuitive solutions to protect vehicles from information leakage and intrusions. Before generating the encryption keys, a random number generator (RNG) plays an important component in cybersecurity. Several deep learning-based RNGs have been deployed to train the initial value and generate pseudo-random numbers. However, interference from actual unpredictable driving environments renders the system unreliable for its low-randomness outputs. Furthermore, dynamics in the training process make these methods subject to training instability and pattern collapse by overfitting. In this paper, we propose an Effective Pseudo-Random Number Generator (EPRNG) which exploits a deep convolution generative adversarial network (DCGAN)-based approach using our processed vehicle datasets and entropy-driven stopping method-based training processes for the generation of pseudo-random numbers. Our model starts from the vehicle data source to stitch images and add noise to enhance the entropy of the images and then inputs them into our network. In addition, we design an entropy-driven stopping method that enables our model training to stop at the optimal epoch so as to prevent overfitting. The results of the evaluation indicate that our entropy-driven stopping method can effectively generate pseudo-random numbers in a DCGAN. Our numerical experiments on famous test suites (NIST, ENT) demonstrate the effectiveness of the developed approach in high-quality random number generation for the IoV. Furthermore, the PRNGs are successfully applied to image encryption, and the performance metrics of the encryption are close to ideal values. Full article
Show Figures

Graphical abstract

44 pages, 5949 KiB  
Review
Review of Authentication, Blockchain, Driver ID Systems, Economic Aspects, and Communication Technologies in DWC for EVs in Smart Cities Applications
by Narayanamoorthi Rajamanickam, Pradeep Vishnuram, Dominic Savio Abraham, Miroslava Gono, Petr Kacor and Tomas Mlcak
Smart Cities 2024, 7(6), 3121-3164; https://doi.org/10.3390/smartcities7060122 - 24 Oct 2024
Viewed by 1800
Abstract
The rapid advancement and adoption of electric vehicles (EVs) necessitate innovative solutions to address integration challenges in modern charging infrastructure. Dynamic wireless charging (DWC) is an innovative solution for powering electric vehicles (EVs) using multiple magnetic transmitters installed beneath the road and a [...] Read more.
The rapid advancement and adoption of electric vehicles (EVs) necessitate innovative solutions to address integration challenges in modern charging infrastructure. Dynamic wireless charging (DWC) is an innovative solution for powering electric vehicles (EVs) using multiple magnetic transmitters installed beneath the road and a receiver located on the underside of the EV. Dynamic charging offers a solution to the issue of range anxiety by allowing EVs to charge while in motion, thereby reducing the need for frequent stops. This manuscript reviews several pivotal areas critical to the future of EV DWC technology such as authentication techniques, blockchain applications, driver identification systems, economic aspects, and emerging communication technologies. Ensuring secure access to this charging infrastructure requires fast, lightweight authentication systems. Similarly, blockchain technology plays a critical role in enhancing the Internet of Vehicles (IoV) architecture by decentralizing and securing vehicular networks, thus improving privacy, security, and efficiency. Driver identification systems, crucial for EV safety and comfort, are analyzed. Additionally, the economic feasibility and impact of DWC are evaluated, providing essential insights into its potential effects on the EV ecosystem. The paper also emphasizes the need for quick and lightweight authentication systems to ensure secure access to DWC infrastructure and discusses how blockchain technology enhances the efficiency, security, and privacy of IoV networks. The importance of driver identification systems for comfort and safety is evaluated, and an economic study confirms the viability and potential benefits of DWC for the EV ecosystem. Full article
Show Figures

Figure 1

23 pages, 4649 KiB  
Article
A Decentralized Digital Watermarking Framework for Secure and Auditable Video Data in Smart Vehicular Networks
by Xinyun Liu, Ronghua Xu and Yu Chen
Future Internet 2024, 16(11), 390; https://doi.org/10.3390/fi16110390 - 24 Oct 2024
Cited by 5 | Viewed by 1757
Abstract
Thanks to the rapid advancements in Connected and Automated Vehicles (CAVs) and vehicular communication technologies, the concept of the Internet of Vehicles (IoVs) combined with Artificial Intelligence (AI) and big data promotes the vision of an Intelligent Transportation System (ITS). An ITS is [...] Read more.
Thanks to the rapid advancements in Connected and Automated Vehicles (CAVs) and vehicular communication technologies, the concept of the Internet of Vehicles (IoVs) combined with Artificial Intelligence (AI) and big data promotes the vision of an Intelligent Transportation System (ITS). An ITS is critical in enhancing road safety, traffic efficiency, and the overall driving experience by enabling a comprehensive data exchange platform. However, the open and dynamic nature of IoV networks brings significant performance and security challenges to IoV data acquisition, storage, and usage. To comprehensively tackle these challenges, this paper proposes a Decentralized Digital Watermarking framework for smart Vehicular networks (D2WaVe). D2WaVe consists of two core components: FIAE-GAN, a novel feature-integrated and attention-enhanced robust image watermarking model based on a Generative Adversarial Network (GAN), and BloVA, a Blockchain-based Video frames Authentication scheme. By leveraging an encoder–noise–decoder framework, trained FIAE-GAN watermarking models can achieve the invisibility and robustness of watermarks that can be embedded in video frames to verify the authenticity of video data. BloVA ensures the integrity and auditability of IoV data in the storing and sharing stages. Experimental results based on a proof-of-concept prototype implementation validate the feasibility and effectiveness of our D2WaVe scheme for securing and auditing video data exchange in smart vehicular networks. Full article
Show Figures

Figure 1

20 pages, 3271 KiB  
Article
Smart Collaborative Intrusion Detection System for Securing Vehicular Networks Using Ensemble Machine Learning Model
by Mostafa Mahmoud El-Gayar, Faheed A. F. Alrslani and Shaker El-Sappagh
Information 2024, 15(10), 583; https://doi.org/10.3390/info15100583 - 24 Sep 2024
Cited by 7 | Viewed by 2497
Abstract
The advent of the Fourth Industrial Revolution has positioned the Internet of Things as a pivotal force in intelligent vehicles. With the source of vehicle-to-everything (V2X), Internet of Things (IoT) networks, and inter-vehicle communication, intelligent connected vehicles are at the forefront of this [...] Read more.
The advent of the Fourth Industrial Revolution has positioned the Internet of Things as a pivotal force in intelligent vehicles. With the source of vehicle-to-everything (V2X), Internet of Things (IoT) networks, and inter-vehicle communication, intelligent connected vehicles are at the forefront of this transformation, leading to complex vehicular networks that are crucial yet susceptible to cyber threats. The complexity and openness of these networks expose them to a plethora of cyber-attacks, from passive eavesdropping to active disruptions like Denial of Service and Sybil attacks. These not only compromise the safety and efficiency of vehicular networks but also pose a significant risk to the stability and resilience of the Internet of Vehicles. Addressing these vulnerabilities, this paper proposes a Dynamic Forest-Structured Ensemble Network (DFSENet) specifically tailored for the Internet of Vehicles (IoV). By leveraging data-balancing techniques and dimensionality reduction, the DFSENet model is designed to detect a wide range of cyber threats effectively. The proposed model demonstrates high efficacy, with an accuracy of 99.2% on the CICIDS dataset and 98% on the car-hacking dataset. The precision, recall, and f-measure metrics stand at 95.6%, 98.8%, and 96.9%, respectively, establishing the DFSENet model as a robust solution for securing the IoV against cyber-attacks. Full article
(This article belongs to the Special Issue Intrusion Detection Systems in IoT Networks)
Show Figures

Graphical abstract

10 pages, 1662 KiB  
Data Descriptor
TM–IoV: A First-of-Its-Kind Multilabeled Trust Parameter Dataset for Evaluating Trust in the Internet of Vehicles
by Yingxun Wang, Adnan Mahmood, Mohamad Faizrizwan Mohd Sabri and Hushairi Zen
Data 2024, 9(9), 103; https://doi.org/10.3390/data9090103 - 31 Aug 2024
Cited by 1 | Viewed by 1963
Abstract
The emerging and promising paradigm of the Internet of Vehicles (IoV) employ vehicle-to-everything communication for facilitating vehicles to not only communicate with one another but also with the supporting roadside infrastructure, vulnerable pedestrians, and the backbone network in a bid to primarily address [...] Read more.
The emerging and promising paradigm of the Internet of Vehicles (IoV) employ vehicle-to-everything communication for facilitating vehicles to not only communicate with one another but also with the supporting roadside infrastructure, vulnerable pedestrians, and the backbone network in a bid to primarily address a number of safety-critical vehicular applications. Nevertheless, owing to the inherent characteristics of IoV networks, in particular, of being (a) highly dynamic in nature and which results in a continual change in the network topology and (b) non-deterministic owing to the intricate nature of its entities and their interrelationships, they are susceptible to a number of malicious attacks. Such kinds of attacks, if and when materialized, jeopardizes the entire IoV network, thereby putting human lives at risk. Whilst the cryptographic-based mechanisms are capable of mitigating the external attacks, the internal attacks are extremely hard to tackle. Trust, therefore, is an indispensable tool since it facilitates in the timely identification and eradication of malicious entities responsible for launching internal attacks in an IoV network. To date, there is no dataset pertinent to trust management in the context of IoV networks and the same has proven to be a bottleneck for conducting an in-depth research in this domain. The manuscript-at-hand, accordingly, presents a first of its kind trust-based IoV dataset encompassing 96,707 interactions amongst 79 vehicles at different time instances. The dataset involves nine salient trust parameters, i.e., packet delivery ratio, similarity, external similarity, internal similarity, familiarity, external familiarity, internal familiarity, reward/punishment, and context, which play a considerable role in ascertaining the trust of a vehicle within an IoV network. Full article
Show Figures

Figure 1

18 pages, 3787 KiB  
Article
Smart Contract-Based Right-of-Way Trade with Game Theory in Blockchain-Enabled Internet of Vehicles
by Cheng Li, Hao Wu, Yunlong Lu, Lei Xiong, Chen Dong and Jing Li
Appl. Sci. 2024, 14(6), 2492; https://doi.org/10.3390/app14062492 - 15 Mar 2024
Cited by 2 | Viewed by 1947
Abstract
The Internet of Vehicles (IoV) has a significant impact on improving traffic efficiency and driving safety. In this paper, we propose an intelligent transportation credit system based on blockchain, and design a crossroad passing smart contract that allows time-sensitive convoys to pass a [...] Read more.
The Internet of Vehicles (IoV) has a significant impact on improving traffic efficiency and driving safety. In this paper, we propose an intelligent transportation credit system based on blockchain, and design a crossroad passing smart contract that allows time-sensitive convoys to pass a crossroad earlier by paying traffic tokens for right-of-way trade. Second, this paper formulates the time–cost optimization problem under the premise of protecting the privacy of preceding convoys. Based on game theory with incomplete information, two right-of-way optimal bid strategies are given. Both theoretical analysis and simulation prove that the strategy proposed in this paper effectively reduces the waiting time of time-sensitive vehicles at a crossroad and increases the trade success probability, which, in turn, improves the expected total profit of convoys and achieves Pareto improvement. Full article
(This article belongs to the Special Issue Computing in Future Transportation Systems)
Show Figures

Figure 1

17 pages, 1119 KiB  
Article
Improvement of a Conditional Privacy-Preserving and Desynchronization-Resistant Authentication Protocol for IoV
by Qi Xie and Juanjuan Huang
Appl. Sci. 2024, 14(6), 2451; https://doi.org/10.3390/app14062451 - 14 Mar 2024
Cited by 8 | Viewed by 1521
Abstract
In Internet of Vehicles (IoV), the secure data transmission between vehicles and transportation infrastructure effectively ensures the safety and fast driving of vehicles, while authentication and key agreement protocols between vehicles and transportation infrastructure (V2I) play an important role in ensuring data security [...] Read more.
In Internet of Vehicles (IoV), the secure data transmission between vehicles and transportation infrastructure effectively ensures the safety and fast driving of vehicles, while authentication and key agreement protocols between vehicles and transportation infrastructure (V2I) play an important role in ensuring data security and user privacy. However, how to design a provably secure and lightweight V2I authentication protocol for IoV is a challenge. Recently, Kumar et al. proposed a conditional privacy-preserving and desynchronization-resistant authentication protocol for IoV, but we find that Kumar et al.’s scheme is vulnerable to identity guessing attacks, impersonation attacks, and a lack of session key secrecy once the attacker obtains data stored in smart card through side-channel attacks. We also point out that Kumar et al.’s protocol is vulnerable to Roadside Unit (RSU) captured attacks and lacks perfect forward secrecy. Therefore, we propose an improved V2I authentication protocol for IoV, which uses the Physical Unclonable Function (PUF) to resist RSU captured attacks, and designed a three-factor secrecy strategy to resist side-channel attacks; a conditional privacy-preserving strategy was also adopted to achieve anonymity and malicious user tracking. Furthermore, the proposed protocol is provably secure under the random oracle model and has low computation and communication costs. Full article
Show Figures

Figure 1

18 pages, 1299 KiB  
Review
Enhancing Security in Vehicle-to-Vehicle Communication: A Comprehensive Review of Protocols and Techniques
by Muhana Magboul Ali Muslam
Vehicles 2024, 6(1), 450-467; https://doi.org/10.3390/vehicles6010020 - 27 Feb 2024
Cited by 42 | Viewed by 9774
Abstract
Vehicle-to-vehicle (V2V) communication has played a pivotal role in modern intelligent transportation systems, enabling seamless information exchange among vehicles to enhance road safety, traffic efficiency, and overall driving experience. However, the secure transmission of sensitive data between vehicles remains a critical concern due [...] Read more.
Vehicle-to-vehicle (V2V) communication has played a pivotal role in modern intelligent transportation systems, enabling seamless information exchange among vehicles to enhance road safety, traffic efficiency, and overall driving experience. However, the secure transmission of sensitive data between vehicles remains a critical concern due to potential security threats and vulnerabilities. This research focused on investigating the security protocols that have been employed in vehicle-to-vehicle communication systems. A comprehensive review and analysis of relevant literature and research papers was conducted to gather information on existing V2V communication security protocols and techniques. The analysis encompassed key areas, including authentication mechanisms, encryption algorithms, key management protocols, and intrusion detection systems specifically applicable to V2V communication networks. Within the context of real-world V2V environments, this study delved into the challenges and limitations associated with implementing these protocols. The research aimed to provide a comprehensive understanding of the strengths and weaknesses of the current V2V communication security protocols. Furthermore, based on the findings, this paper proposes improvements and recommendations to enhance the security measures of the V2V communication protocol. Ultimately, this research contributes to the development of more secure and reliable V2V communication systems, propelling the advancement of intelligent transportation technology. Full article
(This article belongs to the Special Issue Feature Papers on Advanced Vehicle Technologies)
Show Figures

Figure 1

Back to TopTop