Auto-CIoV: Autonomous Connected Internet of Vehicles Security Requirements, Open Challenges with Future Research Directions

Muhammad Adil, Houbing Song, Ahmed Farouk, Zhanpeng Jin*

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

1 Citation (Scopus)

Abstract

Autonomous Connected Internet of Vehicles (Auto-CloV) technology had demonstrated remarkable results in the near past. Due to its unprecedented contributions, both the public and government authorities have shown interest in this emerging technology by keeping in view its low cost, least accident rate, and on-demand controllability. Although this technology has numerous advantages over traditional transportation systems, at the same time, it has some disadvantages in the context of wireless communication and dynamic connectivity. Because these factors expose them to several internal and external security threats, which can disrupt the legitimate operation of connected vehicles in the network. Therefore, in this article, we aimed to discuss the current security challenges of Auto-CloV technology by taking into consideration the existing literature. Furthermore, we provided an overview of the interoperability, resource allocation, and communication of Auto-CloV to set a synchronized preprint for the open security challenges with future research insights. Finally, we want to acknowledge that this is a complete package for the researchers and the transportation industry stakeholders working on the security aspects of this newborn technology to ensure the robust authentication of vehicles followed by the confidentiality, availability, and integrity of data in future Auto-CloV networks.

Original languageEnglish
Pages (from-to)238-246
Number of pages9
JournalIEEE Network
Volume37
Issue number4
DOIs
Publication statusPublished - 1 Jul 2023
Externally publishedYes

Fingerprint

Dive into the research topics of 'Auto-CIoV: Autonomous Connected Internet of Vehicles Security Requirements, Open Challenges with Future Research Directions'. Together they form a unique fingerprint.

Cite this