Abstract

Internet of Vehicles (IoV) is an area of research and development that has rapidly developed in the VANETs (Vehicular Ad-hoc Networks) that provides a mode of smart communication between vehicle to vehicle and cloud using IoT (Internet of Things). Two-way communication between Internet-enabled automobiles and network equipment is fully supported by IoV providing faster and more reliable solutions. Moving computation to the network's periphery can speed up service delivery and drop the latency. Computing designs that are centralized (cloud computing) and decentralized (Edge computing) face the challenges of high latency, infrastructure cost, and performance deterioration. While using Cloud Computing (CC) the impact is on other areas including the transportation sector resulting in the development of the Internet of Vehicles with Cloud Computing (IoV-CC). VANET is considered to be the fastest wireless communication, In terms of quick handoffs, network availability, security, safety with the deployment of advanced applications, etc., VANET will have more advanced features and will undergo a radical change as it progresses in its development path. VANET and Cloud Computing will play a major role in providing highly efficient technology for autonomous driving, vehicle control, and intelligent systems in near future. CC is a centralized computing paradigm but is not able to address many QoS (Quality of Service) parameters like latency, throughput, and bandwidth optimization. To resolve the limitations of CC, Fog Computing (FC) is introduced in VANETs. The IoV-CC must address concerns regarding security and privacy. As a result, the security protocols used in traditional VANET and CC have had to be updated for IoV-CC and a new secure algorithm needs to be developed to have secure communication between FOG and cloud nodes. To innovate QoS in VANET for IoV-CC there is a significant absence of data dissemination and security difficulties. The purpose of this research is to explore IoV's data distribution and security acceptability with respect to centralized and decentralized computing. Further, it addresses the associated efforts and their consequences, as well as future possibilities for dealing with these difficulties, in the subsequent section.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call