2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks – Supplemental Volume (DSN-S) 2019
DOI: 10.1109/dsn-s.2019.00010
|View full text |Cite
|
Sign up to set email alerts
|

Privacy and Security of Connected Vehicles in Intelligent Transportation System

Abstract: The paper considers data security and privacy issues in intelligent transportation systems which involve data streams coming out from individual vehicles to road side units. In this environment, there are issues in regards to the scalability of key management and computation limitations at the edge of the network. To address these issues, we suggest the formation of groups in the vehicular layer, where a group leader is assigned to communicate with group members and the road side unit. We propose a lightweight… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
4
1

Relationship

2
7

Authors

Journals

citations
Cited by 43 publications
(13 citation statements)
references
References 3 publications
0
11
0
Order By: Relevance
“…In the past, the only option to collect data was to rely solely on central authorities, putting individuals at risk, as the proper control of personal data did not belong to them [13]. However, the traditional security and data-protection methods used in smart cars were ineffective [13,[24][25][26][27]. New methods were subsequently proposed; for example, current smart car architectures rely on centralized brokered communication models, in which all vehicles are identified, authenticated, authorized, and connected via central cloud servers.…”
Section: Privacymentioning
confidence: 99%
“…In the past, the only option to collect data was to rely solely on central authorities, putting individuals at risk, as the proper control of personal data did not belong to them [13]. However, the traditional security and data-protection methods used in smart cars were ineffective [13,[24][25][26][27]. New methods were subsequently proposed; for example, current smart car architectures rely on centralized brokered communication models, in which all vehicles are identified, authenticated, authorized, and connected via central cloud servers.…”
Section: Privacymentioning
confidence: 99%
“…Hence, the applications may be compromised, shut down, and fail to deliver what is programmed to do and also carry out authenticated services in inappropriate way. Application layer is responsible for data sharing, which can cause the problem of access control, privacy of data, and leakage of information 23,48 . Software vulnerabilities, spear‐phishing attack, malicious code attacks, inability to receive security patches, hacking into the smart meter/grid are some of the common threats in the application layer 38 …”
Section: Security Issues In Layered Iot Architecturementioning
confidence: 99%
“…In [33], data security and privacy issues in intelligent transportation systems have been studied. In this paper, it has been assumed that data streams are coming out of vehicles and go to road side units.…”
Section: Related Workmentioning
confidence: 99%