Security Aspect in Iov: Alochana Chakra Journal Issn No:2231-3990

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

Alochana Chakra Journal ISSN NO:2231-3990

Security aspect in IoV


Farah Jamal Ansari
F/O Engg. and Technology, JMI
[email protected]

Abstract
At the time when a huge number of people drive the vehicles such as cars and other four-wheelers, there is
a rise in the figure of death toll that happened because of the accidents. When these automobiles are more
and more getting linked to the Internet of Things (IoT), they create the Internet of vehicles (IoV).
Therefore, IoV would be the junction of Internet of Things and mobile internet. So, this is an evolving area
for the automobile manufacturing and essential portion of the smart cities. So as to enable that evolving
area, the review of the research progress is being done of IoV, and would pay consideration to the safety
and security. Through profoundly examining the security features and architecture, the safety necessities
would be provided. Basis on this, we will be discussing the status of the research to significant
technologies consist of, communication security, encryption mechanism, protecting sensor data,
cryptographic algorithms and challenges of briefly outline.

Keywords: VANET, Internet of Vehicles (IoV), Connected cars, In-car Internet, Intelligent
transportation systems (ITS).

1. INTRODUCTION

Cars with self-driving scheduled to hit European highways nearly 2021, the question is growingly pressing
one of how they would interconnect to the different automobiles. What is the emergence of Internet of
Vehicles, an arrangement that would allow connectivity and communication of vehicle to vehicle (V2V)
communications, as well as more intuition in human-driven linked trucks and cars on roadways? Internet
of Vehicle is a vigorous travelling communiqué structure that would interconnects amid automobiles,
using of people’s networks V2V, vehicle to road (V2R), vehicle to sensor (V2S) and also vehicle to human
(V2H) communications [1] to enable more safety on the roadways, management of the traffic and make
available convenience to drivers. By collection of the information and share it amongst the automobiles,
roadways and its surrounds, that structure could efficiently direct the automobiles, and make available
services of mobile Internet applications [2]. The automobiles network is in actual fact a
vehicular ad hoc network (VANET) of on-board units (OBUs) in automobiles and roadside units (RSUs)
in the permanent roadways setup as presented in figure 1. Vehicle on-board units (OBUs) contain the
systems of localization (e.g., inertial measurement unit and global positioning system), sensors, processing
units and around the vehicle the radio transceivers astride in. Roadside units (RSUs) are microcontrollers
and sensors together with fitted and in roadways for instance, road signs, traffic lights fitted with the
closed circuit television (CCTV) and traffic light actuators and pressure sensors on the roadways.

Volume IX, Issue IX, September/2020 Page No:246


Alochana Chakra Journal ISSN NO:2231-3990

Figure 1: A typical Internet of Vehicles (IoV) cloud architecture

Safety, privacy and security of internet of vehicle (IoV) would be matter of concern for the reason of that
on the roads this would disturb the people’s life. In case the network interference occurs in internet of
vehicle (IoV), it might be possible that automobiles could be controlled by the hackers; in consequence the
accidents may occur. All at once, tracks of driving are people’s privacy. Sometimes, people don’t want to
let anybody know when and where they are. Nevertheless, the internet of vehicles (IoV) might trace and
automobiles’ track of driving, that would expose the privacy. Certain information in internet of vehicle
(IoV) might be uncovered, whereas certain information should be secured as confidentiality. Security and
safety might reassure the safety of driving of automobile and care of the secrecy of the public. IoV is
facing challenges and decelerating down its acceptance comprise of huge data, privacy, mobility, security,
standards and reliability. The presented matters must be addressed to Internet of Vehicle (IoV) make more
trustworthy and adopted and widely reliable. Internet of Vehicle (IoV) has various uses that contains [3,4,5]
 Safe driving: That discusses the avoidance systems of collision of cooperative that utilizes devices to
identify forthcoming accident and delivers cautioning for driving the vehicle to the drivers. These
applications include messages of status of time intervals and messages of emergency. The message in case
of emergency is produced in the situation of the accident, condition of bad road and traffic jam as well.
 Traffic control: IoV would take about essential alterations to our collective lifestyle, management of
urban congestion, logistics and transport and urban traffic.
 Crash Response: Linked and interconnected vehicles could by default send instant message to
emergency teams about an accident along with location of the vehicle. Therefore, by developing
emergency alarming or response this could save a number of human lives.
 Convenience Services: The facility a car accessed to remotely make likely conveniences i.e. door
unlocks by remote and recovery of stolen automobiles. Linked vehicle technique could provide
conveyance organizations through better, parking data, transit and real-time traffic and, building that more
simple to cope the transport systems for decrease rush-hour traffic and jamming.

Volume IX, Issue IX, September/2020 Page No:247


Alochana Chakra Journal ISSN NO:2231-3990

 Infotainment: Interlinked vehicle would give online, options of in-vehicle entertainment that offer
delivering information and music through the dashboard.

2. LITERATURE REVIEW

Internet of Vehicles (IoV) has various security and safety necessities which should be delivered earlier
that capture a huge marketplace of end-user. The elucidations which fulfil the safety necessities should be
made to uphold privacy and security of end-users. Table 1 offers an abstract of certain of the safety and
security necessities that IoV should fulfil.
TABLE 1: IoV security requirements

Security requirements Description

Data authentication At the time of data transmission, the identities of vehicles should
be verified
Data integrity Sent and received data at the both end node should be checked to
ensure that the data is reached correctly
Data confidentiality The privacy of data should not be compromised if it is shared
among multiple vehicles participating in IoV.
Access control Vehicles must only access those existing services that they are
entitled to use
Data nonrepudiation The IoV need to certify that a vehicle cannot deny the authenticity
of another vehicle
Availability The IoV need to ensure the smooth transmission of data among
vehicles in diverse conditions
Anti-jamming To define the proper mechanisms that can stop nasty vehicles from
sending intrusive messages that interrupt the communication
between vehicles

In Internet of Vehicle, the automobile linked or unlinked as per these come outside or inside range of the
coverage, thus, this is more susceptible to vulnerable of security that could outcome performance
degradation. In this part on the field of Internet of Vehicle, we have gone through many papers of the
research on the topic of technical challenges come across and security aspects.
In the paper [6], Raya et al. anticipated a context for automobiles connectivity to create trust of
data-centric, and assessed the impact of 4 rules of data fusion: weighted voting, majority voting,
techniques based on belief propagation and Bayesian inference. However, in the paper [7], Huang et al.
first revealed that cascading of information and more specimen unfavourably effect the output in VANETs
of trust administration system, and further recommended a unique polling system which contemplates the
space amid the teller and user while handover a load to the level of the trust of the data. In the paper [8],
Zaidi et al. projected and assessed a system scoundrel bulge recognition for VANETs utilizing techniques
of statistical to decide whether the obtained material is not true. In Ref. [9], Radak et al. implemented a
careful machinist to handle received data through various resources to identify unsafe happenings on the

Volume IX, Issue IX, September/2020 Page No:248


Alochana Chakra Journal ISSN NO:2231-3990

roadways. This assumed vigilant machinist is an addition of the theory of Demper-Shafer which is
prevalent to be greater in data originating managing from reliant sources.
Sicari et al. [ 10] offered challenges of the research and the solutions promised concentrated on
various factors and mechanism of security consisting of access control, authentication, privacy,
confidentiality. The most recent published the survey by Yang et al. [11] amalgamating key features of
earlier analyses and offer the categorization of IoT occurrences. All these offered maximum facets of IoT,
open issues threats, security research, and advise several clues for further research. However, few of them
uncovered and intensely examined the main reason of these threats and challenges and obviously
recognize what fresh challenges may come from the side of IoT. Even though Yang et al. and Trappe et al.
[12] talked over several significant restrictions of IoT system, these people just emphasis on the
complications due to limited capacity of battery and power of computing. There are lots of IoT limitations
and structures have not been concealed might have adverse impact on privacy and security.
In Ref. [13], Gazdar et al. anticipated an active and disseminated model of reliance to sanctify a
conviction rapport amid automobiles and screen out spiteful and self-centred automobiles. Their model of
trust is centred on the utilization of Markov chain to assess the trust value development. In Ref. [14],
instead of permitting all automobiles to evaluate the faithfulness, Khan et al. anticipated a new malevolent
bulge recognition procedure for VANETs which enhances the collection of evaluators to make better the
performance of total network. In Ref. [15], Haddadou et al. offered a disseminated model of conviction for
VANETs which was striving by the model of occupation market indicating. The model of trust of those is
capable to step by step identify total malevolent bulges as well as enhancing the selfish nodes of mutual
assistance. In the paper [16], to overwhelmed the complications of sporadic and ad hoc examination,
initiated by the great movement and quick topology alteration in networks of vehicles, they recommended
a detection framework of insubstantial intrusion with the collecting procedure, where bulges are gathered
in extremely constant collections such that the observing and evaluation procedures could be conducted
with the extra effect in a comparatively constant atmosphere.
Privacy distribution [17] is a mechanism of privacy that not only express the whole information
simply but essential pounded fact dissemination. It defends specific owners of data and is severely more
powerful than privacy differential. Nevertheless, it is according to the computational incompetent and
functions over huge categories of questions identified as Vapnik-Chervonenkis (VC) dimension, is
regarded learning theory of measurement. Whereas differential privacy [18,19,20,21] is recommended as
confidentiality fact dissemination whatever could be learned, if a particular owner of data is incorporated.
To obtain the guarantee of privacy, differential privacy commands that privately a sub linear digit of
inquiries have used the database. This sound proportionate to the universal understanding of the
calculating enquiry is additional. (data owners’ number of independent).

Volume IX, Issue IX, September/2020 Page No:249


Alochana Chakra Journal ISSN NO:2231-3990

Zero-knowledge privacy [ 22] of cryptographically prejudiced confidentiality is more powerful than


privacy of differential. Differential privacy is more powerful than Crowd-blending privacy [ 23] though,
with a step of pre-sampling, it satisfies both privacy of zero-knowledge and privacy of differential. Such
mechanism does not enhance noise linear in the number of owners of data and rely on sampling of
aggressive, which adversely affect the estimations of accuracy. The policies based on comeback [24,25,26,
27
] fulfils the mechanism of privacy of differential and privacy of zero-knowledge more powerful
apparatuses as well. Nevertheless, the correctness of the unsystematic retort apparatus rapidly reduces if
the coin toss standards are arranged to high values (e.g., greater than 80%).
Harri et al. [28] present a context and offer instruction for the generation of models of vehicular
mobility. In lots of the studies VANET comprises a small scale and similar linkages system with its
applicability emphasis on safety and efficiency of traffic. Al-Sultan et al. [29] offer all the issues facing it
an inclusive reporting of survey, such as, and VANET characteristics, access technologies of wireless,
requirements and challenges.

To defend map-reading counter to denial-of-service outbreaks Zhou L. et. al., offered a


disseminated, service of asynchronous chief-management [30]. The authors offered a disseminated chief
system of management somewhere the reserved service which is vital trusted is distributed to n servers.
With the secretive key to generate a signature, k out of the n servers at least needs to associate their
awareness. Desmedt Y proposed a verge cryptography technique [31], an (n, k) threshold cryptography
scheme which allows n parties to share the ability to perform a cryptographic operation (e.g. creating a
digital signature). Whichever k parties could do the action together, whereas it is not feasible for a minor
digit of parties than k. In case as a maximum k-l servers could be negotiated suddenly, a wrong sign might
not be generated. Smith et al. calculated susceptibilities and delivered countermeasures for routing
protocols of distance-vector [32]. By utilizing the information of predecessor, they accomplished to do it
and definite in the class of path-finding of proposals of distance-vector. The similar technique could be
assumed to securing network of mobile ad hoc (MANET) protocols of distance-vector. Consequently,
messages routing and user data must be secured, and different ways for communications must all the time
be utilized.
In [33], the R. Scandariato et. al., studied an articulated modeling of diverse outbreaks for
considerate and evaluating their effects on IoV. To discover the various systems’ weakness of security,
Microsoft’s STRIDE is commonly used a widespread technique of threat modelling. In [34],graph-based
approaches and mathematical modelling approaches are developed by S. Cheung et. al., these are two key
techniques for defining the attacks of modelling network. For attack modeling the dynamic and static
techniques of graph-based are well known. In Ref [ 35,36,37], in the prone parts of network attack the
relations were defined in consequence the public who utilize them may appropriately create the model
easy and clear to centre on the behavior’s attack. The T. M. Chen in [38] recommended approaches of Petri

Volume IX, Issue IX, September/2020 Page No:250


Alochana Chakra Journal ISSN NO:2231-3990

net modelling, i.e. used in modelling the attacks of network in huge physical infrastructures of cyber, like
smart networks, such method which is more flexible. Modelling approach of Mathematical for the attacks
in Control of Supervisory and Acquisition of Data is utilized for Internet of Vehicle, such as smart grids
and power networks, in its place models of graph-based.

3. CONCLUSION

The IoV is a particular use of IoT. It became a vital stage of dissemination of information amid vehicles,
road-side infrastructures and humans as well. It has fascinated a lot of attention among academician and
researchers. Due to security challenges, it has become a national and global concern. With passing time,
IoV will become important part of human being which assist to make intelligent transportation systems
without traffic lights, road accidents, and other related problems. It will provide millions of people more
convenient, comfortable, and safe traffic service.

REFERENCES

1
J. Kang et al., “Privacy-preserved pseudonym scheme for fog computing supported Internet of vehicles,” IEEE Transactions
on Intelligent Transportation Systems, vol. PP, no. 99, 2017, pp.1-11.
2
J. Cheng et al., “Routing in Internet of vehicles: a review,” IEEE Transactions on Intelligent Transportation Systems, vol. 16,
no. 5, October 2015, pp. 2339-2352.
3
J. Huang, “Research on Internet of vehicles and its application in intelligent transportation,” Applied Mechanics and Materials,
vols. 321-324, 2013, pp. 2818-2821.
4
J. Contreras-Castillo, S. Zeadally, and J. Guerrero-Ibañez, “Internet of vehicles: architecture, protocols, and security,” IEEE
Internet of Things Journal, vol. PP, no. 99, 2017, pp. 1-9.
5
W. Wu, Z. Yang, and K. Li, “Internet of vehicles and applications,” in R. Buyya and A. V. Dastjerdi (eds.), Internet of Things:
Principles and Paradigms. Cambridge, MA: Morgan Kaufmann, 2016 chapter 16, pp. 299- 317.
6
M. Raya, P. Papadimitratos, V. D. Gligor, et al. On data-centric trust establishment in ephemeral Ad hoc networks [C]//IEEE
Infocom the Conference on Computer Communications, 2008: 1238-1246.
7
Z. Huang, S. Ruj, M. A. Cavenaghi, et al. A social network approach to trust management in VANETs [J]. Peer-to-peer
networking and applications, 2014, 7(3): 229-242.
8
K. Zaidi, M. B. Milojevic, V. Rakocevic, et al. Hostbased intrusion detection for VANETs: a statistical approach to rogue node
detection [J]. IEEE transactions on vehicular technology, 2014, 65(8): 6703-6714.
9
J. Radak, B. Ducourthial, V. Cherfaoui, et al. Detecting road events using distributed data fusion: experimental evaluation for
the icy roads case [J]. IEEE transactions on intelligent transportation systems, 2016, 17(1): 184- 194.
10
Sicari, S., et al. "Security, privacy and trust in Internet of Things: The road ahead." Computer Networks the International
Journal of Computer & Telecommunications Networking 76.C (2015):146-164.
11
Yang, Yuchen, et al. "A Survey on Security and Privacy Issues in Internet-of-Things." IEEE Internet of Things Journal 4.5,
pp. 1250-1258, 2017.
12
W. Trappe, R. Howard, and R. S. Moore, “Low-energy security: Limits and opportunities in the Internet of Things,” IEEE
Security Privacy, vol. 13, no. 1, pp. 14–21, Jan./Feb. 2015
13
T. Gazdar, A. Rachedi, A. Benslimane, et al. A distributed advanced analytical trust model for VANETs [C]//IEEE Global
Communications Conference (GLOBECOM) 2012: 201-206.
14
U. Khan, S. Agrawal, S. Silakari. Detection of Malicious Nodes (DMN) in vehicular Ad hoc networks [J]. Procedia computer
science, 2015, 46: 965-972.
15
N. Haddadou, A. Rachedi, Y. Ghamri-Doudane. A job market signaling scheme for incentive and trust management in
vehicular Ad hoc networks [J]. IEEE transactions on vehicular technology, 2015, 64(8): 3657-3674.
16
H. Sedjelmaci, S. M. Senouci. An accurate and efficient collaborative intrusion detection framework to secure vehicular
networks [J]. Computers and electrical engineering, 2015, 43: 33-47.

Volume IX, Issue IX, September/2020 Page No:251


Alochana Chakra Journal ISSN NO:2231-3990

17
A. Blum, K. Ligett, and A. Roth, “A learning theory approach to noninteractive database privacy,” J. ACM, vol. 60, no. 2, pp.
12:1–12:25, 2013.
18
C. Dwork, “Differential privacy,” in Automata, Languages and Programming, 33rd International Colloquium, ICALP 2006,
Venice, Italy, July 10-14, 2006, Proceedings, Part II, ser. Lecture Notes in Computer Science, M. Bugliesi, B. Preneel, V.
Sassone, and I. Wegener, Eds., vol. 4052. Springer, 2006, pp. 1–12.
19
C. Dwork, F. McSherry, K. Nissim, and A. Smith, “Calibrating noise to sensitivity in private data analysis,” in TCC, 2006.
20
C. Dwork, K. Kenthapadi, F. McSherry, I. Mironov, and M. Naor, “Our data, ourselves: Privacy via distributed noise
generation,” in EUROCRYPT, 2006.
21
C. Dwork and A. Roth, “The algorithmic foundations of differential privacy,” Foundations and Trends in Theoretical
Computer Science, vol. 9, no. 3-4, pp. 211–407, 2014.
22
J. Gehrke, E. Lui, and R. Pass, “Towards privacy for social networks: A zero-knowledge based definition of privacy,” in
Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011.
Proceedings, ser. Lecture Notes in Computer Science, Y. Ishai, Ed., vol. 6597. Springer, 2011, pp. 432–449.
23
J. Gehrke, M. Hay, E. Lui, and R. Pass, “Crowd-blending privacy,” in Advances in Cryptology - CRYPTO 2012 - 32nd
Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings, ser. Lecture Notes in Computer
Science, R. Safavi-Naini and R. Canetti, Eds., vol. 7417. Springer, 2012, pp. 479–496.
24
S. L. Warner, “Randomized response: A survey technique for eliminating evasive answer bias,” Journal of the American
Statistical Association, vol. 60, no. 309, pp. 63–69, 1965.
25
J. A. Fox and P. E. Tracy, Randomized response: a method for sensitive surveys. Beverly Hills California Sage Publications,
1986.
26
B. G. Greenberg, A.-L. A. Abul-Ela, W. R. Simmons, and D. G. Horvitz, “The unrelated question randomized response
model: Theoretical framework,” Journal of the American Statistical Association, vol. 64, no. 326, pp. 520–539, 1969.
27
A. C. Tamhane, “Randomized response techniques for multiple sensitive attributes,” Journal of the American Statistical
Association, vol. 76, no. 376, pp. 916–923, 1981.
28
S. Al-Sultan, M. M. Al-Doori, A. H. Al-Bayatti, and H. Zedan, “A comprehensive survey on vehicular ad hoc network,” J.
Netw. Comput. Appl., vol. 37, pp. 360–392, Jan. 2014.
29
J. Harri, F. Filali, and C. Bonnet, “Mobility models for vehicular ad hoc networks: A survey and taxonomy,” IEEE Commun.
Surveys Tuts., vol. 11, no. 4, pp. 19–41, 4th Quart. 2009.
30
Zhou L, Haas Z. Securing ad hoc networks. IEEE Network 1999; 13(6):24–30.
31
Desmedt Y. Threshold cryptosystems. European Transactions on Telecommunication 1994; 5(4):307–315.
32
Smith BR, Murthy S, Garcia-Luna-Aceves JJ. Securing distance-vector routing protocols. Proceedings of the Symposium on
Network and Distributed System Security, San Diego, CA, U.S.A., 1997; 85–92.
33
R. Scandariato, K. Wuyts, and W. Joosen, “A descriptive study of microsofts threat modeling technique,” Requirements
Engineering, vol. 20, no. 2, pp. 163–180, 2014.
34
S. Cheung, U. Lindqvist, and M. W. Fong, “Modeling multistep cyber attacks for scenario recognition,” in DARPA
information survivability conference and exposition, 2003. Proceedings, vol. 1. IEEE, 2003, pp. 284–292.
35
J. Wu, L. Yin, and Y. Guo, “Cyber attacks prediction model based on bayesian network,” in Parallel and Distributed Systems
(ICPADS), 2012 IEEE 18th International Conference on. IEEE, 2012, pp. 730–731.
36
K. Ingols, M. Chu, R. Lippmann, S. Webster, and S. Boyer, “Modeling modern network attacks and countermeasures using
attack graphs,” in Computer Security Applications Conference, 2009. ACSAC’09. Annual. IEEE, 2009, pp. 117–126.
37
S. A. Camtepe and B. Yener, “Modeling and detection of complex attacks,” in Security and Privacy in Communications
Networks and the Workshops, 2007. SecureComm 2007. Third International Conference on. IEEE, 2007, pp. 234–243.
38
T. M. Chen, J. C. Sanchez-Aarnoutse, and J. Buford, “Petri net modeling of cyber-physical attacks on smart grid,” Smart
Grid, IEEE Transactions on, vol. 2, no. 4, pp. 741–749, 2011.

Volume IX, Issue IX, September/2020 Page No:252

You might also like