A Crowd-Based Intelligence Approach for Measurable Security, Privacy, and Dependability in Internet of Automated Vehicles with Vehicular Fog

被引:6
|
作者
Rauniyar, Ashish [1 ,2 ]
Hagos, Desta Haileselassie [1 ,2 ]
Shrestha, Manish [1 ,3 ]
机构
[1] Univ Oslo, Dept Informat, Network & Distributed Syst ND Res Grp, Oslo, Norway
[2] OsloMet Oslo Metropolitan Univ, Dept Comp Sci, Autonomous Syst & Networks ASN Res Grp, Oslo, Norway
[3] eSmart Syst, Halden, Norway
关键词
D O I
10.1155/2018/7905960
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the advent of Internet of things (IoT) and cloud computing technologies, we are in the era of automation, device-to-device (D2D) and machine-to-machine (M2M) communications. Automated vehicles have recently gained a huge attention worldwide, and it has created a new wave of revolution in automobile industries. However, in order to fully establish automated vehicles and their connectivity to the surroundings, security, privacy, and dependability always remain a crucial issue. One cannot deny the fact that such automatic vehicles are highly vulnerable to different kinds of security attacks. Also, today's such systems are built from generic components. Prior analysis of different attack trends and vulnerabilities enables us to deploy security solutions effectively. Moreover, scientific research has shown that a "group" can perform better than individuals in making decisions and predictions. Therefore, this paper deals with the measurable security, privacy, and dependability of automated vehicles through the crowd-based intelligence approach that is inspired from swarm intelligence. We have studied three use case scenarios of automated vehicles and systems with vehicular fog and have analyzed the security, privacy, and dependability metrics of such systems. Our systematic approaches to measuring efficient system configuration, security, privacy, and dependability of automated vehicles are essential for getting the overall picture of the system such as design patterns, best practices for configuration of system, metrics, and measurements.
引用
收藏
页数:14
相关论文
共 37 条
  • [21] Privacy-Preserving and Real-Time Detection of Vehicular Congestion Using Multilayer Perceptron Approach for Internet of Vehicles
    Li, Yongbiao
    Zhou, Dehua
    Li, Yanling
    Weng, Jian
    Sun, Meng
    Yang, Ye
    Li, Ming
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 71 (12) : 12530 - 12542
  • [22] RETRACTED: Security and Privacy Protection of Internet of Vehicles Consensus Algorithm Based on Wireless Sensors (Retracted Article)
    Zhang, Yao
    Ji, Gaoqing
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [23] Dependability and Security Quantification of an Internet of Medical Things Infrastructure Based on Cloud-Fog-Edge Continuum for Healthcare Monitoring Using Hierarchical Models
    Tuan Anh Nguyen
    Min, Dugki
    Choi, Eunmi
    Lee, Jae-Woo
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (21) : 15704 - 15748
  • [24] Wiretap resisting and privacy preserving data exchange with physical layer security and blockchain based authentication in Internet of Vehicles
    Liu, Qiao
    Han, Qi
    Luo, Guangze
    Cao, Jin
    Li, Hui
    Wang, Yong
    MICROPROCESSORS AND MICROSYSTEMS, 2024, 104
  • [25] Security and Privacy Schemes in Vehicular Ad-Hoc Network With Identity-Based Cryptography Approach: A Survey
    Al-Shareeda, Mahmood A.
    Anbar, Mohammed
    Manickam, Selvakumar
    Khalil, Ayman
    Hasbullah, Iznan Husainy
    IEEE ACCESS, 2021, 9 : 121522 - 121531
  • [26] Towards Automated Matching of Cyber Threat Intelligence Reports based on Cluster Analysis in an Internet-of-Vehicles Environment
    Raptis, George E.
    Katsini, Christina
    Alexakos, Christos
    PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, : 366 - 371
  • [27] Verifiable and privacy-preserving fine-grained data management in vehicular fog computing: A game theory-based approach
    Seyedi, Zahra
    Rahmati, Farhad
    Ali, Mohammad
    Liu, Ximeng
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (01) : 410 - 431
  • [28] Verifiable and privacy-preserving fine-grained data management in vehicular fog computing: A game theory-based approach
    Zahra Seyedi
    Farhad Rahmati
    Mohammad Ali
    Ximeng Liu
    Peer-to-Peer Networking and Applications, 2024, 17 : 410 - 431
  • [29] A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography (vol 102, 108205, 2022)
    Rathore, Manjari Singh
    Poongodi, M.
    Saurabh, Praneet
    Lilhore, Umesh Kumar
    Bourouis, Sami
    Alhakami, Wajdi
    Osamor, Jude
    Hamdi, Mounir
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 103
  • [30] Deep-Learning-Based Mobile Group Intelligence Perception Mechanism Oriented to User Privacy and Data Security in the Internet of Things
    Hu, Hexuan
    Wang, Lizhi
    Hu, Qiang
    Bu, Yongxi
    Zhang, Ye
    IEEE WIRELESS COMMUNICATIONS, 2022, 29 (02) : 60 - 67