Intelligence, security, and vehicular sensor networks in internet of things (IoT)-enabled smart-cities: An overview

被引:71
作者
Al-Turjman, Fadi [1 ,2 ]
Lemayian, Joel Poncha [3 ]
机构
[1] Near East Univ, Res Ctr AI & IoT, Dept AI Engn, Mersin 10, TR-99138 Nicosia, Turkey
[2] Near East Univ, Res Ctr AI & IoT, Mersin 10, Nicosia, Turkey
[3] Antalya Bilim Univ, Dept Comp Engn, TR-05190 Antalya, Turkey
关键词
VSN; VANETs; Internet of things; Smart city; Intelligent transport; Security; Sensors; Vehicular sensor; V2V; V2X;
D O I
10.1016/j.compeleceng.2020.106776
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security in Vehicular Sensor Networks (VSNs) is a critical subject that must be addressed in the emerging Intelligent Transport Systems (ITS). Users share confidential information that can be used against them by attackers. Popular attacks include Malwares and Spams, Black Holes, Wormholes, and Physical/Electronic Outages. Such VSN attacks can lead to loss of life due to road accidents and breach of privacy. In this paper, we overview the VSN concept in a vehicular IoT-based smart city paradigm, focusing on the security aspects. In addition, we discuss the design features of VSN, its robustness, and reliability. We also discuss relevant communication technologies and their security concerns. We highlight the main open research issues in literature and provide hints for overcoming them. This analysis concludes that VSNs play a key role in developing efficient ITS. Nevertheless, current VSNs security standards must be improved for a reliable, and safe transportation system. (C) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:13
相关论文
共 29 条
[1]  
Al Hasan, 2016, ADV COMP COMM INF IC
[2]   IoT-enabled smart grid via SM: An overview [J].
Al-Turjman, Fadi ;
Abujubbeh, Mohammad .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 96 :579-590
[3]  
[Anonymous], 2006, P16092 IEEE
[4]   IEEE 802.11p for cellular offloading in vehicular sensor networks [J].
Bazzi, Alessandro ;
Masini, Barbara M. ;
Zanella, Alberto ;
Pasolini, Gianni .
COMPUTER COMMUNICATIONS, 2015, 60 :97-108
[5]  
Bitam S., 2012, GLOBECOM 2012 - 2012 IEEE Global Communications Conference, P2054, DOI 10.1109/GLOCOM.2012.6503418
[6]  
Chang W.-J., 2018, J COMMUN, V13, P737, DOI [10.12720/jcm.13.12.737, DOI 10.12720/JCM.13.12.737]
[7]   Requirements of AGV (Automated Guided Vehicle) for SMEs (Small and Medium-sized Enterprises) [J].
Cheong, Hee-Woon ;
Lee, Hwally .
6TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND QUANTITATIVE MANAGEMENT, 2018, 139 :91-94
[8]  
Hossein Chinaei Mohammad, 2017, INT C CRYPT NETW SEC, P436
[9]   On the Communication Complexity of Secure Function Evaluation with Long Output [J].
Hubacek, Pavel ;
Wichs, Daniel .
PROCEEDINGS OF THE 6TH INNOVATIONS IN THEORETICAL COMPUTER SCIENCE (ITCS'15), 2015, :163-172
[10]  
Iwai A., 2011, Proceedings of the 2011 IEEE 4th International Conference on Cloud Computing (CLOUD 2011), P638, DOI 10.1109/CLOUD.2011.119