2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC) 2018
DOI: 10.1109/icsccc.2018.8703272
|View full text |Cite
|
Sign up to set email alerts
|

Security challenges in Internet of Vehicles (IoV) environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 36 publications
(13 citation statements)
references
References 7 publications
0
13
0
Order By: Relevance
“…The following security aspects are considered and summarized as shown in Figure 2. The following important security aspects 64‐66 are considered and much needed to protect an EV dynamic charging system: Confidentiality: Collecting vital information from users who are transferring data between vehicles, or between vehicles and infrastructures. While certain data in the EV dynamic charging system must be made public, the data protection of EVs or dynamic charging stations is the most essential paradigm.…”
Section: Security Requirements In Ev Dynamic Charging Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…The following security aspects are considered and summarized as shown in Figure 2. The following important security aspects 64‐66 are considered and much needed to protect an EV dynamic charging system: Confidentiality: Collecting vital information from users who are transferring data between vehicles, or between vehicles and infrastructures. While certain data in the EV dynamic charging system must be made public, the data protection of EVs or dynamic charging stations is the most essential paradigm.…”
Section: Security Requirements In Ev Dynamic Charging Systemmentioning
confidence: 99%
“…The following security aspects are considered and summarized as shown in Figure 2. The following important security aspects [64][65][66] are considered and much needed to protect an EV dynamic charging system:…”
Section: Security Requirements In Ev Dynamic Charging Systemmentioning
confidence: 99%
“…Table 2, Table 3, Table 4, and Table 5 gather characteristics and possible security issues surveyed from the most recent literature of VANETs [104], IoVs [105], cloud [106]- [109], and fog computing [110]- [114].…”
Section: Security Issuesmentioning
confidence: 99%
“…There could be different types of attackers like active, passive, malicious, rational, local or outsider. Ultimately, each attacker who get a chance to involve in the network affects the legibility of the network [10], [13], [14]. In the following some of the potential attacks and threats are discussed that are possible in the IoV environment.…”
Section: Security Threats and Attacks In Iov Environmentmentioning
confidence: 99%