Systematic literature review on Internet-of-Vehicles communication security

被引:36
作者
Abu Talib, Manar [1 ]
Abbas, Sohail [1 ]
Nasir, Qassim [2 ]
Mowakeh, Mohamad Fouzi [2 ]
机构
[1] Univ Sharjah, Dept Comp Sci, Sharjah 27272, U Arab Emirates
[2] Univ Sharjah, Dept Elect & Comp Engn, Sharjah, U Arab Emirates
关键词
Internet-of-Vehicles; security; authenticity; integrity; confidentiality; availability; VANET SECURITY; CHALLENGES;
D O I
10.1177/1550147718815054
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Currently, the popularity of Internet-of-Vehicles technology and self-driving cars are increasing rapidly. Several companies are investing in this field and are competing to release the latest and safest autonomous cars. However, this rapid Internet-of-Vehicles development also creates many security problems, which are considered a significant threat both to industry and to consumers. As a result, there is an urgent need to study the possible security threats and different solutions that can ensure the safety of drivers and also the security of industry. This research article focuses on examining the systematic literature on Internet-of-Vehicles and security. It also provides comprehensive and unbiased information regarding various state-of-the-art security problems, solutions, and proposals in vehicular ad hoc networks and Internet-of-Vehicles. Systematic literature review is used for more than 127 different research articles published between the years 2010 and 2018. The results of the systematic literature review used are categorized into the following three main categories: (1) the different types of attacks on Internet-of-Vehicles, (2) the different solutions that can be implemented to solve the threats, and (3) the performance outcomes.
引用
收藏
页数:21
相关论文
共 88 条
[1]  
Abdelgader AMS, 2017, 2017 IEEE CONFERENCE ON SYSTEMS, PROCESS AND CONTROL (ICSPC), P105, DOI 10.1109/SPC.2017.8313030
[2]  
Abrougui K, 2012, IEEE GLOB COMM CONF, P391, DOI 10.1109/GLOCOM.2012.6503144
[3]  
Al Hasani AS, 2016, 2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), P404, DOI 10.1109/ICACCI.2016.7732079
[4]  
Al Junaid Mohammed Ali Hezam, 2018, MATEC Web of Conferences, V150, DOI 10.1051/matecconf/201815006038
[5]  
Al-kahtani MohammedSaeed., 2012, Signal Processing and Communication Systems (ICSPCS), 2012 6th International Conference on, P1
[6]  
Ali S, 2017, 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), P520, DOI 10.1109/CCAA.2017.8229856
[7]   Security Vulnerabilities of Connected Vehicle Streams and Their Impact on Cooperative Driving [J].
Amoozadeh, Mani ;
Raghuramu, Arun ;
Chuah, Chen-Nee ;
Ghosal, Dipak ;
Zhang, H. Michael ;
Rowe, Jeff ;
Levitt, Karl .
IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (06) :126-132
[8]  
[Anonymous], PEER TO PEER NETWORK
[9]  
[Anonymous], LEARNS WRIT ITS OWN
[10]  
[Anonymous], 2010, P INT C NETW APPL PR