Loading [MathJax]/extensions/TeX/ietmacros.js
Establishing an Intelligent Transportation System With a Network Security Mechanism in an Internet of Vehicle Environment | IEEE Journals & Magazine | IEEE Xplore

Establishing an Intelligent Transportation System With a Network Security Mechanism in an Internet of Vehicle Environment

Open Access

As for communication protocols, CAs and RSUs use wired network while RSUs and vehicles use wireless network. In this study, only regular vehicles require anonymity protec...

Abstract:

The Internet of Vehicle (IoV) utilizes networks to conduct message exchange and related services or application. In recent years, smart cities and IoVs have become areas ...Show More
Topic: Intelligent Systems for the Internet of Things

Abstract:

The Internet of Vehicle (IoV) utilizes networks to conduct message exchange and related services or application. In recent years, smart cities and IoVs have become areas of interest in the new generation Internet of Things development, especially since the development of intelligent transportation system has focused on bettering traffic conditions. This paper proposes establishing an intelligent transportation system with a network security mechanism in an IoV environment, with emphasis on the following aspects: 1) this paper integrates intelligent transportation systems in traffic signal control to aid emergency vehicles in more promptly arriving at its destination; 2) in the case of traffic incidents, this paper's approach allows regular vehicles to obtain proof of incident from pertaining authorities and learn about nearby vehicles global positioning system information, such as position and speed, and utilize their car camcorder data for proving purposes; and 3) this paper combines roadside units (RSUs) with traffic signal control and transmits important information to the certificate authority (CA) for storage. Given that RSUs are limited in computation ability and storage space, we can assess and filter the information before sending it to the CA, reducing RSUs computational burden and storage space usage. This paper satisfies IoVs network security requirements of authentication, non-repudiation, conditional anonymity, and conditional untraceability, and, as seen from experiment results, the proposed method is superior to that of other studies.
Topic: Intelligent Systems for the Internet of Things
As for communication protocols, CAs and RSUs use wired network while RSUs and vehicles use wireless network. In this study, only regular vehicles require anonymity protec...
Published in: IEEE Access ( Volume: 5)
Page(s): 19239 - 19247
Date of Publication: 14 September 2017
Electronic ISSN: 2169-3536

References

References is not available for this document.