connected cars
Recently Published Documents


TOTAL DOCUMENTS

178
(FIVE YEARS 80)

H-INDEX

11
(FIVE YEARS 5)

2022 ◽  
Vol 114 ◽  
pp. 106523
Author(s):  
Carlos E. Andrade ◽  
Simon D. Byers ◽  
Vijay Gopalakrishnan ◽  
Emir Halepovic ◽  
David J. Poole ◽  
...  

2021 ◽  
Vol 7 (1) ◽  
pp. 332-342
Author(s):  
Fumihiko Isada

This study aimed to empirically examine whether rapid changes in the technological environment affect inter-organisational relationships. In the automotive industry, the advantage of cohesive and vertically integrated inter-organisational relationships has been pointed out conventionally. The development of connected cars, which can communicate bidirectionally with other systems outside the car, is eliciting significant changes in the traditional automotive products and the industry structure — changes generally associated with the automotive product structure moving closer to IT products. The aim was to empirically clarify what kind of network structure of inter-organisational relations firms are growing with changes in industrial structure by creating a database of actual firm behavior. The database was analyzed using the social network analysis method, and the characteristics of growing firms’ organisational network structure were extracted. Besides the traditional integrated inter-organisational relationships, the results show that there is a mixture of inter-organisational relationships with different characteristics of growth firms. This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.


Energies ◽  
2021 ◽  
Vol 14 (21) ◽  
pp. 7437
Author(s):  
Haqi Khalid ◽  
Shaiful Jahari Hashim ◽  
Sharifah Mumtazah Syed Ahmad ◽  
Fazirulhisyam Hashim ◽  
Muhammad Akmal Chaudhary

Connected vehicles have emerged as the latest revolution in the automotive industry, utilizing the advent of the Internet of Things (IoT). However, most IoT-connected cars mechanisms currently depend on available network services and need continuous network connections to allow users to connect to their vehicles. Nevertheless, the connectivity availability shortcoming in remote or rural areas with no network coverage makes vehicle sharing or any IoT-connected device problematic and undesirable. Furthermore, IoT-connected cars are vulnerable to various passive and active attacks (e.g., replay attacks, MiTM attacks, impersonation attacks, and offline guessing attacks). Adversaries could all use these attacks to disrupt networks posing a threat to the entire automotive industry. Therefore, to overcome this issue, we propose a hybrid online and offline multi-factor authentication cross-domain authentication method for a connected car-sharing environment based on the user’s smartphone. The proposed scheme lets users book a vehicle using the online booking phase based on the secured and trusted Kerberos workflow. Furthermore, an offline authentication phase uses the OTP algorithm to authenticate registered users even if the connectivity services are unavailable. The proposed scheme uses the AES-ECC algorithm to provide secure communication and efficient key management. The formal SOV logic verification was used to demonstrate the security of the proposed scheme. Furthermore, the AVISPA tool has been used to check that the proposed scheme is secured against passive and active attacks. Compared to the previous works, the scheme requires less computation due to the lightweight cryptographic algorithms utilized. Finally, the results showed that the proposed system provides seamless, secure, and efficient authentication operation for the automotive industry, specifically car-sharing systems, making the proposed system suitable for applications in limited and intermittent network connections.


Sensors ◽  
2021 ◽  
Vol 21 (17) ◽  
pp. 5854
Author(s):  
Ryuichi Fukatsu ◽  
Kei Sakaguchi

The development of automated driving is actively progressing, and connected cars are also under development. Connected cars are the technology of connecting vehicles to networks so that connected vehicles can enhance their services. Safety services are among the main services expected in connected car society. Cooperative perception belongs to safety services and improves safety by visualizing blind spots. This visualization is achieved by sharing sensor data via wireless communications. Therefore, the number of visualized blind spots highly depends upon the performance of wireless communications. In this paper, we analyzed the required sensor data rate to be shared for the cooperative perception in order to realize safe and reliable automated driving in an intersection scenario. The required sensor data rate was calculated by the combination of recognition and crossing decisions of an automated driving vehicle to adopt realistic assumptions. In this calculation, CVFH was used to derive tight requirements, and the minimum required braking aims to alleviate the traffic congestion around the intersection. At the end of the paper, we compare the required sensor data rate with the outage data rate realized by conventional and millimeter-wave communications, and show that millimeter-wave communications can support safe crossing at a realistic velocity.


2021 ◽  
Vol 23 (3) ◽  
pp. 58-77
Author(s):  
Adrija Ghansiyal ◽  
Mamta Mittal ◽  
Arpan Kumar Kar

The focus of automobile industry is towards producing efficient driverless cars that are risk free and with zero tolerance to safety violations thereby following in the footsteps of autonomous robots. In this study, the author elaborates on the vulnerabilities relevant to internet of things technology implementation in these connected cars, commonly termed as internet of vehicles. This topic has already been discussed frequently by the research community; however, the main contribution of the paper is to establish the connection of information management with autonomous systems, an aspect that other literatures lack. The focus of the study is on presenting a brief introduction to the foundation technologies used in the connected vehicles. It also aims to summarize the various security methods that have been used infrequently and could be further explored in future research.


2021 ◽  
Author(s):  
Emeka Obiodu ◽  
Abdullahi Abubakar ◽  
Aravindh Raman ◽  
Nishanth Sastry ◽  
Simone Mangiante
Keyword(s):  

Author(s):  
Fabio Arena ◽  
Giovanni Pau ◽  
Alessandro Severino ◽  
Salvatore Trubia ◽  
Salvatore Curto
Keyword(s):  

Author(s):  
Rafael Perea-Robles ◽  
Jordi Mateu ◽  
Carlos Collado ◽  
Robert Aigner

Sign in / Sign up

Export Citation Format

Share Document