| IEEE Access | |
| Establishing an Intelligent Transportation System With a Network Security Mechanism in an Internet of Vehicle Environment | |
| Hsin-Te Wu1  Gwo-Jiun Horng2  | |
| [1] Department of Computer Science and Information Engineering, National Penghu University of Science and Technology, Magong, Taiwan;Department of Computer Science and Information Engineering, Southern Taiwan University of Science and Technology, Tainan, Taiwan; | |
| 关键词: Internet of Vehicle; intelligent transportation system; network security; IEEE 1609/WAVE; IEEE 802.11P; | |
| DOI : 10.1109/ACCESS.2017.2752420 | |
| 来源: DOAJ | |
【 摘 要 】
The Internet of Vehicle (IoV) utilizes networks to conduct message exchange and related services or application. In recent years, smart cities and IoVs have become areas of interest in the new generation Internet of Things development, especially since the development of intelligent transportation system has focused on bettering traffic conditions. This paper proposes establishing an intelligent transportation system with a network security mechanism in an IoV environment, with emphasis on the following aspects: 1) this paper integrates intelligent transportation systems in traffic signal control to aid emergency vehicles in more promptly arriving at its destination; 2) in the case of traffic incidents, this paper's approach allows regular vehicles to obtain proof of incident from pertaining authorities and learn about nearby vehicles global positioning system information, such as position and speed, and utilize their car camcorder data for proving purposes; and 3) this paper combines roadside units (RSUs) with traffic signal control and transmits important information to the certificate authority (CA) for storage. Given that RSUs are limited in computation ability and storage space, we can assess and filter the information before sending it to the CA, reducing RSUs computational burden and storage space usage. This paper satisfies IoVs network security requirements of authentication, non-repudiation, conditional anonymity, and conditional untraceability, and, as seen from experiment results, the proposed method is superior to that of other studies.
【 授权许可】
Unknown