Social Internet of Vehicles

Author(s):  
Talal A. Butt ◽  
Razi Iqbal ◽  
Mounir Kehal

Advent of internet of things (IoT) has significantly enriched the opportunities of crafting state-of-the-art applications of smart connected objects. Intelligent transportation systems (ITS) are playing a vital role in the development of smart systems for transportation throughout the world. Based on IoT, the internet of vehicles (IoV) paradigm is emerging to revolutionize the field of ITS. In this paradigm, vehicles leverage the use of internet for socializing with other vehicles, infrastructures, passengers, and drivers. This concept of vehicle socialization is referred to as social internet of vehicles (SIoV). This chapter presents the GCC (Gulf Cooperation Council) perspective of SIoVs by highlighting the latest trends being followed by GCC countries in the broader field ITS. It also provides an insight into opportunities enabled by SIoV applications that can be availed by GCC countries along with the challenges and limitations.

Sensors ◽  
2019 ◽  
Vol 19 (14) ◽  
pp. 3107 ◽  
Author(s):  
Ramon Sanchez-Iborra ◽  
José Santa ◽  
Jorge Gallego-Madrid ◽  
Stefan Covaci ◽  
Antonio Skarmeta

Internet of Vehicles (IoV) is a hot research niche exploiting the synergy between Cooperative Intelligent Transportation Systems (C-ITS) and the Internet of Things (IoT), which can greatly benefit of the upcoming development of 5G technologies. The variety of end-devices, applications, and Radio Access Technologies (RATs) in IoV calls for new networking schemes that assure the Quality of Service (QoS) demanded by the users. To this end, network slicing techniques enable traffic differentiation with the aim of ensuring flow isolation, resource assignment, and network scalability. This work fills the gap of 5G network slicing for IoV and validates it in a realistic vehicular scenario. It offers an accurate bandwidth control with a full flow-isolation, which is essential for vehicular critical systems. The development is based on a distributed Multi-Access Edge Computing (MEC) architecture, which provides flexibility for the dynamic placement of the Virtualized Network Functions (VNFs) in charge of managing network traffic. The solution is able to integrate heterogeneous radio technologies such as cellular networks and specific IoT communications with potential in the vehicular sector, creating isolated network slices without risking the Core Network (CN) scalability. The validation results demonstrate the framework capabilities of short and predictable slice-creation time, performance/QoS assurance and service scalability of up to one million connected devices.


Sensors ◽  
2020 ◽  
Vol 20 (14) ◽  
pp. 3928 ◽  
Author(s):  
Rateb Jabbar ◽  
Mohamed Kharbeche ◽  
Khalifa Al-Khalifa ◽  
Moez Krichen ◽  
Kamel Barkaoui

The concept of smart cities has become prominent in modern metropolises due to the emergence of embedded and connected smart devices, systems, and technologies. They have enabled the connection of every “thing” to the Internet. Therefore, in the upcoming era of the Internet of Things, the Internet of Vehicles (IoV) will play a crucial role in newly developed smart cities. The IoV has the potential to solve various traffic and road safety problems effectively in order to prevent fatal crashes. However, a particular challenge in the IoV, especially in Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communications, is to ensure fast, secure transmission and accurate recording of the data. In order to overcome these challenges, this work is adapting Blockchain technology for real time application (RTA) to solve Vehicle-to-Everything (V2X) communications problems. Therefore, the main novelty of this paper is to develop a Blockchain-based IoT system in order to establish secure communication and create an entirely decentralized cloud computing platform. Moreover, the authors qualitatively tested the performance and resilience of the proposed system against common security attacks. Computational tests showed that the proposed solution solved the main challenges of Vehicle-to-X (V2X) communications such as security, centralization, and lack of privacy. In addition, it guaranteed an easy data exchange between different actors of intelligent transportation systems.


Electronics ◽  
2021 ◽  
Vol 10 (18) ◽  
pp. 2223 ◽  
Author(s):  
Sarah Ali Siddiqui ◽  
Adnan Mahmood ◽  
Quan Z. Sheng ◽  
Hajime Suzuki ◽  
Wei Ni

Over the past decade, the groundbreaking technological advancements in the Internet of Vehicles (IoV) coupled with the notion of trust have attracted increasing attention from researchers and experts in intelligent transportation systems (ITS), wherein vehicles establish a belief towards their peers in the pursuit of ensuring safe and efficacious traffic flows. Diverse domains have been taking advantage of trust management models in the quest of alleviating diverse insider attacks, wherein messages generated by legitimate users are altered or counterfeited by malicious entities, subsequently, endangering the lives of drivers, passengers, and vulnerable pedestrians. In the course of vehicles forming perceptions towards other participating vehicles, a range of contributing parameters regarding the interactions among these vehicles are accumulated to establish a final opinion towards a target vehicle. The significance of these contributing parameters is typically represented by associating a weighting factor to each contributing attribute. The values assigned to these weighting factors are often set manually, i.e., these values are predefined and do not take into consideration any affecting parameters. Furthermore, a threshold is specified manually that classifies the vehicles into honest and dishonest vehicles relying on the computed trust. Moreover, adversary models as an extension to trust management models in order to tackle the variants of insider attacks are being extensively emphasized in the literature. This paper, therefore, reviews the state of the art in the vehicular trust management focusing on the aforementioned factors such as quantification of weights, quantification of threshold, misbehavior detection, etc. Moreover, an overarching IoV architecture, constituents within the notion of trust, and attacks relating to the IoV have also been presented in addition to open research challenges in the subject domain.


2021 ◽  
Vol 28 (1) ◽  
pp. 31-39
Author(s):  
Izdihar Shaleesh ◽  
Akram Almohammedi ◽  
Naji Mohammad ◽  
Ali Ahmad ◽  
Vladimir Shepelev

With increase in the population, the number of registered vehicles has dramatically increased over all the world, and this leads to a high rate of traffic accidents on the roads. Therefore, in order to prevent such accidents, an Intelligent Transportation Systems (ITSs) is needed to be installed to notify drivers of obstacles in advance. Recently, the Internet of things (IoT) evolves the vehicular communications and covers this technology under the Internet of vehicles (IoV) application. IoV is a new field for the automotive industry and a significant part of the smart cities. However, protecting the privacy of vehicle's location is the most challenging subject in the vehicular communication, as because it threatens the personal life of drivers. This paper provides cooperation and radio silence strategy in mix zone (CRSMZ) to protect location privacy of vehicle in IoV. The strategy implements either cooperation or radio silence depending on the speed of the vehicle while it is in mix _zone. The simulation results show that CRSMZ is an efficient strategy to protect location information of vehicle drivers. CRSMZ outperforms the existing strategies in terms of mean of the number tracker confusion, continuous tracking period and max of the entropy.


Author(s):  
Nurbaiti Nurbaiti ◽  
Nadhrah Al Aflah ◽  
Supardi Supardi

Almost all corners of the world have been affected or affected by this Covid-19 virus disease, even some countries have set a lockdown status and other anticipations for the spread of the Covid-19 virus. The alternative used in this bold learning activity system is to utilize the internet network, namely the Zoom Meeting and Classroom application. This study aims to determine students' perceptions of the use of internet networks such as zoom meetings and classrooms used and how effective learning is during the Covid-19 pandemic. The research conducted here uses descriptive qualitative research methods. And the results of this study indicate that the zoom application is an application that is very effective and preferred by students because it is easier to use and very efficient when the learning process is bold and shows that some students who give their perception of the application used during learning that are brave are the Zoom Meeting application, namely the application. Zoom Meeting. by 66.7%, followed by the Google Meet application at 22.2% and the Classrom application at 11.1%.  


2021 ◽  
pp. 111-120
Author(s):  
Rob Kitchin

This chapter charts the transition from an analogue to a digital world, its effect on data footprints and shadows, and the growth of data brokers and government use of data. The World Wide Web (WWW) started to change things by making information accessible across the Internet through an easy-to-use, intuitive graphical interface. Using the Internet, people started leaving digital traces. In their everyday lives, their digital shadows were also growing through the use of debit, credit, and store loyalty cards, and captured in government databases which were increasingly digital. Running tandem to the creation of digital lifestyles was the datafication of everyday life. This was evident in a paper which examined the various ways in which digital data was being generated and tracked using indexical codes about people, but also objects, transactions, interactions, and territories, and how these data were being used to govern people and manage organizations. Today, people live in a world of continuous data production, since smart systems generate data in real time.


Sign in / Sign up

Export Citation Format

Share Document