A. Mahmood, Quan Z. Sheng, S. A. Siddiqui, S. Sagar, Wei Emma Zhang, Hajime Suzuki, Wei Ni
{"title":"When Trust Meets the Internet of Vehicles: Opportunities, Challenges, and Future Prospects","authors":"A. Mahmood, Quan Z. Sheng, S. A. Siddiqui, S. Sagar, Wei Emma Zhang, Hajime Suzuki, Wei Ni","doi":"10.1109/CIC52973.2021.00018","DOIUrl":null,"url":null,"abstract":"Recent technological breakthroughs in vehicular ad hoc networks and the Internet of Things (IoT) have transformed vehicles into smart objects thus paving the way for the evolution of the promising paradigm of the Internet of Vehicles (IoV), which is an integral constituent of the modern intelligent transportation systems. Simply put, IoV attributes to the IoT-on-wheels, wherein vehicles broadcast safety-critical information among one another (and their immediate ambiences) for guaranteeing highly reliable and efficacious traffic flows. This, therefore, necessitates the need to fully secure an IoV network since a single malicious message is capable enough of jeopardizing the safety of the nearby vehicles (and their respective passengers) and vulnerable pedestrians. It is also pertinent to mention that a malicious attacker, i.e., vehicle, is not only able to send counterfeited safety-critical messages to its nearby vehicles and the traffic management authorities but could further enable a compromised vehicle to broadcast both spoofed coordinates and speed-related information. It is, therefore, of the utmost importance that malicious entities and their messages be identified and subsequently eliminated from the network before they are able to manipulate the entire network for their malicious gains. This paper, therefore, delineates on the convergence of the notion of trust with the IoV primarily in terms of its underlying rationale. It further highlights the opportunities which transpire as a result of this convergence to secure an IoV network. Finally, open research challenges, together with the recommendations for addressing the same, have been discussed.","PeriodicalId":170121,"journal":{"name":"2021 IEEE 7th International Conference on Collaboration and Internet Computing (CIC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE 7th International Conference on Collaboration and Internet Computing (CIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIC52973.2021.00018","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12
Abstract
Recent technological breakthroughs in vehicular ad hoc networks and the Internet of Things (IoT) have transformed vehicles into smart objects thus paving the way for the evolution of the promising paradigm of the Internet of Vehicles (IoV), which is an integral constituent of the modern intelligent transportation systems. Simply put, IoV attributes to the IoT-on-wheels, wherein vehicles broadcast safety-critical information among one another (and their immediate ambiences) for guaranteeing highly reliable and efficacious traffic flows. This, therefore, necessitates the need to fully secure an IoV network since a single malicious message is capable enough of jeopardizing the safety of the nearby vehicles (and their respective passengers) and vulnerable pedestrians. It is also pertinent to mention that a malicious attacker, i.e., vehicle, is not only able to send counterfeited safety-critical messages to its nearby vehicles and the traffic management authorities but could further enable a compromised vehicle to broadcast both spoofed coordinates and speed-related information. It is, therefore, of the utmost importance that malicious entities and their messages be identified and subsequently eliminated from the network before they are able to manipulate the entire network for their malicious gains. This paper, therefore, delineates on the convergence of the notion of trust with the IoV primarily in terms of its underlying rationale. It further highlights the opportunities which transpire as a result of this convergence to secure an IoV network. Finally, open research challenges, together with the recommendations for addressing the same, have been discussed.