Visible to the public Biblio

Filters: Keyword is Internet of Vehicles  [Clear All Filters]
2023-09-08
Das, Debashis, Banerjee, Sourav, Chatterjee, Pushpita, Ghosh, Uttam, Mansoor, Wathiq, Biswas, Utpal.  2022.  Design of an Automated Blockchain-Enabled Vehicle Data Management System. 2022 5th International Conference on Signal Processing and Information Security (ICSPIS). :22–25.
The Internet of Vehicles (IoV) has a tremendous prospect for numerous vehicular applications. IoV enables vehicles to transmit data to improve roadway safety and efficiency. Data security is essential for increasing the security and privacy of vehicle and roadway infrastructures in IoV systems. Several researchers proposed numerous solutions to address security and privacy issues in IoV systems. However, these issues are not proper solutions that lack data authentication and verification protocols. In this paper, a blockchain-enabled automated data management system for vehicles has been proposed and demonstrated. This work enables automated data verification and authentication using smart contracts. Certified organizations can only access vehicle data uploaded by the vehicle user to the Interplanetary File System (IPFS) server through that vehicle user’s consent. The proposed system increases the security of vehicles and data. Vehicle privacy is also maintained here by increasing data privacy.
ISSN: 2831-3844
Li, Leixiao, Xiong, Xiao, Gao, Haoyu, Zheng, Yue, Niu, Tieming, Du, Jinze.  2022.  Blockchain-based trust evaluation mechanism for Internet of Vehicles. 2022 IEEE Smartworld, Ubiquitous Intelligence & Computing, Scalable Computing & Communications, Digital Twin, Privacy Computing, Metaverse, Autonomous & Trusted Vehicles (SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta). :2011–2018.
In the traditional Internet of Vehicles, communication data is easily tampered with and easily leaked. In order to improve the trust evaluation mechanism of the Internet of Vehicles and establish a trust relationship between vehicles, a blockchain-based Internet of Vehicles trust evaluation (BBTE) scheme is proposed. First, the scheme uses the roadside unit RSU to calculate the trust value of vehicle nodes and maintain the generation, verification and storage of blocks, so as to realize distributed data storage and ensure that data cannot be tampered with. Secondly, an efficient trust evaluation method is designed. The method integrates four trust decision factors: initial trust, historical experience trust, recommendation trust and RSU observation trust to obtain the overall trust value of vehicle nodes. In addition, in the process of constructing the recommendation trust method, the recommendation trust is divided into three categories according to the interaction between the recommended vehicle node and the communicator, use CRITIC to obtain the optimal weights of three recommended trusts, and use CRITIC to obtain the optimal weights of four trust decision-making factors to obtain the final trust value. Finally, the NS3 simulation platform is used to verify the security and accuracy of the trust evaluation method, and to improve the identification accuracy and detection rate of malicious vehicle nodes. The experimental analysis shows that the scheme can effectively deal with the gray hole attack, slander attack and collusion attack of other vehicle nodes, improve the security of vehicle node communication interaction, and provide technical support for the basic application of Internet of Vehicles security.
Liu, Shaogang, Chen, Jiangli, Hong, Guihua, Cao, Lizhu, Wu, Ming.  2022.  Research on UAV Network System Security Risk Evaluation Oriented to Geographic Information Data. 2022 IEEE International Conference on Electrical Engineering, Big Data and Algorithms (EEBDA). :57–60.
With the advent of the Internet era, all walks of life in our country have undergone earth-shaking changes, especially the drone and geographic information industries, which have developed rapidly under the impetus of the Internet of Things era. However, with the continuous development of science and technology, the network structure has become more and more complex, and the types of network attacks have varied. UAV information security and geographic information data have appeared security risks on the network. These hidden dangers have contributed to the progress of the drone and geographic information industry. And development has caused a great negative impact. In this regard, this article will conduct research on the network security of UAV systems and geographic information data, which can effectively assess the network security risks of UAV systems, and propose several solutions to potential safety hazards to reduce UAV networks. Security risks and losses provide a reference for UAV system data security.
Chen, Kai, Wu, Hongjun, Xu, Cheng, Ma, Nan, Dai, Songyin, Liu, Hongzhe.  2022.  An Intelligent Vehicle Data Security System based on Blockchain for Smart City. 2022 International Conference on Virtual Reality, Human-Computer Interaction and Artificial Intelligence (VRHCIAI). :227–231.
With the development of urbanization, the number of vehicles is gradually increasing, and vehicles are gradually developing in the direction of intelligence. How to ensure that the data of intelligent vehicles is not tampered in the process of transmission to the cloud is the key problem of current research. Therefore, we have established a data security transmission system based on blockchain. First, we collect and filter vehicle data locally, and then use blockchain technology to transmit key data. Through the smart contract, the key data is automatically and accurately transmitted to the surrounding node vehicles, and the vehicles transmit data to each other to form a transaction and spread to the whole network. The node data is verified through the node data consensus protocol of intelligent vehicle data security transmission system, and written into the block to form a blockchain. Finally, the vehicle user can query the transaction record through the vehicle address. The results show that we can safely and accurately transmit and query vehicle data in the blockchain database.
Pawar, Sheetal, Kuveskar, Manisha.  2022.  Vehicle Security and Road Safety System Based on Internet of Things. 2022 IEEE International Conference on Current Development in Engineering and Technology (CCET). :1–5.
Roads are the backbone of our country, they play an important role for human progress. Roads seem to be dangerous and harmful for human beings on hills, near rivers, lakes and small ridges. It's possible with the help of IoT (Internet of things) to incorporate all the things made efficiently and effectively. IoT in combination with roads make daily life smart and excellent. This paper shows IoT technology will be the beginning of smart cities and it will reduce road accidents and collisions. If all vehicles are IoT based and connected with the internet, then an efficient method to guide, it performs urgent action, when less time is available. Internet and antenna technology in combination with IoT perform fully automation in our day-to-day life. It will provide excellent service as well as accuracy and precision.
Zhang, Jian, Li, Lei, Liu, Weidong, Li, Xiaohui.  2022.  Multi-subject information interaction and one-way hash chain authentication method for V2G application in Internet of Vehicles. 2022 4th International Conference on Intelligent Information Processing (IIP). :134–137.
Internet of Vehicles consists of a three-layer architecture of electric vehicles, charging piles, and a grid dispatch management control center. Therefore, V2G presents multi-level, multi-agent and frequent information interaction, which requires a highly secure and lightweight identity authentication method. Based on the characteristics of Internet of Vehicles, this paper designs a multi-subject information interaction and one-way hash chain authentication method, it includes one-way hash chain and key distribution update strategy. The operation experiment of multiple electric vehicles and charging piles shows that the algorithm proposed in this paper can meet the V2G ID authentication requirements of Internet of Vehicles, and has the advantages of lightweight and low consumption. It is of great significance to improve the security protection level of Internet of Vehicles V2G.
Chen, Xuan, Li, Fei.  2022.  Research on the Algorithm of Situational Element Extraction of Internet of Vehicles Security based on Optimized-FOA-PNN. 2022 7th International Conference on Cyber Security and Information Engineering (ICCSIE). :109–112.

The scale of the intelligent networked vehicle market is expanding rapidly, and network security issues also follow. A Situational Awareness (SA) system can detect, identify, and respond to security risks from a global perspective. In view of the discrete and weak correlation characteristics of perceptual data, this paper uses the Fly Optimization Algorithm (FOA) based on dynamic adjustment of the optimization step size to improve the convergence speed, and optimizes the extraction model of security situation element of the Internet of Vehicles (IoV), based on Probabilistic Neural Network (PNN), to improve the accuracy of element extraction. Through the comparison of experimental algorithms, it is verified that the algorithm has fast convergence speed, high precision and good stability.

Bai, Songhao, Zhang, Zhen.  2022.  Anonymous Identity Authentication scheme for Internet of Vehicles based on moving target Defense. 2021 International Conference on Advanced Computing and Endogenous Security. :1–4.
As one of the effective methods to enhance traffic safety and improve traffic efficiency, the Internet of vehicles has attracted wide attention from all walks of life. V2X secure communication, as one of the research hotspots of the Internet of vehicles, also has many security and privacy problems. Attackers can use these vulnerabilities to obtain vehicle identity information and location information, and can also attack vehicles through camouflage.Therefore, the identity authentication process in vehicle network communication must be effectively protected. The anonymous identity authentication scheme based on moving target defense proposed in this paper not only ensures the authenticity and integrity of information sources, but also avoids the disclosure of vehicle identity information.
2023-05-12
Hariharan, Sheela, Papadopoulos, Alessandro V., Nolte, Thomas.  2022.  On In-Vehicle Network Security Testing Methodologies in Construction Machinery. 2022 IEEE 27th International Conference on Emerging Technologies and Factory Automation (ETFA). :1–4.

In construction machinery, connectivity delivers higher advantages in terms of higher productivity, lower costs, and most importantly safer work environment. As the machinery grows more dependent on internet-connected technologies, data security and product cybersecurity become more critical than ever. These machines have more cyber risks compared to other automotive segments since there are more complexities in software, larger after-market options, use more standardized SAE J1939 protocol, and connectivity through long-distance wireless communication channels (LTE interfaces for fleet management systems). Construction machinery also operates throughout the day, which means connected and monitored endlessly. Till today, construction machinery manufacturers are investigating the product cybersecurity challenges in threat monitoring, security testing, and establishing security governance and policies. There are limited security testing methodologies on SAE J1939 CAN protocols. There are several testing frameworks proposed for fuzz testing CAN networks according to [1]. This paper proposes security testing methods (Fuzzing, Pen testing) for in-vehicle communication protocols in construction machinery.

2023-03-31
Khelifi, Hakima, Belouahri, Amani.  2022.  The Impact of Big Data Analytics on Traffic Prediction. 2022 International Conference on Advanced Aspects of Software Engineering (ICAASE). :1–6.
The Internet of Vehicles (IoVs) performs the rapid expansion of connected devices. This massive number of devices is constantly generating a massive and near-real-time data stream for numerous applications, which is known as big data. Analyzing such big data to find, predict, and control decisions is a critical solution for IoVs to enhance service quality and experience. Thus, the main goal of this paper is to study the impact of big data analytics on traffic prediction in IoVs. In which we have used big data analytics steps to predict the traffic flow, and based on different deep neural models such as LSTM, CNN-LSTM, and GRU. The models are validated using evaluation metrics, MAE, MSE, RMSE, and R2. Hence, a case study based on a real-world road is used to implement and test the efficiency of the traffic prediction models.
2022-06-09
Wang, Jun, Wang, Wen, Wu, Dan, Lei, Ting, Liu, DunNan, Li, PeiJun, Su, Shu.  2021.  Research on Business Model of Internet of Vehicles Platform Based on Token Economy. 2021 2nd International Conference on Big Data Economy and Information Management (BDEIM). :120–124.
With the increasing number of electric vehicles, the scale of the market also increases. In the past, the electric vehicle market had problems such as opaque information, numerous levels and data leakage, which were criticized for the impact of the overall development and policies of the electric vehicle industry. In view of the problems existing in the transparency and security of big data management transactions of the Internet of vehicles, this paper combs the commercial operation framework of the Internet of Vehicles Platform, analyses the feasibility and necessity of establishing the token system of the Internet of Vehicles Platform, and constructs the token economic system architecture of the Internet of Vehicles Platform and its development path.
Sabir, Zakaria, Amine, Aouatif.  2021.  Connected Vehicles using NDN: Security Concerns and Remaining Challenges. 2021 7th International Conference on Optimization and Applications (ICOA). :1–6.
Vehicular networks have been considered as a hopeful technology to enhance road safety, which is a crossing area of Internet of Things (IoT) and Intelligent Transportation Systems (ITS). Current Internet architecture using the TCP/IP model and based on host-to-host is limited when it comes to vehicular communications which are characterized by high speed and dynamic topology. Thus, using Named Data Networking (NDN) in connected vehicles may tackle the issues faced with the TCP/IP model. In this paper, we investigate the security concerns of applying NDN in vehicular environments and discuss the remaining challenges in order to guide researchers in this field to choose their future research direction.
Jawad, Sidra, Munsif, Hadeera, Azam, Arsal, Ilahi, Arham Hasib, Zafar, Saima.  2021.  Internet of Things-based Vehicle Tracking and Monitoring System. 2021 15th International Conference on Open Source Systems and Technologies (ICOSST). :1–5.
Vehicles play an integral part in the life of a human being by facilitating in everyday tasks. The major concern that arises with this fact is that the rate of vehicle thefts have increased exponentially and retrieving them becomes almost impossible as the responsible party completely alters the stolen vehicles, leaving them untraceable. Ultimately, tracking and monitoring of vehicles using on-vehicle sensors is a promising and an efficient solution. The Internet of Things (IoT) is expected to play a vital role in revolutionizing the Security and Safety industry through a system of sensor networks by periodically sending the data from the sensors to the cloud for storage, from where it can be accessed to view or take any necessary actions (if required). The main contributions of this paper are the implementation and results of the prototype of a vehicle tracking and monitoring system. The system comprises of an Arduino UNO board connected to the Global Positioning System (GPS) module, Neo-6M, which senses the exact location of the vehicle in the form of latitude and longitude, and the ESP8266 Wi-Fi module, which sends the data to the Application Programming Interface (API) Cloud service, ThingSpeak, for storage and analyzing. An Android based mobile application is developed that utilizes the stored data from the Cloud and presents the user with the findings. Results show that the prototype is not only simple and cost effective, but also efficient and can be readily used by everyone from all walks of life to protect their vehicles.
Philipsen, Simon Grønfeldt, Andersen, Birger, Singh, Bhupjit.  2021.  Threats and Attacks to Modern Vehicles. 2021 IEEE International Conference on Internet of Things and Intelligence Systems (IoTaIS). :22–27.
As modern vehicles are complex IoT devices with intelligence capable to connect to an external infrastructure and use Vehicle-to-Everything (V2X) communication, there is a need to secure the communication to avoid being a target for cyber-attacks. Also, the organs of the car (sensors, communication, and control) each could have a vulnerability, that leads to accidents or potential deaths. Manufactures of cars have a huge responsibility to secure the safety of their costumers and should not skip the important security research, instead making sure to implement important security measures, which makes your car less likely to be attacked. This paper covers the relevant attacks and threats to modern vehicles and presents a security analysis with potential countermeasures. We discuss the future of modern and autonomous vehicles and conclude that more countermeasures must be taken to create a future and safe concept.
Qiu, Bin, Chen, Ke, He, Kexun, Fang, Xiyu.  2021.  Research on vehicle network intrusion detection technology based on dynamic data set. 2021 IEEE 3rd International Conference on Frontiers Technology of Information and Computer (ICFTIC). :386–390.
A new round of scientific and technological revolution and industrial reform promote the intelligent development of automobile and promote the deep integration of automobile with Internet, big data, communication and other industries. At the same time, it also brings network and data security problems to automobile, which is very easy to cause national security and social security risks. Intelligent vehicle Ethernet intrusion detection can effectively alleviate the security risk of vehicle network, but the complex attack means and vehicle compatibility have not been effectively solved. This research takes the vehicle Ethernet as the research object, constructs the machine learning samples for neural network, applies the self coding network technology combined with the original characteristics to the network intrusion detection algorithm, and studies a self-learning vehicle Ethernet intrusion detection algorithm. Through the application and test of vehicle terminal, the algorithm generated in this study can be used for vehicle terminal with Ethernet communication function, and can effectively resist 34 kinds of network attacks in four categories. This method effectively improves the network security defense capability of vehicle Ethernet, provides technical support for the network security of intelligent vehicles, and can be widely used in mass-produced intelligent vehicles with Ethernet.
Aman, Muhammad Naveed, Sikdar, Biplab.  2021.  AI Based Algorithm-Hardware Separation for IoV Security. 2021 IEEE Globecom Workshops (GC Wkshps). :1–6.
The Internet of vehicles is emerging as an exciting application to improve safety and providing better services in the form of active road signs, pay-as-you-go insurance, electronic toll, and fleet management. Internet connected vehicles are exposed to new attack vectors in the form of cyber threats and with the increasing trend of cyber attacks, the success of autonomous vehicles depends on their security. Existing techniques for IoV security are based on the un-realistic assumption that all the vehicles are equipped with the same hardware (at least in terms of computational capabilities). However, the hardware platforms used by various vehicle manufacturers are highly heterogeneous. Therefore, a security protocol designed for IoVs should be able to detect the computational capabilities of the underlying platform and adjust the security primitives accordingly. To solve this issue, this paper presents a technique for algorithm-hardware separation for IoV security. The proposed technique uses an iterative routine and the corresponding execution time to detect the computational capabilities of a hardware platform using an artificial intelligence based inference engine. The results on three different commonly used micro-controllers show that the proposed technique can effectively detect the type of hardware platform with up to 100% accuracy.
Lin, Hua Yi, Hsieh, Meng-Yen, Li, Kuan-Ching.  2021.  A Multi-level Security Key Management Protocol Based on Dynamic M-tree Structures for Internet of Vehicles. 2021 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS). :1–5.
With the gradually popular high-speed wireless networks and 5G environments, the quality and reliability of network services will be suited for mobile vehicles. In addition to communicating information between vehicles, they can also communicate information with surrounding roadside equipment, pedestrians or traffic signs, and thus improve the road safety of passers-by.Recently, various countries have continuously invested in research on autonomous driving and unmanned vehicles. The open communication environment of the Internet of Vehicles in 5G will expose all personal information in the field of wireless networks. This research is based on the consideration of information security and personal data protection. We will focus on how to protect the real-time transmission of information between mobile vehicles to prevent from imbedding or altering important transmission information by unauthorized vehicles, drivers or passers-by participating in communications. Moreover, this research proposes a multi-level security key management agreement based on a dynamic M-tree structure for Internet of Vehicles to achieve flexible and scalable key management on large-scale Internet of Vehicles.
Xu, Qichao, Zhao, Lifeng, Su, Zhou.  2021.  UAV-assisted Abnormal Vehicle Behavior Detection in Internet of Vehicles. 2021 40th Chinese Control Conference (CCC). :7500–7505.
With advantages of low cost, high mobility, and flexible deployment, unmanned aerial vehicle (UAVs) are employed to efficiently detect abnormal vehicle behaviors (AVBs) in the internet of vehicles (IoVs). However, due to limited resources including battery, computing, and communication, UAVs are selfish to work cooperatively. To solve the above problem, in this paper, a game theoretical UAV incentive scheme in IoVs is proposed. Specifically, the abnormal behavior model is first constructed, where three model categories are defined: velocity abnormality, distance abnormality, and overtaking abnormality. Then, the barging pricing framework is designed to model the interactions between UAVs and IoVs, where the transaction prices are determined with the abnormal behavior category detected by UAVs. At last, simulations are conducted to verify the feasibility and effectiveness of our proposed scheme.
Claude, Tuyisenge Jean, Viviane, Ishimwe, Paul, Iradukunda Jean, Didacienne, Mukanyiligira.  2021.  Development of Security Starting System for Vehicles Based on IoT. 2021 International Conference on Information Technology (ICIT). :505–510.
The transportation system is becoming tremendously important in today's human activities and the number of urban vehicles grows rapidly. The vehicle theft also has become a shared concern for all vehicle owners. However, the present anti-theft system which maybe high reliable, lack of proper mechanism for preventing theft before it happens. This work proposes the internet of things based smart vehicle security staring system; efficient security provided to the vehicle owners relies on securing car ignition system by using a developed android application running on smart phone connected to the designed system installed in vehicle. With this system it is non- viable to access the vehicle's functional system in case the ignition key has been stolen or lost. It gives the drivers the ability to stay connected with their vehicle. Whenever the ignition key is stolen or lost, it is impossible to start the vehicle as the ignition system is still locked on the vehicle start and only the authorized person will be able to start the vehicle at convenient time with the combination of ignition key and smart phone application. This study proposes to design the system that uses node MCU, Bluetooth low energy (BLE), transistors, power relays and android smartphone in system testing. In addition, it is cost effective and once installed in the vehicle there is no more cost of maintenance.
2022-06-08
Jia, Xianfeng, Liu, Tianyu, Sun, Chunhui, Wu, Zhi.  2021.  Analysis on the Application of Cryptographic Technology in the Communication Security of Intelligent Networked Vehicles. 2021 6th International Conference on Automation, Control and Robotics Engineering (CACRE). :423–427.

Intelligent networked vehicles are rapidly developing in intelligence and networking. The communication architecture is becoming more complex, external interfaces are richer, and data types are more complex. Different from the information security of the traditional Internet of Things, the scenarios that need to be met for the security of the Internet of Vehicles are more diverse and the security needs to be more stable. Based on the security technology of traditional Internet of Things, password application is the main protection method to ensure the privacy and non-repudiation of data communication. This article mainly elaborates the application of security protection methods using password-related protection technologies in car-side scenarios and summarizes the security protection recommendations of contemporary connected vehicles in combination with the secure communication architecture of the Internet of Vehicles.

2021-06-30
Lim, Wei Yang Bryan, Xiong, Zehui, Niyato, Dusit, Huang, Jianqiang, Hua, Xian-Sheng, Miao, Chunyan.  2020.  Incentive Mechanism Design for Federated Learning in the Internet of Vehicles. 2020 IEEE 92nd Vehicular Technology Conference (VTC2020-Fall). :1—5.
In the Internet of Vehicles (IoV) paradigm, a model owner is able to leverage on the enhanced capabilities of Intelligent Connected Vehicles (ICV) to develop promising Artificial Intelligence (AI) based applications, e.g., for traffic efficiency. However, in some cases, a model owner may have insufficient data samples to build an effective AI model. To this end, we propose a Federated Learning (FL) based privacy preserving approach to facilitate collaborative FL among multiple model owners in the IoV. Our system model enables collaborative model training without compromising data privacy given that only the model parameters instead of the raw data are exchanged within the federation. However, there are two main challenges of incentive mismatches between workers and model owners, as well as among model owners. For the former, we leverage on the self-revealing mechanism in contract theory under information asymmetry. For the latter, we use the coalitional game theory approach that rewards model owners based on their marginal contributions. The numerical results validate the performance efficiency of our proposed hierarchical incentive mechanism design.
Lahiri, Pralay Kumar, Das, Debashis, Mansoor, Wathiq, Banerjee, Sourav, Chatterjee, Pushpita.  2020.  A Trustworthy Blockchain based framework for Impregnable IoV in Edge Computing. 2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS). :26—31.
The concept behind the Internet of Things (IoT) is taking everything and connecting to the internet so that all devices would be able to send and receive data online. Internet of Vehicles (IoV) is a key component of smart city which is an outcome of IoT. Nowadays the concept of IoT has plaid an important role in our daily life in different sectors like healthcare, agriculture, smart home, wearable, green computing, smart city applications, etc. The emerging IoV is facing a lack of rigor in data processing, limitation of anonymity, privacy, scalability, security challenges. Due to vulnerability IoV devices must face malicious hackers. Nowadays with the help of blockchain (BC) technology energy system become more intelligent, eco-friendly, transparent, energy efficient. This paper highlights two major challenges i.e. scalability and security issues. The flavor of edge computing (EC) considered here to deal with the scalability issue. A BC is a public, shared database that records transactions between two parties that confirms owners through cryptography. After a transaction is validated and cryptographically verified generates “block” on the BC and transactions are ordered chronologically and cannot be altered. Implementing BC and smart contracts technologies will bring security features for IoV. It plays a role to implement the rules and policies to govern the IoV information and transactions and keep them into the BC to secure the data and for future uses.
Mershad, Khaleel, Said, Bilal.  2020.  A Blockchain Model for Secure Communications in Internet of Vehicles. 2020 IEEE/ACS 17th International Conference on Computer Systems and Applications (AICCSA). :1—6.
The wide expansion of the Internet of Things is pushing the growth of vehicular ad-hoc networks (VANETs) into the Internet of Vehicles (IoV). Secure data communication is vital to the success and stability of the IoV and should be integrated into its various operations and aspects. In this paper, we present a framework for secure IoV communications by utilizing the High Performance Blockchain Consensus (HPBC) algorithm. Based on a previously published communication model for VANETs that uses an efficient routing protocol for transmitting packets between vehicles, we describe in this paper how to integrate a blockchain model on top of the IoV communications system. We illustrate the method that we used to implement HPBC within the IoV nodes. In order to prove the efficiency of the proposed model, we carry out extensive simulations that test the proposed model and study its overhead on the IoV network. The simulation results demonstrated the good performance of the HPBC algorithm when implemented within the IoV environment.
Yan, Chenyang, Zhang, Yulei, Wang, Hongshuo, Yu, Shaoyang.  2020.  A Safe and Efficient Message Authentication Scheme In The Internet Of Vehicles. 2020 International Conference on Information Science, Parallel and Distributed Systems (ISPDS). :10—13.
In order to realize the security authentication of information transmission between vehicle nodes in the vehicular ad hoc network, based on the certificateless public key cryptosystem and aggregate signature, a privacy-protected certificateless aggregate signature scheme is proposed, which eliminates the complicated certificate maintenance cost. This solution also solves the key escrow problem. By Communicating with surrounding nodes through the pseudonym of the vehicle, the privacy protection of vehicle users is realized. The signature scheme satisfies the unforgeability of an adaptive selective message attack under a random prophetic machine. The scheme meets message authentication, identity privacy protection, resistance to reply attacks.
Aswal, Kiran, Dobhal, Dinesh C., Pathak, Heman.  2020.  Comparative analysis of machine learning algorithms for identification of BOT attack on the Internet of Vehicles (IoV). 2020 International Conference on Inventive Computation Technologies (ICICT). :312—317.
In this digital era, technology is upgrading day by day and becoming more agile and intelligent. Smart devices and gadgets are now being used to find solutions to complex problems in various domains such as health care, industries, entertainment, education, etc. The Transport system, which is the biggest challenge for any governing authority of a state, is also not untouched with this development. There are numerous challenges and issues with the existing transport system, which can be addressed by developing intelligent and autonomous vehicles. The existing vehicles can be upgraded to use sensors and the latest communication techniques. The advancements in the Internet of Things (IoT) have the potential to completely transform the existing transport system to a more advanced and intelligent transport system that is the Internet of Vehicles (IoV). Due to the connectivity with the Internet, the Internet of Vehicles (IoV) is exposed to various security threats. Security is the primary issue, which requires to be addressed for success and adoption of the IoV. In this paper, the applicability of machine learning based solutions to address the security issue of IoV is analyzed. The performance of six machine-learning algorithms to detect Bot threats is validated by the k-fold cross-validation method in python.