A Review of Intelligent Transportation Systems in Existing Framework using IoT

A Review of Intelligent Transportation Systems in Existing Framework using IoT

  IJETT-book-cover           
  
© 2022 by IJETT Journal
Volume-70 Issue-6
Year of Publication : 2022
Authors : Sumit, Rajender Singh Chhillar
DOI : 10.14445/22315381/IJETT-V70I6P217

How to Cite?

Sumit, Rajender Singh Chhillar, "A Review of Intelligent Transportation Systems in Existing Framework using IoT," International Journal of Engineering Trends and Technology, vol. 70, no. 6, pp. 137-143, 2022. Crossref, https://doi.org/10.14445/22315381/IJETT-V70I6P217

Abstract
The Internet of Things (IoT) has become one of the most interesting information technology fields in the modern world. A wide scope is available for researcher in it. It is the backbone of a real-world environment where different communicable devices are interconnected through networking protocols. Bluetooth, zegbee, Wireless Fidelity (wi-fi), Message Queuing Telemetry Transport (MQTT), Constrained Application Protocol (CoAP) & Data Distribution Services (DDS) are some different IoT protocols & data protocols. In simple words, Iot is a means of establishing a connection between computer to computer or other electronic devices worldwide through servers and some dedicated routers. IoT is used in many fields like smart cities, Health monitoring by wearable gazettes, Smart grids, smart retail, smart farming, intelligent transportation system, and so on. The modern-day world has a huge number of problems when using vehicles. Using IoT technology, anyone can easily fetch the data from the vehicles, forward it to the correct servers & conveniently solve traffic problems. IoT is playing a crucial role in managing the traffic of smart cities. Moreover, such wireless communication increases the vulnerability of ITS networks to security threats. Additionally, discuss future options to optimize the security-to-cost ratio for ITS applications.

Keywords
IoT, WSN, RFID, Protocols, Smart devices, Artificial Intelligence.

Reference
[1] Lan Liu, P. wang, Jun lin, L. Liu, Intrusion Detection of imbalanced Network Traffic Based on Machine Learning and Deep Learning, (2021).
[2] Abadi, T. Rajabioun, and P. A. Ioannou, Networks with Limited Traffic Data, 16(2) (2015) 653–662.
[3] D. González, J. Pérez, V. Milanés, and F. Nashashibi, A Review of Motion Planning Techniques for Automated Vehicles, 17(4)(2016) 1135–1145.
[4] Mr. Nilesh R. Mate Intelligent transportation systems a literature review from indian perspective, 2018
[5] Y. U. Devi, Issues- A Review, (2016) 1864–1867.
[6] C. J. College, D. Salane, C. J. College, C. J. College, J. Holst, and C. J. College, Muath Obaidat, (2020) 14–17.
[7] S. Paiva, M. Abdul, A. Sherin, Z. Gautami, T. Aqeel, and K. Imran, Privacy and security challenges in smart and sustainable mobility, S.N. Appl. Sci., (2020). doi: 10.1007/s42452-020-2984-9.
[8] S. Parkinson, P. Ward, K. Wilson, and J. Miller, Cyber Threats Facing Autonomous and Connected Vehicles : Future Challenges, 18(11) (2017) 2898–2915.
[9] S. Ahmed, K. Dey, and R. Fries, Evaluation of Transportation System Resilience in the Presence of Connected and Automated Vehicles, (2019). doi: 10.1177/0361198119848702.
[10] Mehrdad Hajizadeh, Trung V. Phan, Thomas Bauschert Probability Analysis of Successful Cyber Attacks in SDN-Based Networking IEEE 2018
[11] L. Zhu, F. R. Yu, Y. Wang, B. Ning, and T. Tang, Big Data Analytics in Intelligent Transportation Systems : A Survey, 20(1)(2019) 383–398.
[12] K. B. Kelarestaghi, M. Foruhandeh, and K. Heaslip, 19-04888 VEHICLE SECURITY : RISK ASSESSMENT IN TRANSPORTATION TRB Ref .: Ms . No . 19-04888 Transportation Research Board 98th Annual Meeting Vehicle Security : Risk Assessment in Transportation, (2019).
[13] N. Security and E. Tool, CANsec : A Practical in-Vehicle Controller Area, (2020).
[14] K. N. Qureshi and S. Din, Internet of Vehicles : Key Technologies , Network Model , Solutions and Challenges, (2020) 1–10.
[15] Z. Lu, G. Qu, S. Member, and Z. Liu, A Survey on Recent Advances in Vehicular Network Security , Trust , and Privacy, 20(2) (2019) 760–776.
[16] J. Harvey and S. Kumar, A Survey of Intelligent Transportation Systems Security : Challenges and Solutions, (2020) 263–268. doi:10.1109/BigDataSecurity-HPSC-IDS49724.2020.00055.
[17] G. Krummenacher, C. S. Ong, S. Koller, S. Kobayashi, J. M. Buhmann, and S. Member, Wheel Defect Detection with Machine Learning, 19(4) (2018) 1176–1187.
[18] E. Arnold, O. Y. Al-jarrah, M. Dianati, S. Fallah, D. Oxtoby, and A. Mouzakitis, A Survey on 3D Object Detection Methods for Autonomous Driving Applications, 20(10) (2019) 3782–3795.
[19] A. Mukhtar, L. Xia, and T. B. Tang, Vehicle Detection Techniques for Collision Avoidance Systems : A Review, 16(5) (2015) 2318–2338.
[20] Nawal Alsaffar, Wael Almedany and Hayat Ali Application of RC5 for IoT devices in Smart Transportation System 2019 8th ICMSAP.
[21] Ashwani B Bale, S.S. Manikandan Supervised Machine learning classification Algorithmic Approach for finding Anomaly Type of Intrusion Detection in wireless Sensor Network, (2020).
[22] Sum alee, A, WaiH, Smarter and more connected: future intelligent transportation system. IATSS Res, 42 (2018) 67–71. https://doi.org/10.1016/j.iatssr.2018.05.005
[23] Sil R, Roy A, Artificial intelligence and machine learning based legal application: the state-of-the-art and future research trends. Int Conf Comput Commun Intell Syst, (2019) 57–62.
[24] H. Uddin, IoT for 5G/B5G applications in smart homes, smart cities, wearables and connected cars, & in Proc. IEEE 24th Int. Workshop Comput. Aided Model. Design Commun. Links Network. (CAMAD), Limassol-Cyprus, (2019) 1-5