Skip to main content

A Cross-Domain Security Model Based on Internet of Vehicles

  • Chapter
  • First Online:
Intelligent Mobile Service Computing

Part of the book series: EAI/Springer Innovations in Communication and Computing ((EAISICC))

  • 362 Accesses

Abstract

With the continuous expansion of application scopes of Internet of Vehicles, attacks also increase correspondingly. There have been too many attack accidents in IoV. Now the intelligent vehicles have become important targets of a hacker. Based on it, we look forward to constructing a cross-domain security model of IoV. Firstly we introduce the security domain and analyze its divisions. Secondly we study the structure of cross-domain of IoV. Finally we divide the security domain into three layers which are cross-domain application layer, cross-domain network layer, and cross-domain perception layer. Also we study the trust relationship in IoV, and make use of the method of trust evaluation to ensure transactions security and construct a trustworthy environment for cross-domain. Our scheme can partly ensure security of communications and vehicles’ privacy. Next step we will build a test platform and provide test basis for the implementation of secure technical scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Security of Internet of Vehicles [EB/OL] (China Information and Communication Research Institute, 2017)

    Google Scholar 

  2. C. Shen, Research on Communication Security and Privacy Protection in Internet of Vehicles [D] (Beijing Jiaotong University, 2018)

    Google Scholar 

  3. C. Xu, Internet of vehicles information security threats and protection strategies [J]. Inf. Commun. 07, 191–192 (2018)

    Google Scholar 

  4. R. Liu, Research on Information Security and Privacy Protection Mechanism of Vehicle Network [D] (University of Electronic Science and Technology of China, 2018)

    Google Scholar 

  5. Y. Jiang, Quantitative Evaluated Model Based Security Domain between Network Security Strength and Network Delay [D] (Hunan University of Technology, 2016)

    Google Scholar 

  6. W. Du, J. Deng, Y.S. Han, et al., A pairwise key pre-distribution scheme for wireless sensor networks [J]. J. ACM Trans. Inf. Syst. Secur. 8(2), 228–258 (2005)

    Article  Google Scholar 

  7. X. Wang, Research on Model of Creditability-Based Data Fusion for Internet of Vehicles [D] (Chang’ an University, 2014)

    Google Scholar 

  8. Z. Yang, Research on Security Mechanism and Key Technologies in Vehicular Networks [D] (Beijing University of Posts and Telecommunications, 2019)

    Google Scholar 

  9. L. Bu, Research on Safety Architecture of Expressway Internet of Vehicles System [D] (Tianjin University, 2012)

    Google Scholar 

  10. N. Chen, Design and analysis of internet of vehicles safety protection system [J]. Comput. Dev. Appl. 27(10), 32–34+37 (2014)

    Google Scholar 

  11. C. Wu. Research on Key Technologies of Vehicle Internal Network Security for Internet of Vehicles [D] (Southeast University, 2018)

    Google Scholar 

  12. X.L. Liu, Research on OBU-based Multilevel Security Architecture and Communication Scheme for Internet of Vehicles [D] (Jiangsu University, 2018)

    Google Scholar 

  13. Z. Zhang, Study on Grid Multidimensional Trust Model Based on Fuzzy Comprehensive Evaluation [D] (Qufu Normal University, 2014)

    Google Scholar 

Download references

Acknowledgments

This project is completed under the support of the construct program of the applied characteristic discipline of Hunan University of Science and Engineering.

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Ou, W., Wei, M., Yi, Q., Xiang, L. (2021). A Cross-Domain Security Model Based on Internet of Vehicles. In: Gao, H., Yin, Y. (eds) Intelligent Mobile Service Computing. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-50184-6_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-50184-6_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-50183-9

  • Online ISBN: 978-3-030-50184-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics