Abstract
The concept of interconnecting smart vehicles and advancements in automotive automation leads to beneficial outcomes, such as a reduction in road fatalities and congestion. However, including a chain of automation in the attack surface will expand the attack surface and expose the security of automobiles to malicious infiltration. The proposed methodology provides access to specific users while restricting the third party requests. Moreover, it also makes use of data exchange that takes place between the roadside units and vehicle to track the vehicle status without compromising the in-vehicle network. To ensure a valid and authentic communication, vehicles with a proper and verifiable record will only be allowed to exchange messages in the blockchain network. Using qualitative arguments, we have identified that the proposed work is resilient to identified attacks. Similarly, quantitative experimentation indicates that this methodology shows a storage size compatibility and suitable response time in realistic scenarios. Simulation results indicate that, the proposed work shows positive results to secure vehicular networks, vehicular forensics and trust management.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: Journal of Artificial Intelligence and Capsule Networks
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.