have recently revealed a research paper titled âIOTA Feasibility and Perspectives for Enabling Vehicular Applicationsâ
on the 29th
August, which discusses the likelihood of using IOTA Tangle as a fundamental feature to improve privacy in Vehicular applications.
The authors of the paper, Paulo C. Bartolomeu, Joaquim Ferreira and Emanuel Vieira, discuss the automobile industry and its history. In recent years, the industry has gone through big changes from what it was originally. There have recently been companies and industries which have begun to integrate the âmuch-talked about conceptâ
IoT (Internet of Things) where all things big and small are referred to as âsmart thingsâ, all connected through the internet.
The idea of IoT has been importantly adopted by the automobile industry in recent history. This adoption has brought the thought of autonomous vehicles into mind. This means that cars will be able to drive themselves without the need for a driver. This transition has been very notable.
The paper went on to say:
âVehicles became autonomous and (wireless) communications have evolved to provide connectivity with quality of service and flexibility tailored to enable such application."
âThe future of transport and mobility will surely be enabled by autonomous vehicles encompassing sensing capabilities that can cooperate with each other and share their sensing resources and perspective with nearby6 infrastructure and neighbouring vehicles.â
The authorsâ have expressed their opinion, believing that many challenges remain ahead in terms of vital aspects such as security, privacy, anonymity and security. The authors go into explain the hacking of vehicular systems which have occurred in the past.
âIn 2015, Charlie Miller and Chris Valasek have demonstrated that they could take control over the internet of a Jeep Cherokeeâs entertainment system by meddling with the dashboard functions, steering, brakes and transmission, all from a laptop that could be anywhere in the world.â
The authorsâ go onto discuss the emerging technology
which can serve a new security solution while still complementing the current ones.
âOver the last few years the blockchain technology has managed to attract immense attention due to its intrinsic properties such as trust-less operation, immutability, transparency, easy verification, cryptographic security, auditability and independence of third parties."