A Crowd-Based Intelligence Approach for Measurable Security, Privacy, and Dependability in Internet of Automated Vehicles with Vehicular Fog
Journal article, Peer reviewed
Published version
Permanent lenke
https://hdl.handle.net/10642/6567Utgivelsesdato
2018-03-01Metadata
Vis full innførselSamlinger
Originalversjon
Rauniyar A, Hagos DH, Shrestha M. A Crowd-Based Intelligence Approach for Measurable Security, Privacy, and Dependability in Internet of Automated Vehicles with Vehicular Fog. International Journal of Mobile Information Systems. 2018;2018:1-14 http://dx.doi.org/10.1155/2018/7905960Sammendrag
With the advent of Internet of things (IoT) and cloud computing technologies, we are in the era of automation, device-to-device (D2D) and machine-to-machine (M2M) communications. Automated vehicles have recently gained a huge attention worldwide, and it has created a new wave of revolution in automobile industries. However, in order to fully establish automated vehicles and their connectivity to the surroundings, security, privacy, and dependability always remain a crucial issue. One cannot deny the fact that such automatic vehicles are highly vulnerable to different kinds of security attacks. Also, today’s such systems are built from generic components. Prior analysis of different attack trends and vulnerabilities enables us to deploy security solutions effectively. Moreover, scientific research has shown that a “group” can perform better than individuals in making decisions and predictions. Therefore, this paper deals with the measurable security, privacy, and dependability of automated vehicles through the crowd-based intelligence approach that is inspired from swarm intelligence. We have studied three use case scenarios of automated vehicles and systems with vehicular fog and have analyzed the security, privacy, and dependability metrics of such systems. Our systematic approaches to measuring efficient system configuration, security, privacy, and dependability of automated vehicles are essential for getting the overall picture of the system such as design patterns, best practices for configuration of system, metrics, and measurements.
Utgiver
Hindawi Publishing CorporationSerie
International Journal of Mobile Information Systems;Volume 2018Tidsskrift
International Journal of Mobile Information Systems
Med mindre annet er angitt, så er denne innførselen lisensiert som Copyright © 2018 Ashish Rauniyar et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.