Assignment 1 Cloud IoT Enterprise Security
Assignment 1 Cloud IoT Enterprise Security
Assignment – I
NAME : RAJASEKAR PV
BITS ID - 2023MT13122
Components of the system
1. In-vehicle network: The systems inside the vehicle, including sensors, controllers, and communication
modules.
2. Communication systems: Between vehicles (V2V), vehicle to infrastructure (V2I), and vehicle to
everything (V2X).
3. Backend services: Remote servers for data processing, updates, and system monitoring.
4. User interfaces: Applications or systems that interact with users or vehicle owners.
Objectives of the System
Vehicle-to-Vehicle (V2V):
Vehicles can directly communicate with each other, sharing information
about their speed, direction, and braking status. This can help prevent
accidents by allowing vehicles to react to potential hazards sooner.
Objectives of the System - Continued
Vehicle-to-Infrastructure (V2I):
Vehicles can communicate with infrastructure like traffic lights, road
signs, and traffic management systems. This can help optimize traffic
flow, improve safety, and reduce congestion
Benefits of V2X
Improved Road Safety: V2X can help prevent accidents by enabling vehicles to
Reduced Traffic Congestion: V2X can help optimize traffic flow by providing real-
Enhanced Driving Experience: V2X can provide drivers with valuable information
Reduced Environmental Impact: V2X can help reduce fuel consumption and
vehicles.
The sensing layer is responsible for capturing the inputs/parameters from the environment, the
actuators are responsible for steering and controlling the vehicle based on the sensing devices like
The data captured is sent to the gateway layer where the captured data is relayed to the
application layer.
The application layer is responsible for processing the data and provide various dimensions for the
various stake holders who are interested in the vehicle-to-vehicle communication etc.
There are cross cutting layers like monitoring/logging and security which is applicable across all the
layers i.e sensing, gateway and the application layer in the defined architecture.
Security considerations / Threat Landscape
The threat landscape for connected vehicle IoT systems is complex and constantly
Vehicle Takeover: Hackers could gain unauthorized control over critical vehicle
Data Theft: Sensitive personal information stored in the vehicle's systems, such as
Malicious Components: Malicious software or hardware components could be introduced during the
3. Network Attacks:
Man-in-the-Middle Attacks: Hackers could intercept communication between the vehicle and other systems to
Denial-of-Service (DoS) Attacks: Overloading the vehicle's network or cloud services to disrupt connectivity and
functionality.
4. Physical Attacks:
Tampering with Hardware: Physical access to the vehicle could allow attackers to tamper with hardware
Data Privacy: V2X systems collect and transmit vast amounts of sensitive data,
including vehicle location, speed, and driver behavior. Protecting this data from
unauthorized access and misuse is paramount.
proactively, we can pave the way for a safer, more efficient, and sustainable
transportation future.
Thank You