Smart Transportation System : An Investigation of the Security Techniques Towards Protecting Users’ Privacy
Linked Agent
Ali, Hayat , Thesis advisor
El-medany, Wael, Thesis advisor
Language
English
Extent
[1], 17, 97, [1], 1 pages
Subject
Place of institution
Sakhir, Bahrain
Thesis Type
Thesis (Master)
Institution
University of Bahrain ,College of Information Technology
English Abstract
Abstract :
Nowadays Internet of Thing (IoT) technology has accessed all aspects of our life. One of the IoT applications is the smart transportation or Intelligent Transportation System (ITS). Currently, ITS is an emerging technology within smart cities that is the concern of many researchers worldwide. ITS helped in many areas such as road congestion, accidents, and pollution issues using many technologies such as Wi-Fi networks, camera and GPS and Location Based Service (LBS). Due to the accessible network, ITS might be exposed to different type of security and privacy issues such as eavesdropping and data alteration which might affect the privacy of the vehicle users’ security and privacy.
In the field of privacy and security of ITS including the challenges and solutions for LBS specifically for ITS, few researches exist. Therefore, this research aims to investigate the
security and privacy issues and its techniques in ITS toward reaching into the best security techniques. Toward this aim, the simulation was employed through which some pre-determined parameters were stated and Quartus Prime Lite Edition program and Xilinx 14.7 were utilized using VHDL language.
The result on IoT and ITS showed that the most used algorithms for protecting data in IoT and ITS are AES, DES, TDES and RC5 algorithm and the experiment validate their role by simulating each one of them. However, through simulation the results revealed that AES and RC5 could be considered among the best techniques for protecting data where RC5 has less design complexity in comparison with AES. The DES and TDES have less complexity in their design in compare to AES and RC5 and they have less delay time which is a good factor for ITS, however the studies showed that the AES and RC5 are the most used techniques in IoT because of their security strength. Therefore, this study recommended RC5 as one best technique that could be used for ITS. The contribution of this research resides on guiding the designers for ITS on the best techniques for protecting privacy of the users that could be added to the few researches in the field.
Member of
Identifier
https://digitalrepository.uob.edu.bh/id/506c98ac-53b7-4885-8d96-27c842d73305
https://digitalrepository.uob.edu.bh/id/506c98ac-53b7-4885-8d96-27c842d73305
Same Subject