A State-of-the-Art Assessment of US and EU C-ITS Security Solutions

Author(s):  
Yessenia Berenice Llive ◽  
Norbert Varga ◽  
László Bokor

In the near future with the innovative services and solutions being currently tested and deployed for cars, homes, offices, transport systems, smart cities, etc., the user connectivity will considerably change. It means that smart devices will be connected to the internet and produce a big impact on the internet traffic, increasing the service demand generated by devices and sensors. However most of these devices are vulnerable to attacks. Hence, the security and privacy become a crucial feature to be included in towards its appropriate deployment. Interconnected, cooperative, service-oriented devices and their related hardware/software solutions will contain sensitive data making such systems susceptible to attacks and leakage of information. Therefore, robust secure communication infrastructures must be established to aid suitable deployment. This chapter is a state-of-the-art assessment of US and EU C-ITS security solutions.

Sensors ◽  
2020 ◽  
Vol 20 (14) ◽  
pp. 3928 ◽  
Author(s):  
Rateb Jabbar ◽  
Mohamed Kharbeche ◽  
Khalifa Al-Khalifa ◽  
Moez Krichen ◽  
Kamel Barkaoui

The concept of smart cities has become prominent in modern metropolises due to the emergence of embedded and connected smart devices, systems, and technologies. They have enabled the connection of every “thing” to the Internet. Therefore, in the upcoming era of the Internet of Things, the Internet of Vehicles (IoV) will play a crucial role in newly developed smart cities. The IoV has the potential to solve various traffic and road safety problems effectively in order to prevent fatal crashes. However, a particular challenge in the IoV, especially in Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communications, is to ensure fast, secure transmission and accurate recording of the data. In order to overcome these challenges, this work is adapting Blockchain technology for real time application (RTA) to solve Vehicle-to-Everything (V2X) communications problems. Therefore, the main novelty of this paper is to develop a Blockchain-based IoT system in order to establish secure communication and create an entirely decentralized cloud computing platform. Moreover, the authors qualitatively tested the performance and resilience of the proposed system against common security attacks. Computational tests showed that the proposed solution solved the main challenges of Vehicle-to-X (V2X) communications such as security, centralization, and lack of privacy. In addition, it guaranteed an easy data exchange between different actors of intelligent transportation systems.


Telecom ◽  
2021 ◽  
Vol 2 (1) ◽  
pp. 108-140
Author(s):  
Paulo Álvares ◽  
Lion Silva ◽  
Naercio Magaia

It had been predicted that by 2020, nearly 26 billion devices would be connected to the Internet, with a big percentage being vehicles. The Internet of Vehicles (IoVa) is a concept that refers to the connection and cooperation of smart vehicles and devices in a network through the generation, transmission, and processing of data that aims at improving traffic congestion, travel time, and comfort, all the while reducing pollution and accidents. However, this transmission of sensitive data (e.g., location) needs to occur with defined security properties to safeguard vehicles and their drivers since attackers could use this data. Blockchain is a fairly recent technology that guarantees trust between nodes through cryptography mechanisms and consensus protocols in distributed, untrustful environments, like IoV networks. Much research has been done in implementing the former in the latter to impressive results, as Blockchain can cover and offer solutions to many IoV problems. However, these implementations have to deal with the challenge of IoV node’s resource constraints since they do not suffice for the computational and energy requirements of traditional Blockchain systems, which is one of the biggest limitations of Blockchain implementations in IoV. Finally, these two technologies can be used to build the foundations for smart cities, enabling new application models and better results for end-users.


2020 ◽  
Vol 60 (11) ◽  
pp. 16-20
Author(s):  
Vugar Hajimahmud Abdullayev ◽  
◽  
Vusala Alyag Abuzarova ◽  

The article is devoted to the study of cyber security problems in the Smart Cities system. The development of the IT industry has led to the introduction of new technologies into our lives. One of these technologies is the Internet of Things technology. The application of IoT technology has increased in recent years. One of the most important areas in which Internet of Things technology is applied is the Smart Cities system. The main difference between smart cities and other cities is that their components are connected to each other via the Internet. All these smart devices create a smart city system in general. One of the biggest and most important problems in many areas where the Internet is used is security. The article looks at possible security problems in the system of smart cities and solutions to ensure cyber security. Key words: Smart city; Internet of Things; Information technologies; Security; Cyber security


2015 ◽  
pp. 392-422
Author(s):  
Zhaohao Sun ◽  
John Yearwood

Web services are playing a pivotal role in business, management, governance, and society with the dramatic development of the Internet and the Web. However, many fundamental issues are still ignored to some extent. For example, what is the unified perspective to the state-of-the-art of Web services? What is the foundation of Demand-Driven Web Services (DDWS)? This chapter addresses these fundamental issues by examining the state-of-the-art of Web services and proposing a theoretical and technological foundation for demand-driven Web services with applications. This chapter also presents an extended Service-Oriented Architecture (SOA), eSMACS SOA, and examines main players in this architecture. This chapter then classifies DDWS as government DDWS, organizational DDWS, enterprise DDWS, customer DDWS, and citizen DDWS, and looks at the corresponding Web services. Finally, this chapter examines the theoretical, technical foundations for DDWS with applications. The proposed approaches will facilitate research and development of Web services, mobile services, cloud services, and social services.


2018 ◽  
Vol 7 (4.36) ◽  
pp. 700
Author(s):  
N. Koteswara Rao ◽  
Gandharba Swain

The proliferation of smart objects with capability of sensing, processing and communication has grown in recent years. In this scenario, the Internet of Things (IoT) connects these objects to the Internet and provides communication with users and devices. IoT enables a huge amount of new applications, with which academics and industries can benefit, such as smart cities, health care and automation. In this environment, compose of constrained devices, the widespread adoption of this paradigm depends of security requirements like secure communication between devices, privacy and anonymity of its users. This paper presents the main security challenges and solutions to provide authentication and authorization on the Internet of Things. 


2017 ◽  
Vol 23 (1) ◽  
pp. 44-52
Author(s):  
Laviniu Bojor

AbstractToday, more than ever, our society has become obsessed with technology and people surround themselves with smart devices designed to improve their lifestyle. Communications have benefited of this rise of the gadgets the most, and reality shows that most adults in the urban environment own a smartphone with the help of which they can connect to the Internet. We would be tempted to state that the World Wide Web will change in the future into Human World Wide Web, but connecting to the Internet does not stop here. Vehicles, TV sets and other electronic devices or appliances have already started to be connected to the Internet, which makes it easier to believe that, in the future, we will live in a society where most devices around us will be interconnected to a global or even spatial network. This concept, which the academic world embraced as the Internet of Things, should be understood and accepted by society not only from the perspective of the deprivation of privacy it generates, but especially from the perspective of the insecurity, a possible result of this dependence on software and programs that can be remotely accessed and controlled.


2020 ◽  
Vol 21 (3) ◽  
pp. 425-440 ◽  
Author(s):  
Sumit Kumar ◽  
Jaspreet Singh

The new age of the Internet of Things (IoT) is motivating the advancement of traditional Vehicular Ad-Hoc Networks (VANETs) into the Internet of Vehicles (IoV). This paper is an overview of smart and secure communications to reduce traffic congestion using IoT based VANETs, known as IoV networks. Studies and observations made in this paper suggest that the practice of combining IoT and VANET for a secure combination has rarely practiced. IoV uses real-time data communication between vehicles to everything (V2X) using wireless communication devices based on fog/edge computing; therefore, it has considered as an application of Cyber-physical systems (CPS). Various modes of V2X communication with their connecting technologies also discussed. This paper delivers a detailed introduction to the Internet of Vehicles (IoV) with current applications, discusses the architecture of IoV based on currently existing communication technologies and routing protocols, presenting different issues in detail, provides several open research challenges and the trade-off between security and privacy in the area of IoV has reviewed. From the analysis of previous work in the IoV network, we concluded the utilization of artificial intelligence and machine learning concept is a beneficial step toward the future of IoV model.


2020 ◽  
Author(s):  
Rateb Jabbar ◽  
Moez Krichen ◽  
Mohamed Kharbeche ◽  
Noora Fetais ◽  
Kamel Barkaoui

<div>The emergence of embedded and connected smart technologies, systems, and devices has enabled the concept of smart cities by connecting every ``thing'' to the Internet and in particular in transportation through the Internet of Vehicles (IoV). The main purpose of IoV is to prevent fatal crashes by resolving traffic and road safety problems. Nevertheless, it is paramount to ensure secure and accurate transmission and recording of data in ``Vehicle-to-Vehicle'' (V2V) and ``Vehicle-to-Infrastructure'' (V2I) communication. </div><div>To improve ``Vehicle-to-Everything'' (V2X) communication, this work uses Blockchain technology for developing a Blockchain-based IoT system aimed at establishing secure communication and developing a fully decentralized cloud computing platform.</div><div> Moreover, the authors propose a model-based framework to validate the proposed approach. This framework is mainly based on the use of the Attack Trees (AT) and timed automaton (TA) formalisms in order to test the functional, load and security aspects. An optimization phase for testers placement inspired by fog computing is proposed as well.</div>


The future of Internet of Things (IoT) is already upon us. The Internet of Things (IoT) is the ability to provide everyday devices with a way of identification and another way for communication with each other. The spectrum of IoT application domains is very large including smart homes, smart cities, wearables, e-health, etc. Consequently, tens and even hundreds of billions of devices will be connected. Such devices will have smart capabilities to collect, analyze and even make decisions without any human interaction. Security is a supreme requirement in such circumstances, and in particular authentication is of high interest given the damage that could happen from a malicious unauthenticated device in an IoT system. While enjoying the convenience and efficiency that IoT brings to us, new threats from IoT also have emerged. There are increasing research works to ease these threats, but many problems remain open. To better understand the essential reasons of new threats and the challenges in current research, this survey first proposes the concept of “IoT features”. Then, the security and privacy effects of eight IoT new features were discussed including the threats they cause, existing solutions and challenges yet to be solved.


Sensors ◽  
2019 ◽  
Vol 19 (11) ◽  
pp. 2466 ◽  
Author(s):  
Maryam Naseer Malik ◽  
Muhammad Awais Azam ◽  
Muhammad Ehatisham-Ul-Haq ◽  
Waleed Ejaz ◽  
Asra Khalid

The Internet of Things is a rapidly growing paradigm for smart cities that provides a way of communication, identification, and sensing capabilities among physically distributed devices. With the evolution of the Internet of Things (IoTs), user dependence on smart systems and services, such as smart appliances, smartphone, security, and healthcare applications, has been increased. This demands secure authentication mechanisms to preserve the users’ privacy when interacting with smart devices. This paper proposes a heterogeneous framework “ADLAuth” for passive and implicit authentication of the user using either a smartphone’s built-in sensor or wearable sensors by analyzing the physical activity patterns of the users. Multiclass machine learning algorithms are applied to users’ identity verification. Analyses are performed on three different datasets of heterogeneous sensors for a diverse number of activities. A series of experiments have been performed to test the effectiveness of the proposed framework. The results demonstrate the better performance of the proposed scheme compared to existing work for user authentication.


Sign in / Sign up

Export Citation Format

Share Document