Security Requirements in Intelligent Transportation System: A systematic review

被引:0
作者
Sharma, Mini [1 ]
机构
[1] State Inst Rural Dev, Dept Comp Sci & Engn, Ranchi, Jharkhand, India
来源
2019 5TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA) | 2019年
关键词
security; privacy; intelligent transportation system; wireless sensor networks; data modification; attacks; CHALLENGES; FUSION;
D O I
10.1109/iccubea47591.2019.9128937
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cars in modern life have become the most essential elements and with increase in the number of cars nowadays, many problems arise such as pollution, traffic jams, etc. Intelligent Transportation System (ITS) provides innovative services to counter different modes of traffic management and transport. These enable users to make safe, coordinated and efficient use of transport networks. In order to capture accurate traffic models, many ITS expect users to contribute captured data by sensors of personal mobile devices. This makes the mobile devices behave as ubiquitous sensing devices that can cover any area where the users are present. Sharing such sensitive data may lead to security and privacy concerns for users like disclosing the location of user to some unattended audience. Thus, security must be the considered for ITS application. Recently ITS provided efficient solutions for improvement of the performance of traffic systems, increased safety and security for travelers, and reduced traffic congestion. The ITS architecture is costly and complex due to inclusion of diverse data sources and heterogeneous devices. Thus, for a cost-effective and efficient ITS architecture, it must employ easy mechanisms for different transport subsystems interactions. Recent technologies like cloud computing, grid computing and service-oriented architectures (SOA) enables a loosely-coupled and reliable distributed systems. Due to large amount of information or data, ITS development is slowly changing from technology-driven system to data-driven system. A data-driven ITS was designed to optimize its performance.
引用
收藏
页数:5
相关论文
共 28 条
[1]  
Al Najada H., 2016, 2016 IEEE S SERIES C, P1
[2]  
Bhushan B., 2017, Springer Handbooks, P1, DOI [DOI 10.1007/978-3-662-54357-3_1, 10.1007/978-3-662-54357-3_1, DOI 10.1109/ICACCAF.2017.8344724]
[3]  
Bhushan B, 2019, WIREL NETW, V25, P2697, DOI 10.1007/s11276-019-01988-7
[4]   Recent Advances in Attacks, Technical Challenges, Vulnerabilities and Their Countermeasures in Wireless Sensor Networks [J].
Bhushan, Bharat ;
Sahoo, Gadadhar .
WIRELESS PERSONAL COMMUNICATIONS, 2018, 98 (02) :2037-2077
[5]  
Cai W., 2011, 2011 2 INT C INN BIO, DOI [10.1109/ibica.2011.38, DOI 10.1109/IBICA.2011.38]
[6]  
Changyu Z., 2010, 2010 INT C COMP APPL, DOI [10.1109/iccasm.2010.5622598, DOI 10.1109/ICCASM.2010.5622598]
[7]  
Chen C., 2017, CONNECTED VEHICULAR
[8]   Data fusion in intelligent transportation systems: Progress and challenges - A survey [J].
El Faouzi, Nour-Eddin ;
Leung, Henry ;
Kurian, Ajeesh .
INFORMATION FUSION, 2011, 12 (01) :4-10
[9]   Intelligent System Intricacies: Safety, Security and Risk Management Apprehensions of ITS [J].
Gharehbaghi, Koorosh ;
Myers, Matt .
PROCEEDINGS OF 2019 8TH INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY AND MANAGEMENT (ICITM 2019), 2019, :37-40
[10]   Security and Privacy Issues in Intelligent Transportation Systems: Classification and Challenges [J].
Hahn, Dalton ;
Munir, Arslan ;
Behzadan, Vahid .
IEEE INTELLIGENT TRANSPORTATION SYSTEMS MAGAZINE, 2021, 13 (01) :181-196