Federated Learning Based Intelligent Systems to Handle Issues and Challenges in IoVs (Part 1)

Author(s): Umang Kant* and Prachi Dahiya

DOI: 10.2174/9789815313024124030006

Federated Learning in Secure and Reliable Systems for IoVs

Pp: 105-145 (41)

Buy Chapters
  • * (Excluding Mailing and Handling)

Federated Learning Based Intelligent Systems to Handle Issues and Challenges in IoVs (Part 1)

Federated Learning in Secure and Reliable Systems for IoVs

Author(s): Umang Kant* and Prachi Dahiya

Pp: 105-145 (41)

DOI: 10.2174/9789815313024124030006

* (Excluding Mailing and Handling)

Abstract

The Internet of Vehicles (IoV) is an emerging technology that allows vehicles to communicate with each other and with the infrastructure around them. This technology has the potential to revolutionize the transportation industry, but it also raises concerns about the security of the data that is shared among vehicles, with their base stations and infrastructure.

In this context, secure data-sharing methodologies are essential to protect sensitive information, such as location, driving patterns, data of the people travelling in the vehicle, and protection of shared data from malicious factors. This chapter explores some of the methods that can be used for secure data sharing in the IoV. One approach is to use encryption and decryption techniques to protect data in transit and at rest. This method involves encoding the data in a way that only authorized parties can access it, and decoding it when it reaches its destination. Another approach is to use blockchain technology, which provides a decentralized and immutable ledger that can be used to store and verify data. Additionally, access control mechanisms, such as role-based access control, can be used to limit the access of different users to specific data sets. This method ensures that only authorized parties can access sensitive data.

In conclusion, secure data-sharing methodologies are crucial for the successful implementation of the IoV. Encryption and decryption, blockchain technology, and access control mechanisms are some of the methods that can be used to protect sensitive information and maintain the privacy and security of the data.


Keywords: Blockchain, Heterogeneity, Internet of things, Machine learning, Scalability.

Related Journals

Related Books