Data encryption and fragmentation in autonomous vehicles using raspberry Pi 3

Sahand Murad, Stavros Shiaeles, Asiya Khan, Giovani Masala

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Autonomous vehicles have huge potential in improving road safety and congestion. Towards the road map of full autonomy, each vehicle will be able to communicate with other vehicles within the network of vehicles to improve congestion and notify emergencies. Many architectures for communication between vehicles are centralised, typically using cloud servers. The security and trust of that communication is paramount. Therefore, the aim of this paper is to propose a novel method for encrypting and fragmenting data in various cloud providers in order to protect the anonymity and increase the uncertainty for an attacker having access to the data on cloud. Our experimental results seem promising and we were able to achieve good results with low overhead in transmission.

Original languageEnglish
Title of host publication2019 IEEE World Congress on Services (SERVICES)
EditorsCarl K. Chang, Peter Chen, Michael Goul, Katsunori Oyama, Stephan Reiff-Marganiec, Yanchun Sun, Shangguang Wang, Zhongjie Wang
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages212-216
Number of pages5
ISBN (Electronic)9781728138510
ISBN (Print)9781728138527
DOIs
Publication statusPublished - 29 Aug 2019
Event2019 IEEE World Congress on Services - Milan, Italy
Duration: 8 Jul 201913 Jul 2019

Publication series

NameIEEE SERVICES Proceedings Series
PublisherIEEE
ISSN (Print)2378-3818
ISSN (Electronic)2642-939X

Conference

Conference2019 IEEE World Congress on Services
Abbreviated titleSERVICES 2019
Country/TerritoryItaly
CityMilan
Period8/07/1913/07/19

Keywords

  • Autonomous vehicles
  • Component; data fragmentation
  • Encryption

Fingerprint

Dive into the research topics of 'Data encryption and fragmentation in autonomous vehicles using raspberry Pi 3'. Together they form a unique fingerprint.

Cite this