2022
DOI: 10.3390/s22186995
|View full text |Cite
|
Sign up to set email alerts
|

Toward Collaborative Intelligence in IoV Systems: Recent Advances and Open Issues

Abstract: Internet of Vehicles (IoV) technology has been attracting great interest from both academia and industry due to its huge potential impact on improving driving experiences and enabling better transportation systems. While a large number of interesting IoV applications are expected, it is more challenging to design an efficient IoV system compared with conventional Internet of Things (IoT) applications due to the mobility of vehicles and complex road conditions. We discuss existing studies about enabling collabo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 172 publications
0
4
0
Order By: Relevance
“…Information on the Sybil attack and the necessary protocol layer is provided in. 6 Improving wireless boundary and software in V2V communication mode can help mitigate or prevent this attack. 7 Sybil attacks in VANETs (Vehicular Ad-hoc Networks) differ significantly from those in conventional Ad-Hoc networks due to VANETs' high mobility, which allows for more effective creation of fake identities.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Information on the Sybil attack and the necessary protocol layer is provided in. 6 Improving wireless boundary and software in V2V communication mode can help mitigate or prevent this attack. 7 Sybil attacks in VANETs (Vehicular Ad-hoc Networks) differ significantly from those in conventional Ad-Hoc networks due to VANETs' high mobility, which allows for more effective creation of fake identities.…”
Section: Introductionmentioning
confidence: 99%
“…Cars can either generate new identities for other vehicles or take their individualities and use them to mislead other vehicles. Information on the Sybil attack and the necessary protocol layer is provided in 6 . Improving wireless boundary and software in V2V communication mode can help mitigate or prevent this attack 7 .…”
Section: Introductionmentioning
confidence: 99%
“…However, in the case of UAVs, autonomy is established more widely than in ground vehicles, such as cars. Building on advancements in communication technologies [6], hardware [7] and software, particularly artificial intelligence [8], the usage of (connected) vehicles is predicted to grow in consumer, civil, and military applications [9].…”
Section: Introductionmentioning
confidence: 99%
“…• Big data management: Effective management of big data poses a significant challenge within the context of FL-enabled IDSs in IoV. The sheer volume, velocity, and diversity of data generated by vehicles require robust storage, processing, and analysis capabilities [69]. The integration of FL-enabled IDSs necessitates the use of extensive data for training and model updates.…”
mentioning
confidence: 99%
“…This variability can potentially disrupt the FL environment, affecting the consistency and accuracy of the IDS models. Maintaining stability requires the implementation of robust systems to address fluctuations in participation rates, network disconnections, and intermittent data availability [69]. Future research aims to develop algorithms that can adapt dynamically to changes in the network, ensuring the stability of FL models, even when confronted with evolving IoV scenarios.…”
mentioning
confidence: 99%