Author:
Tang Yujian,Chen Ya,Jung Hoekyung
Abstract
With the advancement of information and communication technology, vehicles role in people's lives is not just for transportation but also equipment for the carrier of mobile communication. The new direction is provided by the Internet for the automobiles development and upgrading. Internet of Vehicles (IoVs) includes smart vehicles, Autonomous Vehicles (AVs) as well as roadside units (RSUs) that communicate for providing the enhanced transportation services such as high traffic efficiency and reduced congestion and accidents. In the hazardous chemical logistics sector, the integration of Internet of Vehicles (IoVs) introduces significant security, privacy, and trust challenges. Vulnerabilities to cyberattacks, such as hacking and data manipulation, threaten the integrity of sensitive information regarding hazardous cargo, while concerns about location privacy and data minimization arise due to the tracking of vehicle movements. Ensuring authentication, authorization, and compliance with regulatory standards is essential for building trust within the IoV ecosystem, as any compromise in supply chain integrity could lead to safety hazards or legal liabilities. Robust encryption algorithms like AES and RSA play a crucial role in securing data transmission, but proper implementation and key management practices are necessary to prevent cryptographic weaknesses. Addressing these issues comprehensively is vital for safeguarding the transportation of hazardous chemicals and ensuring the safety of both the environment and the public. IoVs, suffer from security, privacy and trust issues. In order to solve the problem of hazardous chemical logistics of encryption algorithm, the author proposed a research on the information security of the Internet of Vehicles. Firstly, the information characteristics of dangerous chemicals vehicles are analyzed, then analyze the Data Encryption Standard (DES) algorithm. Advanced Encryption Standard (AES) algorithm is analyzed in the symmetric cryptosystem and then RSA algorithm is analyzed in the public key cryptosystem. Finally, the performance of the algorithm and the characteristics of vehicle information are comprehensively analyzed. The security of Internet of Vehicle's data transmission is efficiently improved by the proposed method.
Publisher
Scalable Computing: Practice and Experience