User:Als741

= Internet of Vehicles (IoV) = In IoV, vehicles with various sensors are the primary nodes that connect to other resources. A complex, heterogeneous network of sensors, actuators, computing, routing and personal or roadside devices to communicate with other Wireless Sensor Networks (WSN), IoV is a dynamic mobile communication system which communicates between vehicles and public networks using vehicle-to-vehicle (V2V), vehicle-to-road (V2R), vehicle-to-human (V2H), and vehicle-to-sensor(V2S) interactions to improve safety on road, traffic management, and provide convenience to drivers by gathering and sharing information on vehicles, roads, drivers and their surroundings and effectively guiding vehicles based on the data.

History
A terminology sometimes used synonymously with the Connected Car, Internet of Vehicles (IoV) is an emerging paradigm of Internet of Things (IoT) and was the result of the collection and integration of different types of information available in the newer vehicles that were manufactured over the last decade with components to monitor different conditions (i.e. driver monitoring, tire pressure, oil pressure, vehicle speed, acceleration and global positioning). Not to be confused with VANET which turns vehicles on the road into moving wireless access points, IoV expands on this concept to turn every vehicle into a smart node on the highway, with its own computing, storage and networking capability gathering and sharing information among vehicles, roads and their surroundings, the system can effectively guide vehicles, and provide mobile Internet application services.

Uses
Many public transportation companies already utilize IoV to check routes bus drivers use to provide practical information such as the expected arrival time of buses to a particular stop. The long-term goal of IoV is a system of interconnected cars that will eventually drive autonomously as well as self-park by using data from the roads and other cars on the road (i.e. Apple’s Carplay and Google’s Android Auto) --otherwise known as Intelligent Connected Vehicles (ICV).

Combined with the concept of cloud computing for driving status, traffic data analysis, and vehicle dynamic data recording (i.e. map and weather data), high-precision location service and integrated intelligent transportation systems are now possible to enhance traffic efficiency, avoid accidents, ensure road safety, and improve driving experiences by using new IoT technologies.

Challenges
A heterogeneous network of dynamic topological structures of huge network scale and non-uniform distribution of nodes, coupled with mobile limitations and lack of secure protocols and mechanisms, IoV systems are more vulnerable to various types of computer and network attacks, such as authentication and identification attacks, availability attacks, confidentiality attacks, routing attacks, data authenticity attacks, etc.

Sybil attack
A malicious device or node appears in the wireless system with multiple illegal identities. Because IoVis dynamic, the vehicles always access in IoV temporarily and unstably, which makes it easy for Sybil nodes to find chance to attack.

GPS deception
GPS deception can provide a node with fake information about its location, speed, and some other GPS information that is subsequently accepted by IoV applications about safety or financial issues without being tracked. Because GPS information plays an important role in many applications such as navigation tools and payment applications, any inaccurate information could cause fake evidence and unpredictable property damage.

Masquerading attack
Masquerading attacks can threaten chaos by allowing more than one node in such circumstance to have identical Identities. Subsequently, the IoV systems would not work properly and would not know what to do next.

Wormhole attack
Two or more malicious nodes hide within the network and entice legitimate nodes to route across them to absorb dataflow and compromise the network. This kind of attack always has fatal influences on IoV system due to its characteristics of change and high dependence on efficient routing algorithm.

Routing / Availability Attacks
Denial of Service (DoS) and channel interference leverages IoV's limitations of bandwidth and transmission power. Most components of IoV are exposed to attackers due to deficient protection mechanisms and protocols, and thus, are vulnerable to interference, control, information leakage and outage.

Eavesdropping
Due to the openness of wireless links, routing nodes can easily be eavesdropped without being detected because this type of attack has no disruption for original data.

Denial of Service (DoS)
Malicious nodes send large number of repeating requests or invalid data to other nodes and make them too busy to provide normal services properly.

Masquerading
Malicious nodes obstruct routing processes and obtain vital information by masquerading as a legitimate node, introducing threats to the network and attackers can hide their identity with the help of impersonated objects.

Route modification
IoV's limitations of bandwidth, transmission power, and mobility allows malicious nodes (once in the network) to easily modify routing information or change the number of hops in forwarding routing request packets to disrupt normal routing process, resulting in incorrect or non-delivery of data.

Secrecy Attacks
Sensitive resources and data are compromised by eavesdropping or intercepting either the vehicle or a road side unit (RSU), resulting in leakage of users’ privacy.

Replay attack
Conducted by illegitimate nodes, a large amount of message replays suck up precious bandwidth, resulting in dropping of priority messages from the queue and decreased efficiency of the system due to constant replaying and deleting.

Camouflage attack
A malicious node hides itself under a false identity and utilizes this appearance from a legitimately authenticated node, and spreads fake and harmful messages, or executes blackhole attacks, or other fatal attacks.

Fabricating and tampering
Fake messages and false information are disseminated by attackers to masquerade and hide evidence of other kinds of vehicle attacks. Routine message distribution nodes will also be broken and vehicles will be prevented from joining in the traffic normally or bring false reaction of traffic emergencies.

Illusion attack
Malicious sensors that are placed in the network to generate false or meaningless information in the network to leverage the current weak authentication IoV mechanisms.