Special Issues

Security and Privacy in Cognitive Internet of Vehicle

Submission Deadline: 31 December 2023 (closed) View: 137

Guest Editors

Dr. Maha Driss, Prince Sultan University, Saudi Arabia.
Dr. Wadii Boulila, Prince Sultan University, Saudi Arabia.
Dr. Jawad Ahmad, Edinburgh Napier University, UK.

Summary

The Internet of Vehicles (IoV) is developing as a new emergent paradigm, thanks to the rapid proliferation of wireless and mobile communication technologies, as well as recent improvements in cloud computing services. The IoV is regarded as a major societal application for providing prompt and effective transmission of information such as vehicle speed, position, and route information to ensure smart driving, prevent road accidents, increase traffic efficiency, reduce fuel consumption, and deliver location-based services. The growth of machine-enabled cognition via Machine Learning (ML), Artificial Intelligence (AI), and associated technologies has accelerated the technical evolution of transportation systems one step further, resulting in a new framework called the Cognitive Internet of Vehicles (C-IoV). When compared to its predecessor, the redefined cognitive technology in C-IoV guarantees significant enhancements and optimized network capacities, enabling technical and decision-making support to ensure error-free driving, timely emergency response, and advanced driving assistance. However, cybersecurity and privacy issues represent the most significant barriers to the future acceptance and development of C-IoV-based transportation systems. Indeed, if there are network breaches in C-IoV, the vehicles may be controlled by malevolent hackers, resulting in traffic accidents. Besides, because collected sensitive data is processed and analyzed utilizing cloud services, this will lead to the leakage of data privacy.

 

This special issue welcomes high-quality research contributions in the topic of Cognitive Internet of Vehicles security and privacy from both academia and industry. Experimental results or literature reviews on security and privacy challenges and solutions in the Cognitive Internet of Vehicles are encouraged to be submitted. 



Keywords

• Evaluation of security and privacy vulnerabilities and threats in C-IoV ecosystems
• Novel attacks and related countermeasures
• Novel privacy-preserving solutions in C-IoV ecosystems
• Lightweight security models for the C-IoV
• Efficient encryption methods and algorithms for securing C-IoV ecosystems
• Machine learning algorithms for securing C-IoV ecosystems
• Deep learning algorithms for securing C-IoV ecosystems
• Reinforcement learning-based intelligent applications in C-IoV
• Federated learning-based intelligent applications in C-IoV
• Big data analytics for cybersecurity in C-IoV
• Intrusion Detection Systems for anomaly/malware detection and classification in C-IoV
• Blockchain-based security solutions for C-IoV ecosystems
• Securing 5G and 6G-based communication in C-IoV ecosystems
• Enhancing access control with improved authentication techniques in C-IoV ecosystems
• Security and privacy in C-IoV-based cloud/fog/edge computing applications
• Optimized low power cybersecurity and privacy preservation techniques
• for effective C-IoV-based applications
• Current cybersecurity practices and future perspectives for sustainable C-IoV systems

Published Papers


  • Open Access

    ARTICLE

    Blockchain-Based Message Authentication Scheme for Internet of Vehicles in an Edge Computing Environment

    Qiping Zou, Zhong Ruan, Huaning Song
    Computer Systems Science and Engineering, Vol.48, No.5, pp. 1301-1328, 2024, DOI:10.32604/csse.2024.051796
    (This article belongs to the Special Issue: Security and Privacy in Cognitive Internet of Vehicle)
    Abstract As an important application of intelligent transportation system, Internet of Vehicles (IoV) provides great convenience for users. Users can obtain real-time traffic conditions through the IoV’s services, plan users' travel routes, and improve travel efficiency. However, in the IoV system, there are always malicious vehicle nodes publishing false information. Therefore, it is essential to ensure the legitimacy of the source. In addition, during the peak period of vehicle travel, the vehicle releases a large number of messages, and IoV authentication efficiency is prone to performance bottlenecks. Most existing authentication schemes have the problem of low… More >

Share Link