scholarly journals Issues, Challenges, and Research Opportunities in Intelligent Transport System for Security and Privacy

2018 ◽  
Vol 8 (10) ◽  
pp. 1964 ◽  
Author(s):  
Qazi Ali ◽  
Naveed Ahmad ◽  
Abdul Malik ◽  
Gauhar Ali ◽  
Waheed Rehman

Intelligent transport system (ITS), owing to their potential to enhance road safety and improve traffic management, have attracted attention from automotive industries and academia in recent years. The underlying technology—i.e., vehicular ad-hoc networks (VANETs)—provide a means for vehicles to intelligently exchange messages regarding road and traffic conditions to enhance safety. The open nature of ITS as wireless communication technology leads to many security and privacy challenges. These challenges pertain to confidentiality, authentication, integrity, non-repudiation, location privacy, identity privacy, anonymity, certificate revocation, and certificate resolution. This article aims to propose a novel taxonomy of security and privacy issues and solutions in ITS. Furthermore, categorization of security and privacy schemes in ITS and their limitations are discussed with various parameters—scalability, privacy, computational cost, communication overhead, latency—and various types of security attacks has been analyzed. This article leverages new researchers for challenges and opportunities related to security and privacy in ITS.

Author(s):  
Amira Kchaou ◽  
Ryma Abassi ◽  
Sihem Guemara El Fatmi

Vehicular ad-hoc networks (VANETs) allow communication among vehicles using some fixed equipment on roads called roads side units. Vehicular communications are used for sharing different kinds of information between vehicles and RSUs in order to improve road safety and provide travelers comfort using exchanged messages. However, falsified or modified messages can be transmitted that affect the performance of the whole network and cause bad situations in roads. To mitigate this problem, trust management can be used in VANET and can be distributive for ensuring safe and secure communication between vehicles. Trust is a security concept that has attracted the interest of many researchers and used to build confident relations among vehicles. Hence, the authors propose a secured clustering mechanism for messages exchange in VANET in order to organize vehicles into clusters based on vehicles velocity, then CH computes the credibility of message using the reputation of vehicles and the miner controls the vehicle's behavior for verifying the correctness of the message.


Author(s):  
Amira Kchaou ◽  
Ryma Abassi ◽  
Sihem Guemara El Fatmi

Vehicular ad-hoc networks (VANETs) allow communication among vehicles using some fixed equipment on roads called roads side units. Vehicular communications are used for sharing different kinds of information between vehicles and RSUs in order to improve road safety and provide travelers comfort using exchanged messages. However, falsified or modified messages can be transmitted that affect the performance of the whole network and cause bad situations in roads. To mitigate this problem, trust management can be used in VANET and can be distributive for ensuring safe and secure communication between vehicles. Trust is a security concept that has attracted the interest of many researchers and used to build confident relations among vehicles. Hence, the authors propose a secured clustering mechanism for messages exchange in VANET in order to organize vehicles into clusters based on vehicles velocity, then CH computes the credibility of message using the reputation of vehicles and the miner controls the vehicle's behavior for verifying the correctness of the message.


Author(s):  
Shahirah Mohamed Hatim ◽  
Shamsul Jamel Elias ◽  
Norkhushaini Awang ◽  
Mohd Yusof Darus

<span>Recent advancement of wireless technology and Internet of Things (IoT) have brought a significant development in Vehicular Ad hoc Networks (VANETs). VANET and IoT are the key elements in the current Intelligent Transport System (ITS). Various research on VANET and IoT shows that both have substantial effects in smart transportation system. This paper aims to discuss and illustrate the main challenges and drawbacks; the routing protocols, security and privacy experienced by VANETs respectively. This paper also would like to address the importance of IoT based on VANET in traffic control management system to cope up with the new wireless technology era. Section I of this paper provides a brief explanation on VANETs and IoT, section II discusses the main challenges suffered by VANETs and IoT, section III covers on the existing applications of VANETs and IoT and section IV conclude the views.</span>


2021 ◽  
Vol 7 (2) ◽  
Author(s):  
Akshay Kumar MV ◽  
Amogh C ◽  
Bhuvan S Kashyap ◽  
Drupad N Maharaj ◽  
Shazia Sultana

India accounts for the highest road accidents and traffic congestion globally. The necessity for a canny vehicle framework is of great importance. VANET, abbreviated as Vehicular ad hoc networks is a network created in an ad hoc manner where different vehicles can exchange useful information among each other with dedicated servers ensuring safe travel. Security in VANET has always been a challenge in implementing a real time intelligent transport system. VANET is a type of mobile ad-hoc, to give correspondences among close by vehicles and among vehicles and close by fixed hardware. Vehicular ad hoc networks are highly dynamic in nature and suffer from frequent path breakage due to the high velocity of the moving vehicle. Hence, there are many security challenges and different types of attacks that makes VANETs less secure. Therefore, providing secure dedicated short-range communication (DSRC) easefully with any loss of data or malicious nodes has been a major research area. The major concern being addressed in the paper is to provide secure communication and save lives in road accidents. The role of security is high and messages in DSRC send warning messages to other vehicles. If attackers change these messages, then accidents become a part of the network and users’ lives can be at risk. Different classes of attacks include monitoring attack, social attack, timing attack, application attack and network attack to name a few. Advanced encryption standard is a symmetric block encryption algorithm. There is no evidence to crack this algorithm till date. This paper will provide a detailed overview of VANET architecture, types of attacks on VANET, AES algorithm and its salient features and how this algorithm could be utilized to make intelligent transport systems secure.


2018 ◽  
Vol 8 (12) ◽  
pp. 2546
Author(s):  
Tao Wang ◽  
Xiaohu Tang

It is a challenging issue to provide a secure and conditional anonymous authentication scheme in vehicle ad hoc networks (VANETs) with low storage space and computational cost. In 2008, Lu et al. proposed a conditional privacy preservation scheme called efficiency conditional privacy preservation (ECPP) protocol. The ECPP protocol provides conditional privacy preservation to vehicles in VANETs. That is, on one hand vehicles can achieve anonymous authentication in the network, on the other hand, allow to be traced and revoked if necessary. However, ECPP scheme suffers from high computational cost and large storage. In this scheme, an improved protocol based on the concept of ECPP protocol has been proposed to achieve more efficiency conditional privacy preservation (MECPP) scheme in VANETs. Comparing with ECCP, the computational cost of the proposed scheme has been decreased by about 54 % while the communication overhead has been reduced by about 10 % . At the same time, a lot of storage space has been saved.


Traffic management has been and remains a significant issue, particularly in urban regions with elevated vehicle density. Adoption of an intelligent transport system (ITS) has extensively experimented to curb the traffic threat with blended experiences as a result. By communicating with other vehicles traveling on the same road in the form of clusters, an ad hoc vehicle network (VANET) forms and ITS that can allow vehicles with less human input to cooperate. By considering the elevated mobility nature of cars in VANET, this article provides a solution to the primary threat of VANET clustering by embracing the flexibility of fuzzy logics for cluster formation on a multilane urban high way. It also demonstrates that cluster stability is enhanced by performing the cluster head (CH) selection process based on a mixture of fuzzy logic, lane weighting, and utility function with the fuzzy membership function adjusted to boost cluster stability


2021 ◽  
Vol 1 (3) ◽  
pp. 70-88
Author(s):  
Muhammad Waseem ◽  
Khawaja Arslan Ahmed ◽  
Muhammad Talha Azeem

Blockchain technology is widely studied in these days and has vital role in the ITS and Vehicular network. Intelligent Transport System (ITS) have resolved several issues of transportation like congestion, electronic toll collection, traffic light cameras, traffic updates, and environment forecasting. The vehicular network is the ever-increasing network it is not only facilitates us but also brings new challenges with it. The mobile nature of vehicular networks it is very important to collect and broadcast information of traffic events in real-time. A little delay to broadcast important information or deciding on this information can cause a serious situation in the mobile vehicular network. Moreover, malicious vehicles in the network broadcasting false information about these traffic events cause a disturbance in the network. In large-scale scenarios, the transmission of malicious messages offers a lot of danger to the system. They can wrongly claim the roads and provide false information about the incident. These traffic events can be life-threatening and cause unwanted situations like accidents, wastage of time and other resources. Therefore, it is very much important to provide real-time information on recent traffic events and real-time authentication of vehicles that broadcast information in the network. Traditional studies are unable to solve these security issues and contain a single point of failure issue. These studies are centralized and dependent on a single higher authority. Moreover, they have serious security concerns that are harmful for vehicular network. Moreover, any vehicles are unwilling to share their private information while broadcasting information about traffic events because they are strangers to each other. And if a vehicle does not want to share its private information like name, id, etc. It is not possible to authenticate this vehicle and manage trust in the network. It means that it is very crucial to prevent vehicles to broadcast wrong information in the network while preserving their privacy at the same time. Therefore, there is a need to authenticate vehicles and manage trust in the network while preserving their privacy simultaneously. Blockchain can offer better solution to solve these issues due to its secure distributed environment and features that ensure immutability about actions. The purpose of this report is to provide real-time security and privacy in the network. It is also ensured that vehicles get real-time authenticated information about traffic incidents from legitimate vehicles while simultaneously preserving their privacy. It means that only authenticated and legitimate entities (vehicles) can participate in vehicular network and privacy of both sender and receiver is secured in the network. Details of conducted experiments are given, and shreds of evidence are provided to evaluate the performance of architectures for authentication and trust management. The shreds of evidence show that these blockchain-based systems can solve security and trust issues more effectively.


Vehicle tracking and classification are used for intelligent transport system to provide data in terms of traffic management, routing, vehicle volume and others. A new approach will be introduced in this paper, a hybrid classifier that would detect vehicles that would be adaptable to Philippine settings. A combination of convolutional neural network and gradient boosted classifier would boost the classifying accuracy. In the discussion, CNN has outperformed other classifier in terms of accuracy while GBC got the highest AUROC and highest accuracy in terms of classifying. Although CNN and GBC is prone to overfitting, the dataset that will be used contains 1 hour of video.


Day by day as the volume of data is being generated massively, storing of data and processing of data becomes a ever growing challenge in intelligent transport system (ITS). In intelligent transport system there are different areas to concentrate like smart parking systems, dynamic toll charging, smart traffic management etc. This paper is mainly focused on big data architecture for intelligent transport system for dynamic toll charging, traffic management and traffic analysis related data collection from various sources. The data collected from various sources can be in the form of structured data, semi structured data and unstructured data. Because of verity of data collected, this paper gives an idea about which data model is appropriate depending on data collected for transportation system.


Vehicular Ad hoc Network has been a key component of the Intelligent Transport System. An efficient mechanism for dissemination of information in VANETs is a challenging task. The high mobility of vehicular nodes and varying traffic flows makes selection of best relay vehicle to disseminate information a taxing task. Periodic beaconing for gathering information about the vehicles in the vicinity is though commonly employed in VANETs, but it degrades the performance resulting in channel contention and collisions. This paper presents a Speed Adaptive Beacon Broadcast approach that controls the beaconing rate depending upon the speed at which the vehicle is moving in comparison to the other vehicles in its locality. The selection of the relay vehicle is done keeping in consideration its distance from the source, local density and priority is given to the vehicle at an intersection. The approach is evaluated for both highway and urban scenario and simulation outcome reveals that SABB performs well in comparison to some of the existing approaches.


Sign in / Sign up

Export Citation Format

Share Document