Systematic literature review on Internet-of-Vehicles communication security

被引:36
作者
Abu Talib, Manar [1 ]
Abbas, Sohail [1 ]
Nasir, Qassim [2 ]
Mowakeh, Mohamad Fouzi [2 ]
机构
[1] Univ Sharjah, Dept Comp Sci, Sharjah 27272, U Arab Emirates
[2] Univ Sharjah, Dept Elect & Comp Engn, Sharjah, U Arab Emirates
关键词
Internet-of-Vehicles; security; authenticity; integrity; confidentiality; availability; VANET SECURITY; CHALLENGES;
D O I
10.1177/1550147718815054
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Currently, the popularity of Internet-of-Vehicles technology and self-driving cars are increasing rapidly. Several companies are investing in this field and are competing to release the latest and safest autonomous cars. However, this rapid Internet-of-Vehicles development also creates many security problems, which are considered a significant threat both to industry and to consumers. As a result, there is an urgent need to study the possible security threats and different solutions that can ensure the safety of drivers and also the security of industry. This research article focuses on examining the systematic literature on Internet-of-Vehicles and security. It also provides comprehensive and unbiased information regarding various state-of-the-art security problems, solutions, and proposals in vehicular ad hoc networks and Internet-of-Vehicles. Systematic literature review is used for more than 127 different research articles published between the years 2010 and 2018. The results of the systematic literature review used are categorized into the following three main categories: (1) the different types of attacks on Internet-of-Vehicles, (2) the different solutions that can be implemented to solve the threats, and (3) the performance outcomes.
引用
收藏
页数:21
相关论文
共 88 条
[61]   Survey on Security Issues in Vehicular Ad Hoc Networks [J].
Mokhtar, Bassem ;
Azab, Mohamed .
ALEXANDRIA ENGINEERING JOURNAL, 2015, 54 (04) :1115-1126
[62]  
Nema P, 2015, 2015 INTERNATIONAL CONFERENCE ON COMPUTERS, COMMUNICATIONS, AND SYSTEMS (ICCCS), P1, DOI 10.1109/CCOMS.2015.7562842
[63]  
Nidhal Mejri Mohamed, 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC), P992, DOI 10.1109/CCNC.2016.7444925
[64]  
Othmane L.B., 2015, WIRELESS SENSOR MOBI, P217, DOI [DOI 10.1007/978-1-4939-2468-410, DOI 10.1007/978-1-4939-2468-4_10]
[65]   Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges [J].
Parkinson, Simon ;
Ward, Paul ;
Wilson, Kyle ;
Miller, Jonathan .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2017, 18 (11) :2898-2915
[66]   Potential Cyberattacks on Automated Vehicles [J].
Petit, Jonathan ;
Shladover, Steven E. .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2015, 16 (02) :546-556
[67]   A Security and Privacy Review of VANETs [J].
Qu, Fengzhong ;
Wu, Zhihui ;
Wang, Fei-Yue ;
Cho, Woong .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2015, 16 (06) :2985-2996
[68]  
Reddy DS, 2017, 2017 INTERNATIONAL CONFERENCE ON ALGORITHMS, METHODOLOGY, MODELS AND APPLICATIONS IN EMERGING TECHNOLOGIES (ICAMMAET)
[69]  
Reger L, 2014, Addressing the Security of the Connected Car
[70]  
Rehman A, 2013, 2013 EIGHTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT (ICDIM), P58, DOI 10.1109/ICDIM.2013.6693972