Mostrar el registro sencillo del ítem
dc.contributor.author | García-Magariño, Iván | es_ES |
dc.contributor.author | Sendra, Sandra | es_ES |
dc.contributor.author | Lacuesta, Raquel | es_ES |
dc.contributor.author | Lloret, Jaime | es_ES |
dc.date.accessioned | 2020-12-17T04:33:34Z | |
dc.date.available | 2020-12-17T04:33:34Z | |
dc.date.issued | 2019-08 | es_ES |
dc.identifier.uri | http://hdl.handle.net/10251/157299 | |
dc.description.abstract | [EN] The Internet of Vehicles (IoV) provides new opportunities for the coordination of vehicles for enhancing safety and transportation performance. Vehicles can be coordinated for avoiding collisions by communicating their positions when near to each other, in which the information flow is indexed by their geographical positions or the ones in road maps. Vehicles can also be coordinated to ameliorate traffic jams by sharing their locations and destinations. Vehicles can apply optimization algorithms to reduce the overuse of certain streets without excessively enlarging the paths. In this way, traveling time can be reduced. However, IoV also brings security challenges, such as keeping safe from virtual hijacking. In particular, vehicles should detect and isolate the hijacked vehicles ignoring their communications. The current work presents a technique for enhancing security by applying certain prioritization rules, using digital certificates, and applying trust and reputation policies for detecting hijacked vehicles. We tested the proposed approach with a novel agent-based simulator about security in Internet of Things (IoT) for vehicle-to-vehicle communications. The experiments focused on the scenario of avoidance of collisions with hijacked vehicles misinforming other vehicles. The results showed that the current approach increased the average speed of vehicles with a 64.2% when these are giving way to other vehicles in a crossing by means of IoT. | es_ES |
dc.description.sponsorship | This work was supported by Harvard University (stay funded by T49_17R), University of Zaragoza (JIUZ-2017-TEC-03), Foundation Bancaria Ibercaja, Foundation CAI (IT1/18), University Foundation Antonio Gargallo (call 2017), and "Ministerio de Economia y Competitividad" in the "Programa Estatal de Fomento de la Investigacion Cientifica y Tecnica de Excelencia, Subprograma Estatal de Generacion de Conocimiento" (TIN2017-84802-C2-1-P). | es_ES |
dc.language | Inglés | es_ES |
dc.publisher | Institute of Electrical and Electronics Engineers | es_ES |
dc.relation.ispartof | IEEE Internet of Things | es_ES |
dc.rights | Reserva de todos los derechos | es_ES |
dc.subject | Agent-based simulation (ABS) | es_ES |
dc.subject | Coordination | es_ES |
dc.subject | Intelligent transportation | es_ES |
dc.subject | Reputation | es_ES |
dc.subject | Security | es_ES |
dc.subject | Trust | es_ES |
dc.subject.classification | INGENIERIA TELEMATICA | es_ES |
dc.title | Security in Vehicles With IoT by Prioritization Rules, Vehicle Certificates, and Trust Management | es_ES |
dc.type | Artículo | es_ES |
dc.identifier.doi | 10.1109/JIOT.2018.2871255 | es_ES |
dc.relation.projectID | info:eu-repo/grantAgreement/UNIZAR//JIUZ-2017-TEC-03/ | es_ES |
dc.relation.projectID | info:eu-repo/grantAgreement/CAI//IT1%2F18/ | es_ES |
dc.relation.projectID | info:eu-repo/grantAgreement/Harvard University//T49_17R/ | es_ES |
dc.relation.projectID | info:eu-repo/grantAgreement/AEI/Plan Estatal de Investigación Científica y Técnica y de Innovación 2013-2016/TIN2017-84802-C2-1-P/ES/RED COGNITIVA DEFINIDA POR SOFTWARE PARA OPTIMIZAR Y SECURIZAR TRAFICO DE INTERNET DE LAS COSAS CON INFORMACION CRITICA/ | es_ES |
dc.rights.accessRights | Abierto | es_ES |
dc.contributor.affiliation | Universitat Politècnica de València. Departamento de Comunicaciones - Departament de Comunicacions | es_ES |
dc.description.bibliographicCitation | García-Magariño, I.; Sendra, S.; Lacuesta, R.; Lloret, J. (2019). Security in Vehicles With IoT by Prioritization Rules, Vehicle Certificates, and Trust Management. IEEE Internet of Things. 6(4):5927-5934. https://doi.org/10.1109/JIOT.2018.2871255 | es_ES |
dc.description.accrualMethod | S | es_ES |
dc.relation.publisherversion | https://doi.org/10.1109/JIOT.2018.2871255 | es_ES |
dc.description.upvformatpinicio | 5927 | es_ES |
dc.description.upvformatpfin | 5934 | es_ES |
dc.type.version | info:eu-repo/semantics/publishedVersion | es_ES |
dc.description.volume | 6 | es_ES |
dc.description.issue | 4 | es_ES |
dc.identifier.eissn | 2327-4662 | es_ES |
dc.relation.pasarela | S\411331 | es_ES |
dc.contributor.funder | Harvard University | es_ES |
dc.contributor.funder | Universidad de Zaragoza | es_ES |
dc.contributor.funder | Fundación Bancaria Ibercaja | es_ES |
dc.contributor.funder | Agencia Estatal de Investigación | es_ES |
dc.contributor.funder | Fundación Universitaria Antonio Gargallo | es_ES |
dc.contributor.funder | Caja de Ahorros de la Inmaculada de Aragón | es_ES |