Internet of vehicles: concept, process, security aspects and solutions

Internet of Vehicles (IoV) is a new concept, derived from combining VANET and Internet of Things (IoT), aiming at increasing road’ user safety and reducing the number of accidents. In IoV, different types of communication are possible, namely, vehicle-to-sensor, as the car is considered as a powerfu...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Multimedia tools and applications 2022-05, Vol.81 (12), p.16563-16587
Hauptverfasser: EL Madani, Samira, Motahhir, Saad, EL Ghzizal, Abdelaziz
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Internet of Vehicles (IoV) is a new concept, derived from combining VANET and Internet of Things (IoT), aiming at increasing road’ user safety and reducing the number of accidents. In IoV, different types of communication are possible, namely, vehicle-to-sensor, as the car is considered as a powerful multisensory object, vehicle-to-pedestrian i.e. sharing data between vehicle and people, and vehicle-to-cloud communication in which cloud data centers and vehicles are the main actors. Indeed, the IoV’s topology is very dynamic and non-uniform; it can be a target of several types of attacks that could menace people’s lives. This paper is a detailed review of the internet of vehicles by presenting first of all the VANET networks including their different components, their possible communication, and their applications. The reasons behind the transition from VANET to IoV are also carried out in this review. After this, an in-depth study of IoV is being done by discussing its architecture and the different sensors and network protocols used in IoV. As it is not standardized, a comparison of the existing architecture is also elaborated in this review. Taking into account its importance, we devoted a part of this work to the security aspect for IoV by presenting the security requirements and the possible attacks, moreover, a study of the proposed security solutions will be done
ISSN:1380-7501
1573-7721
DOI:10.1007/s11042-022-12386-1