CFP last date
20 May 2024
Reseach Article

Study Investigation of the Internet of Vehicle (IoV) Security

by Emmanuel O. Akingboye, Thaier Hamid
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 183 - Number 39
Year of Publication: 2021
Authors: Emmanuel O. Akingboye, Thaier Hamid
10.5120/ijca2021921738

Emmanuel O. Akingboye, Thaier Hamid . Study Investigation of the Internet of Vehicle (IoV) Security. International Journal of Computer Applications. 183, 39 ( Nov 2021), 16-21. DOI=10.5120/ijca2021921738

@article{ 10.5120/ijca2021921738,
author = { Emmanuel O. Akingboye, Thaier Hamid },
title = { Study Investigation of the Internet of Vehicle (IoV) Security },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2021 },
volume = { 183 },
number = { 39 },
month = { Nov },
year = { 2021 },
issn = { 0975-8887 },
pages = { 16-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume183/number39/32187-2021921738/ },
doi = { 10.5120/ijca2021921738 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:19:11.444925+05:30
%A Emmanuel O. Akingboye
%A Thaier Hamid
%T Study Investigation of the Internet of Vehicle (IoV) Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 183
%N 39
%P 16-21
%D 2021
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cybersecurity is the protection of the things connected to the Internet in one way or the other with a lot of things and millions of connections involved, the Internet connection becomes the target for hackers to compromise the Confidentiality, Integrity, Availability of the networks involved, and even compromise the connected devices. The Internet of vehicle security becomes even more fragile.This paper is to discuss the IoV in general, the security challenges facing theInternet of vehicles users’, create more awareness of the Internet of vehicle security, and lastly provide a security mitigation recommendation for the Internet of vehicle users. Furthermore, the academic research analysis to be generated from this research paper will further help other researchers to establish or add their research analysis to the result findings of the above research topic for the general safety of the Internet of vehicle users, also to reduce the gap between cybersecurity and the Internet of vehicle (IoV) technology.

References
  1. Abu Talib, M., Abbas, S., Nasir, Q., & Mowakeh, M. F. (2018). Systematic literature review on Internet-of-Vehicles communication security. International Journal of Distributed Sensor Networks, 14(12). https://doi.org/10.1177/1550147718815054
  2. Bagga, P., Das, A. K., Wazid, M., Rodrigues, J. J. P. C., & Park, Y. (2020). Authentication protocols in internet of vehicles: Taxonomy, analysis, and challenges. IEEE Access, 8, 54314–54344. https://doi.org/10.1109/ACCESS.2020.2981397
  3. Chen, C. M., Xiang, B., Liu, Y., & Wang, K. H. (2019). A secure authentication protocol for internet of vehicles. IEEE Access, 7, 12047–12057. https://doi.org/10.1109/ACCESS.2019.2891105
  4. Chen, M., Tian, Y., Fortino, G., Zhang, J., & Humar, I. (2018). Cognitive Internet of Vehicles. Computer Communications, 120(February), 58–70. https://doi.org/10.1016/j.comcom.2018.02.006
  5. Contreras-Castillo, J., Zeadally, S., & Guerrero-Ibanez, J. A. (2018). Internet of Vehicles: Architecture, Protocols, and Security. IEEE Internet of Things Journal, 5(5), 3701–3709. https://doi.org/10.1109/JIOT.2017.2690902
  6. Duan, W., Gu, J., Wen, M., Zhang, G., Ji, Y., & Mumtaz, S. (2020). Emerging Technologies for 5G-IoV Networks: Applications, Trends and Opportunities. IEEE Network, 34(5), 283–289. https://doi.org/10.1109/MNET.001.1900659
  7. Fraiji, Y., Ben Azzouz, L., Trojet, W., & Saidane, L. A. (2018). Cyber security issues of Internet of electric vehicles. IEEE Wireless Communications and Networking Conference, WCNC, 2018-April, 1–6. https://doi.org/10.1109/WCNC.2018.8377181
  8. Gafencu, L., & Scripcariu, L. (2018). Security Issues in the Internet of Vehicles. 2018 12th International Conference on Communications, COMM 2018 - Proceedings, 441–446. https://doi.org/10.1109/ICComm.2018.8430112
  9. G, A.E. (2018). How to hack any car with this tool. [online] Information Security Newspaper | Hacking News. Available at: https://www.securitynewspaper.com/2018/05/03/hack-car-tool/ [Accessed 05 March. 2021].
  10. gen_too (n.d.). Install and Configure Snort 3 NIDS on Ubuntu 20.04 - kifarunix.com. [online] Available at: https://kifarunix.com/install-and-configure-snort-3-nids-on-ubuntu-20-04/.
  11. Hodge, C., Hauck, K., Gupta, S., Bennett, J., Hodge, C., Hauck, K., Gupta, S., & Bennett, J. (2019). Vehicle Cybersecurity Threats and Mitigation Approaches. NREL/TP-5400-74247, 1–41. https://www.nrel.gov/docs/fy19osti/74247.pdf
  12. Joy, J., Rabsatt, V., & Gerla, M. (2018). Internet of Vehicles: Enabling safe, secure, and private vehicular crowdsourcing. Internet Technology Letters, 1(1), e16. https://doi.org/10.1002/itl2.16
  13. Kaiwartya, O., Abdullah, A. H., Cao, Y., Altameem, A., Prasad, M., Lin, C. T., & Liu, X. (2016). Internet of Vehicles: Motivation, Layered Architecture, Network Model, Challenges, and Future Aspects. IEEE Access, 4, 5356–5373. https://doi.org/10.1109/ACCESS.2016.2603219
  14. Lokman, S.-F., Othman, A.T. and Abu-Bakar, M.-H. (2019). Intrusion detection system for automotive Controller Area Network (CAN) bus system: a review. EURASIP Journal on Wireless Communications and Networking, 2019(1).
  15. Nanda, A., Puthal, D., Rodrigues, J. J. P. C., & Kozlov, S. A. (2019). Internet of Autonomous Vehicles Communications Security: Overview, Issues, and Directions. IEEE Wireless Communications, 26(4), 60–65. https://doi.org/10.1109/MWC.2019.1800503
  16. Payne, B. R. (2019). Car Hacking: Accessing and Exploiting the CAN Bus Protocol Car Hacking: Accessing and Exploiting the CAN Bus Protocol. Journal of Cybersecurity Education, Research and Practice, 2019(1), 5.
  17. Prakash, A. (n.d.). Exploiting CAN-Bus using Instrument Cluster Simulator.
  18. Qureshi, K. N., Din, S., Jeon, G., & Piccialli, F. (2020). Internet of Vehicles: Key Technologies, Network Model, Solutions and Challenges With Future Aspects. IEEE Transactions on Intelligent Transportation Systems, 1–10. https://doi.org/10.1109/tits.2020.2994972
  19. Sadiku, M. N. O., Tembely, M., & Musa, S. M. (2018). Internet of Vehicles: an Introduction. International Journal of Advanced Research in Computer Science and Software Engineering, 8(1), 11. https://doi.org/10.23956/ijarcsse.v8i1.512
  20. Sharma, N., Chauhan, N., & Chand, N. (2018). Security challenges in Internet of Vehicles (IoV) environment. ICSCCC 2018 - 1st International Conference on Secure Cyber Computing and Communications, 203–207. https://doi.org/10.1109/ICSCCC.2018.8703272
  21. Sharma, Sachin, Ghanshala, K. K., & Mohan, S. (2018). A Security System Using Deep Learning Approach for Internet of Vehicles (IoV). 2018 9th IEEE Annual Ubiquitous Computing, Electronics and Mobile Communication Conference, UEMCON 2018, 1–5. https://doi.org/10.1109/UEMCON.2018.8796664
  22. Shukla, S., & Holle, J. (2019). Real life experience from implementation of Firewall, Router and IDS Ethernet switch and uC functions Selling mobility instead of cars Autonomous driving Big data.
  23. Smith, C., Starch, N., & Isbn, P. (2016). The Car Hacker ’s Handbook (Issue April).
  24. Sun, Y., Wu, L., Wu, S., Li, S., Zhang, T., Zhang, L., Xu, J., & Xiong, Y. (2016). Security and Privacy in the Internet of Vehicles. Proceedings - 2015 International Conference on Identification, Information, and Knowledge in the Internet of Things, IIKI 2015, 116–121.
Index Terms

Computer Science
Information Sciences

Keywords

IoV Security