logo

Implementation of IOT in Smart Transportation

   

Added on  2023-06-07

6 Pages4624 Words210 Views

Abstract—The purpose of the report is to discuss the
implication of IOT in the smart transportation and what are
the challenges for the implementations. The topic chosen for
the report is IOT in smart transportation. In order to
construct the report will follow a set format. The report first
introduces the problem domain in the introduction section to
form an overview of the report. The report then discusses
about the present and current issues in the domain for
implementing IOT in the smart transportation. The past and
current technologies used to solve those issues has also been
discussed as well in the literature review section. Based on the
literature review the most appropriate technology is figured
out. The most appropriate technology has been chosen with
proper justification which is supported with diagram and
table. The report also contain the annotated bibliography
which considers five quality articles including journals and
book from different sources such as google scholar , research
gate and other reputed resources. The report along with the
limitations and future research scope presents
recommendations for improving the way IOT is applied in
smart transportation with better security and reliability
I. INTRODUCTION
The report will consider the problem domain of security
and authenticity in IOT. The task of securing the IOT
devices is often considered as the key issues is
implementing IOT in practical applications. Hence proper
mechanism and technology is needed for ensuring that the
devices are authenticated to the network and data that is
communicated through the network is secured properly.
However while formulating the mechanism and the
technology, it is important to consider the constraints of the
IOT environment such as processing power , device
memory and the power consumption of the devices so that
the technology works properly.
II.LITERATURE REVIEW
According to Farooq et al. (2017) one of the important
aspect of the IOT connected smart transportation is the
need for authentication. In the IOT environment millions of
devices are connected in the network. Hence it becomes
important to have some mechanism for the device
authentication. The authors here proposed for the RFID tag
for the authentication. RFID tag works on the radio
frequency wave. The RFID tag stores the information in the
embedded chip and when the tag is activated with the radio
frequency wave, it then sends the information. The
information is collected and interpreted with the radio
frequency reader. It is possible to track the device on which
the RFID tag is attached. The authors claims that it is one
of the efficient technology available to track devices in the
IOT network.

Dorri et al. (2017) also suggested the RFID tag for the
device authentication. The authors makes it clear that in the
IOT environment one of the primary need is to have some
reliable and efficient techniques that helps to properly
authenticate the devices. The authentication is particularly
important as without authentication it is not possible to
control the cars properly and if the control is not proper it
will create issue in the transportation. Hence for effective
execution of the smart transportation system with the IOT it
is important to have proper authentication technique and
RFID tag is one of the efficient techniques in this purpose
according to the authors.
Zhang et al. (2016) argues that although the barcode
technique is very popular in the traditional system, but it is
not effective in the IOT context. In order to barcode
technique to work the device have to be in the line of sight
of the barcode reader means that physical access is needed
which is not possible for the cars that is connected in the
IOT network. The one and only feasible solution is to have
some reliable technique that helps to track and identify
devices wirelessly. RFID technology is currently one of the
popular technique that is currently available in the industry.
The authors have also suggested for the same.
Although Fradrich et al. (2016) have admitted that the
authentication is important for successful implementation
of IOT in the smart transportation, it is not the only aspect
of the implementation strategy. Organization should look
beyond the authentication as there are other issues too for
the integration of IOT in the transportation. Even before
authentication mechanism is implemented it is important to
make sure that privacy of the users are maintained in the
IOT environment. The author has suggested although the
use of the cloud computing for data storage is an efficient
technique considering the vast amount of data, what even
more important is the privacy of these data. In order to
ensure that the data that is stored in the cloud storage
remotely is secured it is suggested to opt for the private
cloud as it offers more control and security over the public
cloud.
Tappler et al. (2015) has also suggested for the use of the
private cloud for better data security.
Li et al. (2015) in the article have taken more detailed
approach like how to increase data security for the IOT
devices while opting for the private cloud. according to the
author in order to make sure that the private cloud is
actually secure , the VLAN has to be secured first as the
communication of the data have to be done through this
VLAN. In order to protect the data the authors have here
actually suggested for the use of the firewall along with the
virtual server. It will make sure that the access to the data is
restricted to the users that are not authorized for accessing
the data in the server.
Implementation of IOT in Smart Transportation
Implementation of IOT in Smart Transportation_1
In the IOT environment, it is required that the
communication in the network is fast, secure and reliable.
The IOT, when implemented in the transportation, it should
be take into account that any delay in communication
might often lead to miscommunication and the aspect of
proper communication is not necessary, it is mandatory for
proper execution of the process. Huang et al. (2015) have
suggested for the IPv6 protocol. This is the latest version of
the internet protocol and IOT use the internet protocol for
the communication over internet. The feature that makes
IPv6 appropriate for the secure communication along with
speed is the level of encryption used for the
communication. This version of the internet protocol uses
supports 2128 address mode and hence it is difficult to
temper with the data that is communicated through the
network.
According to Tayeb, Latifi and Kim (2015) as a lot of
devices are connected in the IOT network, it is likely that
the devices will overlap with each other and this should be
avoided to ensure the privacy. Hence it is important to
categorize devices in the group. Additionally a group
authentication key must be assigned. The technique is
based on the “Shamir’s secret sharing scheme”. In the
group there is a primary device that is responsible to
monitor the activity of other devices in the group. Every
time a new device is included in the group, a new key pair
is formed which is then communicated to other devices that
are part of the group. This makes all the devices aware that
any new device is added in the. If any other devices that are
not part of the devices will not be able to join the group and
communicate. Hence it is effective technique to make sure
that the communication is secured and only restricted to the
devices that are part of the group.
Dobrescu et al. (2015) argues that in order to successfully
implement IOT in the transportation system, the legal
compliance is also important. In the IOT based smart
transportation system, cars as well as owners of the cars are
tracked continuously to inform them about traffic
information. However according to international data
security laws, it is mandatory to protect the security of the
data and every organization should provide necessary
means to secure this data. The authors have argued that if
the information like location of car, transportation path of
the car are significant in nature. It is possible to trace the
car through hacking this information. In order to protect the
digital data the author has proposed for the hash algorithm.
The algorithm is based on the digital cryptography. The
digital content is first hashed and an encryption key is
generated. This value is only made available to the users
who are authorized to access the information. Without
providing the encryption key it is not possible to read or
modify the content. Hence it provides an efficient method
for securing the digital information that is collected through
the network.
Al-Sarawi et al. (2014) have however suggested for
Constrained Application Protocol or CoAP for securing the
information. In the algorithm the system first verifies the
identity of the user. In order to verify the identity the user
need to provide the correct system credentials like
username and password for that was generated during the
registration. After the credentials are verified, the system
then only grants the access. Only after the system grants the
access, it is possible to access the server and access the data
stored in it. Hence it is an efficient technique for securing
the information and protecting the identity of the owner of
the data.
Li, C. T., Lee, C. C., Weng, C. Y., & Chen, C. M. (2018).
Towards secure authenticating of cache in the reader
for RFID-based IoT systems. Peer-to-Peer Networking
and Applications, 11(1), 198-208.
The authors have first discussed the concept of IOT in
effective manner. Although the discussion is not detailed,
but the discussion is simple and easy to follow. After the
introduction the author sets the discussion for the issues of
IOT in the various application with the majority of the
discussion focused on the issues of IOT in transportation.
The research method selected by the authors is the
comparison of literature review. The author have identified
the relevant literatures and analyzed the previous works of
the authors of those literatures. The authors have then
identified the most appropriate solution to the problem on
which the authors was working and that is the
authentication of device in the IOT environment. The
solution that has been proposed by the authors is the
application of RFID for tracking and authenticating the
devices in the network. This journal is basically focused on
the technique that is used for implementation of the internet
of thing. The basic concept of the entire terminology of
implementation of internet of things is provided in this
journal. The data that is present in the journal is very well
structured and the researchers find it easy to surf the
journal. This acts as one of the main reason behind the
prosecution of the journal and this is also one of the major
reason that ensures that the journal is very famous among
the researchers. The data that is present in the journal is
very precise in nature this is the reason that the journal
helps in time saving of the researchers.
Lopes, A.P.G. and Hilgert, L.D.O., 2017. Group
authentication protocols for Internet of Things (IoT)–
QoS and Security Properties Evaluation.
The authors have followed a very detailed approach while
discussing the concept of IOT. The authors have not opted
for any general discussion like what is meant by IOT and
what are the application of it. Instead from the starting of
the article the authors are very specific in terms of the
discussion, application of IOT in the smart transportation.
The authors have first discussed the various problems and
the importance for successful implementation of the IOT in
transportation system. However instead of discussing the
solution for each of the listed problem the sub sequent
sections are dedicated to the solution for the problem
domain that the authors have considered, the need and
technique for secure communication over the internet.
Implementation of IOT in Smart Transportation_2
The authors have proposed IPv6 internet protocol for the
communication while maintaining the speed and security.
The authors have reviewed several literature on this topic.
Along with that the authors have also verified the concept
through original work. Instead of collecting presented the
information based on the secondary research the authors
verified the speed and level of encryption on their own
through testing and prototyping. The result of the same
have been presented in the paper as well which makes it
easy to follow. This journal basically deals with the
processing of the implementation of the IPv6. Basic
concept of the data regarding the concept of IPv6 is stated
in this journal. The main processing of the Internet of tings
is stayed in this journal. Researchers find it easy for the
process of the internet of things. The need for the
implementation of internet of things in the platform of data
storage is also discussed in a very conceptual manner.
Another aspect of this journal is that the data that are
present in this journal is not at all in texted and this leads to
the fact that the data that are present in the journal cannot
be used for future purpose. This is the main reason that the
journal is not given much importance and the popularity of
the journal is very low.
Lee, Y. S., Alasaarela, E., & Lee, H. (2014, February).
Secure key management scheme based on ECC
algorithm in transportation system. In Information
Networking (ICOIN), 2014 International Conference on
(pp. 453-457). IEEE.
The authors have discussed about the application and the
security issue of implementing IOT in the transportation
system.
The authors have selected the area of data privacy and data
storage. The authors makes it clear that as the data that is
collected is huge in volume, it is not possible to store the
data in the traditional storage system. Hence cloud
computing or the cloud storage is the alternative option.
However organization should opt for the private cloud over
the public cloud for better security and control over the
data
The authors have opted for the secondary research methods
that is review of existing literature in the domain of data
security in IOT. This journal is basically dependent on the
comparison in between the earlier stage and the post stage.
This journal helps in understanding the advantages that the
people of smart city enjoys after the implementation of the
internet of things. This journal also helps in understanding
the disadvantages that are present in the society after the
implementation of the Internet of things
Hofheinz, D., & Jager, T. (2016). Tightly secure
signatures and public-key encryption. Designs, Codes
and Cryptography, 80(1), 29-61.
The author have discussed the security and application of
IOT for preparing the research paper.
The problem domain chosen for the topic is the security of
the digital content. The author here have proposed for
hashing technique for securing the data. The hashing
algorithm encrypt the data and in order to decrypt the data
the hashing value must be provided. Once the values match
it is then decrypted and it is then possible to read.
The author has here opted for the primary research.
Although relevant literatures were reviewed, the authors
have opted for simulation of the Hashing algorithm and the
result has been discussed in the paper too. This journal
deals with the problems that are present in the processing of
the implementation of the internet of things. After the
implementation of the internet of things the security issues
that are present is well commenced in this journal. This
also shows that the journal that is used is well constructed
and precise in nature and due to this preciseness of the
journal this journal gains very high importance.
Jan, S. R., Khan, F., Ullah, F., Azim, N., & Tahir, M.
(2016). Using CoAP Protocol for Resource Observation
in IoT. International Journal of Emerging Technology
in Computer Science & Electronics, ISSN, 0976-1353.
The authors in this article have discussed for legal issues of
implementing the IOT in the smart transportation system
The authors have discussed that in order to comply with the
legal issue it is important to secure the data that is collected
for controlling and monitoring the traffic through IOT and
provide the correct information to the user to help them
obtain proper information about the traffic and make
effective decision based on that.
In order to secure the information the author have
suggested Constrained Application Protocol or CoAP. It
makes it mandatory for the users to verify the authorization
to the system before accessing the data from the server.
The authors have chosen the secondary research method
that includes analysis and review of previous research
works. The techniques identified in the literatures have
been compared and based on that the authors have
suggested the appropriate method. This journal is termed as
an advanced level textual concept. The data that is present
in the journal generally deals with the processing of the
Constrained Application Protocol or CoAP. This definition
of the conceptual proposing of the data helps in gaining
conceptual knowledge regarding the platform of the
internet of things. The structuring of the data is not very
well performed. This leads to the fact that the time that is
taken to surf the data is very high. The data that are present
in this journal is very well in texted which makes this
journal usable among the researchers. This is the main
reason that this journal is gaining importance
ii) Requirements of the project:
After conducting the literature review the following
requirements have identified for the project
Proper review and the analysis of the authentication
problem in the IOT connected smart transportation
Review of the security issues in the smart transportation
Review and comparison of several algorithms proposed
by the previous works
Formulating effective algorithm for the authentication
Review of the effectiveness of the proposed algorithm
Implementation of IOT in Smart Transportation_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Lightweight Encryption Algorithm for Secure Communication in IoT
|1
|1217
|307

Wireless Networking: Comparative Analysis and Configuration
|10
|1409
|156

Research Development in Information Technology
|10
|2270
|469

Lightweight Encryption Algorithm for Secure IOT
|53
|14901
|228

Internet of Things: A Review of Literature and Security Issues
|8
|810
|321

Security Issues and Solutions Doc
|11
|2796
|100