Systematic literature review on Internet-of-Vehicles communication security

被引:36
作者
Abu Talib, Manar [1 ]
Abbas, Sohail [1 ]
Nasir, Qassim [2 ]
Mowakeh, Mohamad Fouzi [2 ]
机构
[1] Univ Sharjah, Dept Comp Sci, Sharjah 27272, U Arab Emirates
[2] Univ Sharjah, Dept Elect & Comp Engn, Sharjah, U Arab Emirates
关键词
Internet-of-Vehicles; security; authenticity; integrity; confidentiality; availability; VANET SECURITY; CHALLENGES;
D O I
10.1177/1550147718815054
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Currently, the popularity of Internet-of-Vehicles technology and self-driving cars are increasing rapidly. Several companies are investing in this field and are competing to release the latest and safest autonomous cars. However, this rapid Internet-of-Vehicles development also creates many security problems, which are considered a significant threat both to industry and to consumers. As a result, there is an urgent need to study the possible security threats and different solutions that can ensure the safety of drivers and also the security of industry. This research article focuses on examining the systematic literature on Internet-of-Vehicles and security. It also provides comprehensive and unbiased information regarding various state-of-the-art security problems, solutions, and proposals in vehicular ad hoc networks and Internet-of-Vehicles. Systematic literature review is used for more than 127 different research articles published between the years 2010 and 2018. The results of the systematic literature review used are categorized into the following three main categories: (1) the different types of attacks on Internet-of-Vehicles, (2) the different solutions that can be implemented to solve the threats, and (3) the performance outcomes.
引用
收藏
页数:21
相关论文
共 88 条
[81]  
Tripathi VK, 2015, 2015 GLOBAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (GCCT), P125, DOI 10.1109/GCCT.2015.7342637
[82]  
Tyagi P, 2014, 2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), P2084, DOI 10.1109/ICACCI.2014.6968313
[83]  
Upadhyaya AjayN., 2018, INT J COMP ENG TECH, V9, P8
[84]   Security analysis on "Strongly secure certificateless key-insulated signature secure in the standard model" [J].
Wang, Feng ;
Xu, Li ;
Pan, Jeng-Shyang .
2015 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP), 2015, :195-198
[85]   An extended car-following model to describe connected traffic dynamics under cyberattacks [J].
Wang, Pengcheng ;
Yu, Guizhen ;
Wu, Xinkai ;
Qin, Hongmao ;
Wang, Yunpeng .
PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2018, 496 :351-370
[86]   Providing VANET security through active position detection [J].
Yan, Gongjun ;
Olariu, Stephan ;
Weigle, Michele C. .
COMPUTER COMMUNICATIONS, 2008, 31 (12) :2883-2897
[87]   Vehicular Internet: Security & Privacy Challenges and Opportunities [J].
Zaidi, Kamran ;
Rajarajan, Muttukrishnan .
FUTURE INTERNET, 2015, 7 (03) :257-275
[88]   Defending Connected Vehicles Against Malware: Challenges and a Solution Framework [J].
Zhang, Tao ;
Antunes, Helder ;
Aggarwal, Siddhartha .
IEEE INTERNET OF THINGS JOURNAL, 2014, 1 (01) :10-21