Skip to content
Scan a barcode
Scan
Paperback Enhancing Security for Internet of Vehicles Book

ISBN: 5231261203

ISBN13: 9785231261208

Enhancing Security for Internet of Vehicles

Internet of Vehicles (IoV) is an emerging concept in Intelligent Transportation Systems (ITS)

to enhance the existing capabilities of VANETs by integrating with the Internet of Things

(IoT). IoV introduces the vision of smart transportation and smart cities as it gives prior

information regarding accidents, traffic, route optimization, vacant parking, better navigation,

etc. due to this, cities will be properly organized, and life-threatening risks are also minimized.

An immense amount of services and applications are being supported by IoV and can impart

voluminous crucial information to on-road drivers and travelers. Applications of IoVs can be

divided into the following broad categories: Safety-related applications, Comfort and

infotainment, Traffic efficiency and management, and Healthcare applications. IoV has

numerous key technologies, and one of them is Radio-Frequency Identification Technology

(RFID) which has a plethora of applications in IoV like automatic toll collection, intelligent

parking, data dissemination, tracking the location of the vehicle, etc. which enhances the

overall performance of IoV networks.

IoV network should be robust and effective as it involves real-time critical data. Thus, its

security can't be compromised as well as the timely delivery of information is also essential.

IoV networks are exposed to various types of attacks and threats like Sybil attacks, Black Hole

attacks, Masquerading attacks, etc. IoV being a real-time sensitive network and delay intolerant

needs to be secure otherwise it may lead to hazardous situations.

As RFID technology relies on wireless communication, it is also vulnerable to various security

threats. Compromising the security of RFID impacts the security of the IoV system which may

lead to hazardous results, so RFID based IoV system must be secure from all security attacks.

Various authentication schemes are suggested by researchers to secure the RFID-based systems

but all have limitations as some focus on preventing the security attacks while few focus on

computational resources of RFID tags.

Recommended

Format: Paperback

Temporarily Unavailable

We receive fewer than 1 copy every 6 months.

Customer Reviews

0 rating
Copyright © 2025 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks ® and the ThriftBooks ® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured