Aviso: para depositar documentos, por favor, inicia sesión e identifícate con tu cuenta de correo institucional de la UCM con el botón MI CUENTA UCM. No emplees la opción AUTENTICACIÓN CON CONTRASEÑA Disculpen las molestias.
 

Security in Vehicles With IoT by Prioritization Rules, Vehicle Certificates, and Trust Management

dc.contributor.authorSendra, Sandra
dc.contributor.authorLacuesta, Raquel
dc.contributor.authorLloret, Jaime
dc.contributor.authorGarcía-Magariño García, Iván
dc.date.accessioned2024-12-17T11:52:29Z
dc.date.available2024-12-17T11:52:29Z
dc.date.issued2019-08-01
dc.description.abstractThe Internet of Vehicles (IoV) provides new opportunities for the coordination of vehicles for enhancing safety and transportation performance. Vehicles can be coordinated for avoiding collisions by communicating their positions when near to each other, in which the information flow is indexed by their geographical positions or the ones in road maps. Vehicles can also be coordinated to ameliorate traffic jams by sharing their locations and destinations. Vehicles can apply optimization algorithms to reduce the overuse of certain streets without excessively enlarging the paths. In this way, traveling time can be reduced. However, IoV also brings security challenges, such as keeping safe from virtual hijacking. In particular, vehicles should detect and isolate the hijacked vehicles ignoring their communications. The current work presents a technique for enhancing security by applying certain prioritization rules, using digital certificates, and applying trust and reputation policies for detecting hijacked vehicles. We tested the proposed approach with a novel agent-based simulator about security in Internet of Things (IoT) for vehicle-to-vehicle communications. The experiments focused on the scenario of avoidance of collisions with hijacked vehicles misinforming other vehicles. The results showed that the current approach increased the average speed of vehicles with a 64.2% when these are giving way to other vehicles in a crossing by means of IoT.
dc.description.departmentDepto. de Ingeniería de Software e Inteligencia Artificial (ISIA)
dc.description.facultyFac. de Informática
dc.description.refereedTRUE
dc.description.sponsorshipFoundation Ibercaja
dc.description.statuspub
dc.identifier.citationGarcía-Magariño, I., Sendra, S., Lacuesta, R. & Lloret, J. (2019). Security in vehicles with IoT by prioritization rules, vehicle certificates and trust management. IEEE Internet of Things Journal, 6 (4), 5927-5934
dc.identifier.doi10.1109/JIOT.2018.2871255
dc.identifier.officialurlhttps://doi.org/10.1109/JIOT.2018.2871255
dc.identifier.urihttps://hdl.handle.net/20.500.14352/112753
dc.issue.number4
dc.journal.titleIEEE Internet of Things Journal
dc.language.isoeng
dc.page.final5934
dc.page.initial5927
dc.publisherIEEE
dc.relation.projectIDConstrucción de un framework para agilizar el desarrollo de aplicaciones m\'oviles en el ámbito de la salud (JIUZ-2017-TEC-03)
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 Internationalen
dc.rights.accessRightsopen access
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/
dc.subject.keywordAgent-based simulation (ABS)
dc.subject.keywordCoordination
dc.subject.keywordIntelligent transportation
dc.subject.keywordReputation
dc.subject.keywordSecurity
dc.subject.keywordTrust
dc.subject.ucmInformática (Informática)
dc.subject.unesco3304 Tecnología de Los Ordenadores
dc.titleSecurity in Vehicles With IoT by Prioritization Rules, Vehicle Certificates, and Trust Management
dc.typejournal article
dc.type.hasVersionAM
dc.volume.number6
dspace.entity.typePublication
relation.isAuthorOfPublication8bd0e2f4-8424-4632-9460-07a25b52b64d
relation.isAuthorOfPublication.latestForDiscovery8bd0e2f4-8424-4632-9460-07a25b52b64d

Download

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
securityIoTVehiclesAccepted.pdf
Size:
520.3 KB
Format:
Adobe Portable Document Format

Collections