IOTA have recently revealed a research paper titled “IOTA Feasibility and Perspectives for Enabling Vehicular Applications” on the 29th August, which discusses the likelihood of using IOTA Tangle as a fundamental feature to improve privacy in Vehicular applications.
The authors of the paper, Paulo C. Bartolomeu, Joaquim Ferreira and Emanuel Vieira, discuss the automobile industry and its history. In recent years, the industry has gone through big changes from what it was originally. There have recently been companies and industries which have begun to integrate the ‘much-talked about concept’ IoT (Internet of Things) where all things big and small are referred to as ‘smart things’, all connected through the internet.
The idea of IoT has been importantly adopted by the automobile industry in recent history. This adoption has brought the thought of autonomous vehicles into mind. This means that cars will be able to drive themselves without the need for a driver. This transition has been very notable.
The paper went on to say:
“Vehicles became autonomous and (wireless) communications have evolved to provide connectivity with quality of service and flexibility tailored to enable such application.”
“The future of transport and mobility will surely be enabled by autonomous vehicles encompassing sensing capabilities that can cooperate with each other and share their sensing resources and perspective with nearby6 infrastructure and neighbouring vehicles.”
The authors’ have expressed their opinion, believing that many challenges remain ahead in terms of vital aspects such as security, privacy, anonymity and security. The authors go into explain the hacking of vehicular systems which have occurred in the past.
“In 2015, Charlie Miller and Chris Valasek have demonstrated that they could take control over the internet of a Jeep Cherokee’s entertainment system by meddling with the dashboard functions, steering, brakes and transmission, all from a laptop that could be anywhere in the world.”
“Over the last few years the blockchain technology has managed to attract immense attention due to its intrinsic properties such as trust-less operation, immutability, transparency, easy verification, cryptographic security, auditability and independence of third parties.”