Next Article in Journal
Reduction in CO2 Emissions with Bivalent Heat Pump Systems
Previous Article in Journal
The Nexus between Agriculture, Water, Energy and Environmental Degradation in Central Asia—Empirical Evidence Using Panel Data Models
Previous Article in Special Issue
Electric Vehicle Charging Station Layout for Tourist Attractions Based on Improved Two-Population Genetic PSO
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

The Internet of Vehicles and Sustainability—Reflections on Environmental, Social, and Corporate Governance

by
Mariusz Kostrzewski
1,*,
Magdalena Marczewska
2 and
Lorna Uden
3
1
Faculty of Transport, Warsaw University of Technology, Koszykowa 75, 00-662 Warsaw, Poland
2
Faculty of Management, University of Warsaw, 1/3 Szturmowa Street, 02-678 Warsaw, Poland
3
School of Computing, Staffordshire University, College Road, Stoke-on-Trent, Staffordshire ST4 2DE, UK
*
Author to whom correspondence should be addressed.
Energies 2023, 16(7), 3208; https://doi.org/10.3390/en16073208
Submission received: 25 February 2023 / Revised: 20 March 2023 / Accepted: 31 March 2023 / Published: 2 April 2023
(This article belongs to the Special Issue Internet of Vehicles for Intelligent Transportation System)

Abstract

:
The Internet of Vehicles (IoV) has generated great interest among researchers from different disciplines as it is multidisciplinary research. Sustainability for the IoV requires solutions from different perspectives, particularly in the context of environmental, social, and corporate governance. This review paper examines each of the mentioned perspectives of IoV research which were conducted among at least one of these three perspectives. On the one hand, this allows determining how widely research on the IoV system has been conducted. Moreover, it shows the directions of research on the IoV. On the other hand, it determines whether and how the IoV research is linked to each of the perspectives separately and analyses this link from a global perspective as well; i.e., it analyses the survey data in terms of the data’s relationship to all the perspectives as a group. As one of the research results, a conceptual model of IoV systems allocating the ESG perspectives was developed. The current research has shown that consideration of IoV systems in the context of these three perspectives (treated both individually and collectively) is still limited. A balanced approach towards these IoV systems is still required. Therefore, the paper consists of a survey of the current research related to the sustainability of the IoV from the three mentioned perspectives, aiming to give a balanced view of the importance of the three perspectives for IoV systems.

1. Introduction

Maintaining the sustainability of transportation has always been a challenge. Global commitments to achieving sustainable development and environmental protection are gaining importance in transportation. New ideas and technologies in the transportation systems create opportunities ranging from improving the overall travel experience to improving transportation sustainability. The Internet of Vehicles (IoV) provides a group of potential solutions to help ensure more sustainable traveling. This group of potential solutions is related to, e.g., road traffic safety maintenance, the use of pollution-free vehicular systems, collisions, or accident prevention [1,2], social innovations for sustainable transport and infrastructure [3], and good governance in terms of IoV-related data protection, information privacy, and usage [4]. The IoV allows us to collect data and operate based on real-time predictions rather than on static data [5], which, used and managed wisely, may help in improving transportation sustainability.
Sustainability concerning the IoV should be analyzed and tackled under three contemporarily significant, underpinning perspectives: environmental, social, and corporate governance (concerning the concept of environmental, social, and corporate governance; acronym: ESG) [6,7]. ESG indicators are increasingly used for decision making by governments, markets, companies, investors, and other institutional entities [8,9,10,11]. Most empirical studies support the notion that ESG performance is positively related to company performance [6], supply chain relationships [12,13], and sustainability [14]. The multidimensional and holistic analysis of the IoV concept through the ESG prism will allow for the development of a conceptual model for sustainable IoV design. Thus, the goal of this conceptual paper is to gain insight into the possibility that the IoV will make the transport system more sustainable, considering ESG as the main framework for analysis. The contribution of the paper is threefold. Firstly, it contributes to building a better understanding of the IoV and related concepts. This understanding is expressed through an extensive literature review and synthesis. Secondly, it presents the IoV in relation to three different dimensions of sustainability—the environmental, social, and governance perspectives. Thirdly, it concludes with a conceptual model describing the dimensions of a sustainable IoV.
This paper follows a scoping review research method. This exploratory research method aims to map the literature on a given research subject or research area and enable the identification of major concepts and research gaps through systematic search, selection, and synthesis of existing knowledge [15,16,17].
This paper starts with explaining the IoV and related concepts, terms, and definitions. Then, it continues by exploring IoV design and applications within the ESG framework. The paper concludes with a conceptual model describing the dimensions of a sustainable IoV followed by conclusions together with research agendas and implications.

2. IoV and Related Concepts

The IoV is a distributed network that supports the use of data created by connected cars and vehicular ad hoc networks (VANETs); in a nutshell, it is where vehicles build and manage their social networks [18]. The IoV is sometimes called the Internet of Connected Vehicles (IoCV), as mentioned in [19], or the Vehicular Internet of Things (VIoT), as given in [18], or even the Social Internet of Vehicles (SIoV) [20]. The IoV originated from VANETs. The evolution of VANETs into the IoV was presented in [21]. As it was shortly defined in [22], the “VANET is a type of mobile ad hoc network (MANET) with road routes, which aim to provide traffic safety, improve traffic flow, and enhance the driving experiences”. In contrast, in [23] it is defined as “a type of Mobile Ad hoc NETwork (MANET), enables the communication between vehicles (V2V) and between vehicles and infrastructure (V2I) [24]”. VANETs are considered a branch of MANETs characterized by the presence of moving vehicles with On-Board Units (OBUs), which enable connectivity with a network and allow passengers to use internet devices, and by the presence of fixed stations used as Roadside Units (RSUs), which provide connectivity to OBUs [25] (p. 225). At that stage of technology, the stable connections and mutual exchange of data between the network’s elements were not considered. Whereas VANETs are characterized by unstable, temporary networking (each node in VANETs is free to move independently and therefore changes to another node’s connection occur frequently [26]), the IoV consists of two interconnected ideas: the networking of vehicles and the development of smart vehicles. Consequently, the IoV aims to allow vehicles to communicate in real time with their human drivers’ devices, pedestrians’ devices, other vehicles, roadside infrastructure, and fleet management systems, which creates several types of network communication. The IoV, enabled by the IoT [27], allows vehicles to access a wide branch of data and information, e.g., the states of nearby vehicles, weather information, traffic status, etc. IoT technology allows the sharing of information collected via various smart devices and sensors allocated within and outside of the vehicles and consequently supports decision making processes for various stakeholders of traffic. By connecting vehicles to inter-vehicle networks, intra-vehicle networks, and the vehicular mobile internet, an IoT infrastructure application, referred to as the IoV [21], can be formed using traditional internet protocols and networks.
Because the IoV originates from VANETs, the “VANETs are classified into two categories: Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communications” [22], following [28]. It is now extended. When V2V is considered, it means that data and traffic-related information are exchanged between vehicles (communication between vehicles) [29]. Information and data related to the state of traffic can also be exchanged between vehicles and infrastructure—such a type of communication is abbreviated as V2I [29]. Historically, V2V and V2I first emerged from VANETs [22]; however, currently, the IoV supports five types of network communication: Intra-Vehicle (IV), Vehicle-to-Vehicle (V2V), Vehicle-to-Infrastructure (V2I); Vehicle-to-Cloud (V2C) and Vehicle-to-Pedestrian (V2P). General information regarding methods of communication for VANETs, V2Vs, V2Is, and V2Rs was developed in [30]. These five types of network communication are sometimes referred to as Vehicle to Everything (V2X) communication [31,32]. Such a term covers all possible current applications (see definitions in [33] given in Table 1). This is especially relevant for V2X communications that include location information and a set of certain data regarding other vehicles, RSUs, pedestrians, and cyclists [26]. The traffic management authority was added to the structure of V2X as a part of a secure data-sharing scheme for the IoV, which can significantly reduce the burdens on full-system resources ([34] after [35]). Therefore, the IoV term is heading towards V2X. The term Internet of Everything (IoX) is an extension of the IoT and is treated as a network of relations, data exchanges, and information flows between different machines through machine-to-machine (M2M) communication, other smart devices or equipment, people, and processes in real time [36]. The IoV is therefore one of the elements of the IoX set. M2M telematics was a significant step in the connected vehicles paradigm in 2005, leading to V2V becoming a reality [37] and the most extensive form of communication; i.e., V2X communication was presented in 2015 (the history of the IoV is well-developed in [37]).
Recently, Vehicle-to-Roadside units (V2R) have been mentioned in the literature as empowered by fog and edge computations [38,39] and thereby as taking the IoV to the next level. Fog computing provides a secure channel to allow the networks’ development into a fog system in terms of RSUs such as edge routers, intelligent traffic lights, and more [40]. Therefore, the V2R was incorporated into the list of broad IoV families. On the other hand, since the above-mentioned RSU devices are part of the infrastructure, it means that V2R is a part of V2I. Similarly, the terms Vehicle-to-Cellular Network communication (V2N) and Vehicle-to-Portable devices (V2P) have appeared [25] (p. 260). Nevertheless, the V2N may be treated as a part of the V2I set, along with V2R and V2P as Vehicle-to-Pedestrian (with the same above-mentioned abbreviation V2P).
More representatives are expected to appear in the V2X group soon. The next possibility is Vehicle-to-Grid (V2G), which serves as a connection between vehicles and the electricity grid and is relevant for electric vehicles (EVs). V2G is a communication interface for the bidirectional charging/discharging of EVs [25] (p. 292). However, according to [25] (p. 14), it is still in the design stage. The authors of [41] mentioned vehicle-to-home as another system that provides a managed, two-way current flow between the grid and vehicles.
To study definitions of the IoV, the following pseudo-code was applied in the Scopus database, directly as “definition” AND “internet of vehicles” AND (LIMIT-TO (EXACTKEYWORD, “Vehicle To Vehicle Communications”) OR LIMIT-TO (EXACTKEYWORD, “Vehicular Ad Hoc Networks”)) AND (LIMIT-TO (DOCTYPE, “re”)). Execution of the code resulted in 15 documents (it was decided that the review paper may become the most significant and complex when definitions are expected—this is the reason for document-type limitation in the above-mentioned pseudo-code). Before presenting the study on IoV definitions, it is worth mentioning what the main subjects of certain review papers were. The most common convergence points of the reviews focused on VANETs and were drawn from the following publications: [22,23,30,35]. The number of review papers on VANETs in comparison to the IoV may mean that any research on VANETs is treated as more serious, complex, and especially related to the historical values of the original term. The review paper [26] focused on autonomous vehicles, whereas the contributions [37,42] were directly concerned with IoVs in transportation and automation (it is worth underlining that in the case of [37] a timeline of IoV development was included). Meanwhile, in [43,44] the review process was mostly focused on V2V and V2I.
The definitions, given in Table 1, were divided into several cohorts. Firstly, it is worth mentioning definitions of the IoV given for specific purposes and drawn from specific assumptions, as in the case of [25,45]. The second cohort consists of definitions compiled through a conceptual transfer of various terms into the IoV, as with [46,47,48]. The next cohort consists of definitions given by applications [49]. The broad cohort reflects the cohort that defines the IoV through V2V or/and I2V [25] (p. 225), [43] (p. 17), [44] (p. 88), or in full-scale by V2X [25] (p. 259, 261). Finally, the cohort including direct IoV definitions consists of those given in [33,37].
Table 1. Definitions of IoV.
Table 1. Definitions of IoV.
DefinitionYear of PublicationReference
“In the Internet of Vehicles, smart cars, equipped with both computational and communication resources, can provide intelligent vehicle control, traffic management and interactive applications.”
(the definition given by application)
2022[49]
“In general, the vast revolution in the IoT (a system that enables objects such as sensors and actuators to communicate and talk with each other without human intervention to achieve a common goal) helped to reduce traffic accidents by embedding some IoT objects in vehicles; and this created the IoV concept [50].”
(the definition given through conceptual transfer of IoT)
2020[47]
The IoV with big data technologies “creates new opportunities to diminish real-world problems such as traffic congestion, responsive and effective government processes for traffic monitoring, controlling, route management and urban planning etc.” 2021[37]
“(…) an integration of three networks (…): an inter-vehicle network, an intra-vehicle network, and the vehicular mobile Internet.”
“(…) Internet of Vehicles plays a significant role in the safe delivery of goods as it enables realtime tracking of shipments, warehouse-capacity optimization, predictive asset maintenance, route optimization, and improved last-mile delivery”
(the definition given by application)
2021Sukanya Mandal, IEEE member (India) quoted in [42]
“V2V communication enables vehicles to communicate directly with one another. This enables a vehicle to be alerted to the presence of other vehicles that are difficult for the vehicle to see”
(the definition given by V2V technology)
2020[43] (p. 17)
“system for sharing vehicle-to-vehicle (V2V) information among vehicles to prompt appropriate driving control”
“infrastructure-to-vehicle (I2V) system is needed to communicate information among vehicles to prompt appropriate driving control”
(the definition given by V2V and I2V technologies)
2020[44] (p. 88)
V2V: “OBUs communicate between themselves”
V2I: “OBUs communicate directly with RSUs”
(the definition given by V2V and I2V technologies)
2020[25] (p. 225).
“Vehicle-to-Everything (V2X) technologies constitute the most critical and important components for communication infrastructure (between the consumer-vehicle-infrastructure-management center) to provide smarter, safer and faster travel in addition to the efficient use of the resources.”
(the definition given by V2X technology)
2020[25] (p. 259)
“Vehicles exchange information with each other with the use of V2V communication and also access the network infrastructure through the Road Side Units (RSUs) or through the cellular network components e.g., eNodeBs (V2N communication).”
(the definition given by V2X technology)
2020[25] (p. 261).
Vehicle connection with other infrastructures such as buildings, lights, stations, etc., is called Vehicle to Infrastructure (V2I) connection, while connecting vehicles with other vehicle systems are called V2V connection. The combination of both connection types V2I and V2V is known as Vehicle to Everything (V2X) connection.2018[51]
“The Internet of things (IoT) is a global network connecting smart objects and enabling them to communicate with each other. Whenever those smart objects being connected over Internet are e xclusively vehicles, then IoT becomes Internet of Vehicles (IoV).”
(the definition given through conceptual transfer of IoT)
2018[46]
The definition given for specific purposes: “vehicles can broadcast information about their states to other vehicles (V2V), including speed, heading, and location, as well as the information related to the environment while adverse weather conditions or obstacles can be acquired from infrastructure (V2I).”
“In vehicle-to-infrastructure (V2I) systems, the vehicles communicate with RSUs or cellular base stations at fixed positions. This allows the RSUs to communicate their location, weather conditions, traffic flow, etc. with vehicles to estimate their own position more accurately.”
2018[26]
“The Social Internet of Vehicles (SIoV) is an example of a SIoT [SIoT stand for Social Internet of Things—added by this papers authors] where the objects are smart vehicles (mostly cars). The social connections can be made between vehicles, drivers and other users and between these two groups.”
(the definition given through conceptual transfer of IoT)
2015[48]
“Providing wireless connectivity to vehicles enables communication with internal and external environments, supporting vehicle-to-vehicle (V2V), vehicle-to-infrastructure (V2I), vehicle-to-sensor, and vehicle-to-Internet communications”
(the definition given for specific purposes)
2014[26,45]
“The Internet of Vehicles (IoV) is an integration of three networks: an inter-vehicle network, an intra-vehicle network, and vehicular mobile Internet. Based on this concept of three networks integrated into one, we define an Internet of Vehicles as a large-scale distributed system for wireless communication and information exchange between vehicle2X (X: vehicle, road, human and internet) according to agreed communication protocols and data interaction standards (examples include the IEEE 802.11p WAVE standard, and potentially cellular technologies). It is an integrated network for supporting intelligent traffic management, intelligent dynamic information service, and intelligent vehicle control, representing a typical application of Internet of Things (IoT) technology in intelligent transportation system (ITS).”2014[33]
The design of the IoV must be sustainable. The three pillars of ESG are essential for a sustainable IoV and should be supported. Sustainability is impossible if one of the components of sustainable development is not supported. These three components are informally referred to as planet, people, and profits. Although the three should be equally supported, environmental (planet) and economic (profits) tend to be more dominant than the social component (people). This is wrong because the social component affects the quality of life and well-being of individuals more than environmental issues. Furthermore, sustainability requires a balance between all the pillars. Sustainable IoV design needs social sustainability as much as the rest of the ESG pillars.

3. ESG in IoV Design and Application

3.1. IoV: An Environmental Perspective

The environmental perspective in the context of the IoV is an extremely broad topic. A search of relevant scientific databases revealed 521 publications indexed on the Web of Science (the pseudocode: (ALL = (“internet of vehicles”)) AND ALL = (environment)) in recent years, i.e., 2010–2022 (date of data collection: 10 May 2022). A much more sizable sample was registered in the Scopus database, i.e., 8358 publications (ALL(“internet of vehicles”) AND ALL (environment)), in recent years, i.e., 2014–2022 (date of data collection: 27 October 2022). Based on results obtained using both databases, a method known as a scoping review was applied to determine the types of environments considered in each publication.
Firstly, the list of publications related to different semantic types of environmental terms is presented in this section. Secondly, below the list, the most interesting publications related to the environment, as a part of the ESG concept, are mentioned in more detail.
The authors of publications broadly discuss “environment” as follows:
  • Devices and software environments (including IoV network environments, V2X environments, etc.), namely systems involving IoV technology. In general, that type of “environment” can be summed up as a software and/or hardware environment [52,53,54,55,56,57,58,59,60,61,62,63,64,65,66,67,68,69,70,71] (in [65], a network environment is understood by its parameters as a quantity of vehicles, load, speed, etc.). An interesting application of IoV control methods in the context of device and software environments is given in [72], where the authors developed a smart terminal-box for unmanned earthwork machinery (including bulldozers, graders, and rollers) which works in the tough environments of varied weather. Additionally, it may be underlined here that the authors of [73] mentioned blockchain to be envisioned as a type of enforcement applied to ensure trustworthiness in diverse IoT environments (and consequently in IoV environments, which is a subject matter of [74]).
  • Internal and external environments of an organization, e.g., the manufacturing environment, the supplier’s competitive environment, the sales competition environment, and the customer usage environment as mentioned in [59].
  • An environment as acreage was given in [75].
  • Some other publications treat the environment as an infrastructural network [76,77,78], as a surrounding [79,80,81,82,83,84], and as an (urban) traffic environment [68,85,86,87,88,89].
  • A small environment, as in the concept in biology, was applied to the IoV by [90].
  • An environment consisting of vehicles, tasks, wireless channels, and mobile edge computing servers was mentioned in [91].
  • Various types of environments were mentioned in [92], without any unification.
It is worth mentioning that, in numerous papers among the analyzed sample, IoV and environment terms appeared sporadically in the body of the publication or in the listed references—such publications have been omitted and not included in the above-mentioned list.
As can be observed from the above-presented list, most of the publications related to the IoV and the environment regard the environment differently. It can be treated as a space, network, system, and as its components’ function (road system environment, vehicle system environment, vehicular environment). Hence, the number of publications with the keyword “environment” is huge. Consideration of the IoV from the point of view of environmental protection and the ecology-related environment happens far less frequently.
Pro-environmental perspectives on IoV technologies are certainly related to the elimination of energy and signal loss during routing data between devices and the reduction of power consumption across the IoT network. The authors of [93] developed a method to eliminate energy loss in IoT technology thanks to the optimal path of signal flow, which certainly can also be applied to the IoV. This can benefit environmental aspects in two ways. On the one hand, the issue is related to the elimination of energy losses; on the other hand, the sensors in the proposed method, based on Fuzzy Logic coupled with the Grasshopper Optimization Algorithm, provide numerical data which can be used for environment monitoring (weather, health, security, etc.) [93]. Furthermore, [94,95] proposed routing protocols to maintain efficient energy consumption in the described technology and in relation to the issues mentioned above. The problem of signal and data flow delays was considered in [96] as well. The authors proposed mixed-integer linear programming to minimize cloud delay between hosts, treating it as a joint optimization algorithm (in contrast to single algorithms as the delay optimization algorithm and host optimization algorithm, respectively). Additionally, in [97] the authors worked on increasing reliability and decreasing delays in V2V and V2I connections within the dynamic changing environment, and they developed an algorithm with a certain success rate. Cloud networks without consideration of delays were developed in [98].
The environmental aspects of the IoV were indirectly mentioned in [99]. The authors, considering V2G, mentioned the environmental impact of V2G design objectives and closed their paper with this statement: “in this age of environmental degradation, we need a reasonable amount of renewable energy.” This has been an important topic among IoV applications in V2H and V2G since V2H uses the energy stored in electric vehicles to power household appliances, while V2G allows the energy stored in these vehicles to be released to the grid [41]. The IoV, along with hybrid electric vehicles, is also treated as an input to energy problems in [100].
A final thought related to the environmental perspective considers ESG itself. According to [101], vehicles, thanks to IoV technology, can act as sensing points whose measurement results ensure more services, safety, and efficiency for transportation systems [102]. Yet, importantly, from the viewpoint of ESG the IoV provides sensors for environmental conditions which can meet the needs of smart cities.
In [103], it was mentioned that the IoT has been outlined as comprising “[t]hings that have identities and virtual personalities operating in smart spaces using intelligent interfaces to connect and communicate within the social, environmental, and user contexts” [104]. Apparently, the environmental aspect of the IoT was noted years ago (2010); nevertheless, it has not yet been researched enough. The shaping of such an approach can be expected to increase in the near future. In particular, the authors of [105] recently discussed how the cloud-based Connected Autonomous Vehicles Ecosystem can support superior traffic management and reduce CO2 emissions. This result was found in a review paper related to IoT technology for the Connected Autonomous Vehicles Ecosystem by [106].
To sum up the section, it should be underlined that far too little attention is paid to the environmental aspects of the IoV, not enough attention is paid to signal loss, and there is practically no research on the actual costs of the Internet, which, like the external costs of transportation, are very difficult to estimate.

3.2. IoV: A Social Perspective

The social perspective in the context of the IoV is almost as broad a topic as the environmental perspective. As in the previous section, the relevant scientific databases were taken into consideration and the quantitative results were as follows. The pseudocode (ALL = (“internet of vehicles”) AND ALL = (social)) applied in recent years, i.e., 2010–2022 (date of data collection: 27 October 2022), revealed 29 publications solely for the Web of Science database. Therefore, based on the preliminary investigation, the search was modified to “social internet of vehicles”, which was applied to all fields of the database records, revealing 62 publications. The Scopus database was investigated similarly. Consequently, when the first given pseudocode was checked in Scopus, it resulted in 5837 publications of different natures. In contrast, the search with the phrase “social internet of vehicles” applied to all fields of the database records resulted in 1200 publications. These publications constituted a database that was first used for a scoping review; secondly, the most significant publications presenting the social perspective of the IoV were investigated to a greater extent.
The research group [107] presented different options for socializing vehicles and other entities (including passenger socializing, e.g., in public communication) connected to the VANET, namely via the internet, Dedicated Short-Range Communication (DSRC), or other communication technologies. Such socialization is understood as sharing cohorts of data grouped by traffic information/traffic efficiency, weather conditions, road situations/road experience, toll gates, vacant car parking slots, road safety, travel comfort, entertainment along the roads, and media sharing [107,108,109]. Some authors relied on the social internet of vehicles (SIoV) as a composition of social networks and the IoV [110]. An interesting observation was given in [111]—the SIoV was compared to human semi-social behavior, was not completely trusted, and was seen to be potentially filled with adverse, malicious information. This leads to interesting ethical dilemmas, as mentioned in [109], which are indirectly related to the SIoV yet directly related to autonomous vehicles. Namely, “1) If driverless cars are not safer than human drivers it will be unethical to sell them. 2) Once driverless cars are safer than human drivers (reduce the risks to third parties), driving will be unethical” [109,112]. Socialization of the IoV can be treated as building a network of various devices which care about the protection of privacy and security in the SIoV, as mentioned in [107,113,114,115].
The key exchange protocol was mentioned in [116] as the most common protocol among security solutions. The authors’ continuous challenge was focused on desired performance and security properties which were unsatisfactory, whereas the key exchange protocol developed in [116] had an 84% improvement in execution time and a 54% improvement in communication overhead. The authors of [117] noted that the mentioned security problem for the SIoV is still unsolved; however, they commented as well that standardization organizations agreed to apply Vehicular Public-key Infrastructure (V-PKI) to SIoV security. According to [118], the technology related to Artificial Intelligence (AI) was the technology that led the IoV to the next phase of intelligence, namely the SIoV, which makes the issue of privacy and security of exchanged data even more serious. SIoV security contributed to a decrease in vehicle crashes by 80% [107,117,119,120]. Some algorithms related to SIoV security were given in [117]. These were, for example, developed using Unmanned Aerial Vehicles (UAV) to secure the SIoV, as presented in [121] (UAVs were also investigated in [108] to assist the mobile edge computing environment compared to the SIoV). The same authors mentioned that the goal of the SIoV, also known as a vehicular social network (VSN), is to “make vehicles capable of social communication and low-cost infotainment service provisioning, by integrating social networking-related concepts into IoV” [122]. Relations between vehicles and aspects of road infrastructure, including effective, low-cost, and flexible solutions, were also given in [20]. Movable entities were also treated as event witnesses—the authors of [123] developed incentive-based vehicle witnesses as services that treat vehicles moving in an ad hoc network as witnesses to designated events.
The authors of [124] considered the SIoV in the context of its application of controlling traffic congestion and road safety, and they have developed an algorithm supporting that concept. The authors of [125] improved traffic efficiency by timely delivery of data/information in the SIoV environment with ultra-high-speed integrated cellular 5G technologies (or any other traditional communication technologies such as Wi-Fi, cellular networks, or through dedicated short-range communication [109]). Instead of 5G technologies, the authors of [126] proposed a DigiMesh radio module for an ad hoc wireless network in the SIoV to transmit and receive alerts on the driving behaviors of nearby vehicles. The improved performance of a collaborative edge computing-based traffic management system was the goal in [127], aiming specifically to reduce the average waiting time of vehicles in a network, especially in intersections. For this purpose, multi-agent-based deep reinforcement learning was applied to the interaction of servers with IoV and traffic lights to prompt dynamic green waves. Furthermore, in [128], the traffic congestion (gaining the maximum throughput) was supported by application of the dynamic traffic congestion management algorithm within the SIoV, although it was developed especially for intersections.
The continued connection (even temporarily established) between interconnected entities relies on trustworthiness, which is one of the urgent issues that must be addressed for wireless connections [129]. This is the case especially since connections in the SIoV are characterized by the ad hoc nature of the environment [130] (the authors focused on the trustworthiness algorithm in the SIoV). Other authors also added scalability and navigability to trustworthiness as key challenges of the SIoV, mentioning that it is still at an early stage of development [131]. Moreover, standardization, adaptability, infrastructure, and lack of applications were given as topics worth analyzing in addition to the above-mentioned issues [132]. In relation to trust and security in the SIoV network, the authors of [133] investigated a trust-aware, social in-vehicle and inter-vehicle communications architecture which showed promise during simulation experiments. The end-fog-cloud system architecture was applied in the mentioned publication. Fog computing-based systems continually raise interest in the SIoV area. The authors of [134,135] investigated a dual-mode data forwarding SIoV scheme based on interest tags for a fog computing-based SIoV. Experimental results validated the efficiency and stability of forwarded data and information. The first ideas regarding algorithms and models for dynamic audits of the correctness of shared data in extremely fast changes of entities in SIoV systems were developed in [136]. This was the research that envisioned the transformation of the IoV into the SIoV, according to the authors.
Another aspect of the SIoV is the building of its model. The model and SIoV scenarios were identified in [137] (the authors mentioned that they extended the concept of SIoT to the IoV, proposing SIoV). The detailed architecture of the SIoV was presented in [48] together with an interesting vision that the SIoV will be applied to smart cities. The authors of [138] proposed a device-to-device enabled SIoV model consisting of vehicles, RSUs, base stations, traffic management servers, and trust authority (a taxi trajectory simulation-based analysis was included in the research). A similar model was given in [125]. Data privacy and data protection were also of interest in [139]—the authors focused their research on the Conditional Choice Probability-Federated Deep Learning algorithm to increase trust in a chain of involved entities. Meanwhile, the authors of [140] presented a decentralized scheme for solving the peer disclosure issues in the SIoV. They applied a directed, acyclic, graph-based mutual supervision algorithm assuring 72% multi-dimensional privacy against leakage of transmitted images in comparison to non-peer disclosure prevention. Prevention of data leakage was also of interest in [141], in which authors proposed a federated learning collaborative authentication protocol for shared data which had the lowest authentication delay in comparison to other protocols and in which the data packet loss rate was reduced to 4.68%. The potential of federated learning was first observed in [142], where addressing data privacy and data trajectory in SIoV networks was taken into consideration under simulation methods.
In the survey [143], a comparative analysis of models related to location privacy protection was developed. These models were based on user attribute information, user behavior information, and user relationship networks. Location privacy protection of SIoV users can also be ensured with a method based on double k-anonymity, the goal of which is to hide users’ locations and requested information—such a concept was given under simulation by the same group of authors in [144]. Continuous work on SIoV safety led the authors of [145] to a statement that their authentication protocols can be of higher resistance in comparison to authentication protocols given in [146], which are treated as more vulnerable to internal attacks and smart card theft attacks and which lack perfect forward security.
Data transmission, data delivery, and minimization of buffer occupancy were developed with up-to-date algorithms (e.g., the susceptible-infected-recovered model) in [147]. Such challenges, mentioned as well in the above-quoted research, led to green computing in the SIoV (i.e., networks virtualization, use of the cloud, energy saving), as it was called in [148]. To increase such green traffic data dissemination in the SIoV, the authors of [149] adopted a meta-heuristic solution which consists of two-way particle swarm optimization.
Congestion challenge is not solely related to traffic in the case of SIoV application. The authors of [150] noted that Transmission Control Protocol/Internet Protocol (TCP/IP)-based congestion control mechanisms cannot be directly applied in the IoV environment. The reason is the need for high throughput and low delays in signal transition, which are hardly obtained for content-sharing in some cases. The authors developed the sharing system in the SIoT network without vehicle IP assignment. The security of communication in the SIoV environment is ensured by blockchain. Blockchain technology was also applied to ensure not only security but also privacy in research developed by the authors of [151].
There is no one focus point in the SIoV. Trustworthiness [129,130,133], security [116,117,118,121,133,151], safety [124,126], privacy [140,141,142,144,151], scalability [131], and computing capacity [125,134,135,136,147,150] are among the most common and continuous challenges related to the SIoV. These issues are compounded by the low communication efficiency and high computational cost of the SIoV. Fog computing [134,135,148] (together with or in contrast to edge computing [108,127,142]) is therefore foreordained to improve performance and reduce the amount of data sent to the cloud for processing, analysis, and storage. It can also be used for security reasons and to address the need to comply with applicable data processing regulations.

3.3. IoV: A Governance Perspective

One of the underpinning purposes of the IoV, based on the assumption that vehicles are always, or almost always, connected to the Internet, is to expand the services and information flow that users may use and benefit from while traveling in their vehicles. These services include a variety of roles that intelligent vehicles will be engaged in, such as customer roles and database roles, as well as the collecting and distributing of big data resources [4]. This purpose led to the paradigm of the social network of vehicles (i.e., SIoV), in which anonymous relations are established between vehicles and road infrastructure equipment [20]. This in turn created the potential for social innovations for sustainable transport and infrastructure [3]. Moreover, the data gathered from the surrounding world, other vehicles, and drivers has facilitated the smooth operation of Autonomous Vehicle Systems, environmental protection, and road traffic [4].
However, such an approach carries governance risks which need to be addressed and managed well for IoV solutions to succeed. These are, among others:
  • Data security and information privacy;
  • Leakage of personal data and personal privacy;
  • Compliance with the GDPR;
  • Serious security breaches related to the broadcasting of false alarms;
  • Limited effectiveness of IoV systems related to poorly managed private data sharing in the cloud [152,153,154,155,156,157].
Many potential solutions can help to solve the above-described governance and security challenges. For example:
  • Blockchain-based IoV network architecture aims to protect connected vehicles from attacks and is based on a sophisticated secure IoT network [158].
  • Policy hidden attribute-based encryption with dynamic service (PH-ABE-DS) and edge-assisted policy hidden attribute-based encryption with dynamic service (EA-PH-ABE-DS) are two solutions dealing with internal and external security issues that simultaneously offer an appropriate level of usability and enable full policy hiding [152].
  • Blockchain solutions can support high privacy levels, preserve full data disclosure, and facilitate lower costs for owned redundant storage and related procedures [156].
  • False alarm detection methods, e.g., outlier detection, intrusion detection, the detection of security attacks, inconsistency detection applied to communicating, and messages misbehavior detection are relevant [28,153] (these methods were developed through the application of a hidden Markov model-based prediction framework based on a probabilistic model).
  • PPIoV (i.e., Privacy Preserving-based framework for IoV-fog environment) is a federated learning and blockchain-based method aimed at ensuring the short information processing times which are necessary for the IoV environment, as well as ensuring trust [155].
Another serious governance-related challenge consists of a variety of potential attacks that can affect IoV networks and infrastructure and target availability, authentication, data integrity, confidentiality, and routing. These include, among others, channel interference attacks, Denial of Service (DoS) attacks, Distributed Denial of Service (DDoS) attacks, man-in-the-middle attacks, message tampering attacks, eavesdropping attacks, malware attacks, message holding attacks, sybil attacks, masquerading/impersonation attacks, wormhole/tunneling attacks, GPS spoofing attacks, replay attacks, message manipulation attacks, and route modification attacks [159]. These attacks can be managed thanks to many different solutions acting as remedies. These are, for example, group signatures, event-based reputation systems, session key certificates, footprints, identity-based cryptography, digital certificates, timestamps, and geographical leashes [159,160,161,162]. However, due to a wide variety of potential threats and solutions, this task is not easy. In order for the task to be successful, the potential threats and solutions must be well-selected, deeply understood, and properly implemented in line with their primary aim. Another option to deal with attacks is to predict and prevent them. An example of such a solution is a real time learning model for early prediction of phishing attacks in the IoV [163].
Last, but not least, it is also worth noting that this scoping review proves that blockchain seems to be a promising technology that may solve or help mitigate governance problems related to the IoV, e.g., [164,165,166,167,168,169]. It is also currently the most popular among researchers, e.g., [170,171,172,173].
The governance issues listed above are the most important and the most common in the literature. Due to the significantly growing interest of scholars and practitioners in the IoV, the number of IoV-related publications is growing significantly and quickly. Nonetheless, most of the papers are technical and describe technologies supporting the IoV and thus are not relevant to this part of the study. The governance perspective of the IoV presented in this section is based on the results of a scoping review performed on the Scopus database search (date of data collection: 27 October 2022). The following keywords were shuffled in multiple searches: IoV, governance, privacy, data, and risk:
  • (TITLE-ABS-KEY (iov) AND TITLE-ABS-KEY (governance)); four documents; 2019–2022;
  • (TITLE-ABS-KEY (iov) AND TITLE-ABS-KEY (data) AND TITLE-ABS-KEY (privacy)); 230 documents; 2013–2023, where 91% of publications is dated from 2019 to 2023;
  • (TITLE-ABS-KEY (iov) AND TITLE-ABS-KEY (data) AND TITLE-ABS-KEY (risk)); 83 documents (2007–2022), where 78% of publications was dated from 2019 to 2022.
The publications included in the scoping review were dated from 2019 to 2023, and published in English as articles, conference papers, reviews, or conference reviews. The final sample was composed of 266 publications and all of those constitute the background of this analysis. After the initial screening of titles, abstracts, and keywords, 32 articles were selected as matching the goals of this section and were deeply analyzed, as presented above.

4. Discussion

The analysis conducted in this paper shows that the knowledge base about the IoV and related concepts is considerably broad and interdisciplinary. Thus, it needs a synthesis. The growing importance of maintaining the sustainability of transportation led to the analysis and further explanation of the IoV concept based on three different dimensions related to sustainability—the environmental, social, and governance perspectives (ESG).
The above-mentioned perspectives present a holistic picture of IoV dimensions. It shows that the three ESG perspectives not only constitute individual pillars of the IoV, but also overlap in various ways and therefore should be addressed together to support the complex IoV transformation toward sustainability. The interconnections between these three perspectives appear to be strong, and it is useful to address them simultaneously.
The environmental dimension covers issues related to, among others:
  • The elimination of energy losses;
  • Data which can be used for environmental monitoring (weather, health, security, etc.);
  • Routing protocols to maintain efficient energy consumption;
  • A reasonable amount of renewable energy for IoV issues;
  • The IoV next to hybrid electric vehicles as an input to energy problems;
  • Vehicles, thanks to IoV technology, acting as sensing points whose measurement results ensure more services, safety, and efficiency for transportation systems;
  • IoV sensors for environmental conditions, which can meet the needs of smart cities;
  • Systems supporting superior traffic management and CO2 emissions reduction.
The social dimension is grounded in interactions at various levels and can be seen as a composition of social networks and the IoV. It poses challenges related to SIoV trustworthiness, security, safety, privacy, scalability, and computing capacity. Socialization of the IoV means sharing cohorts of data grouped in traffic information/traffic efficiency, weather conditions, road situations/road experience, toll gates, vacant car parking slots, road safety, travel comfort, entertainment along roads, and media sharing. It can be compared to human semi-social behavior created by a network of various devices attuned to the protection of privacy and security. This security aspect seems to be important, especially since these connections rely on social communication for vehicles with a need for scalability and navigability to transmit and receive alerts on driving behaviors and green traffic data dissemination. This dimension of the IoV seems to be crucial in supporting social innovations for sustainable transport and infrastructure.
The environmental and social dimensions are bounded by governance-related issues addressing mainly:
  • Data security and information privacy;
  • Data leakage;
  • Personal privacy and compliance with the GDPR;
  • Serious security breaches related to the broadcasting of false alarms;
  • Limited effectiveness of IoV systems related to poorly managed private data sharing in the cloud;
  • A variety of potential attacks that can affect IoV networks and infrastructure and target availability, authentication, data integrity, confidentiality, and routing.
All of these interconnections, if managed wisely, can surely support a more holistic and complex perspective on IoV systems, including their better design and more thought-through implementation.

5. Conclusions and Future Research Directions

The ESG perspective is interlocked. Each perspective is represented as a puzzle piece in the graphic representing the results of the presented considerations (Figure 1). At the same time, the individual ESG perspectives are represented as cells in a honeycomb—they interconnect, intermingle, and at the same time allow for the inclusion of future, yet-to-be-defined concepts, and extend beyond the IoV. In addition, Figure 1 includes a layer-based architecture of the IoV system based on [174].
The overlapping puzzle pieces indicate that within each layer in the IoV system design process, all perspectives should be considered together. However, based on the conducted analyses, it appears that IoV issues are either not sufficiently discussed in the context of each perspective or are omitted in the discourse (it is also worth noting here once again how heterogenous a perspective can be considered, including, for example, the diverse understanding of the term “environment” given in Section 3.1). For example, the issue of communication overhead has so far been considered in the context of environmental and corporate governance perspectives to the exclusion of social ones. To ensure the sustainability of IoV systems, each perspective should be considered. Moreover, this work has to be conducted by various stakeholders whose actions can positively impact the sustainability of the IoV at various levels. For example, by developing and promoting more sustainable solutions, industry players can affect their application rate. Regulators supporting such adoption with relevant laws and procedures can facilitate their wider diffusion, whereas governments, thanks to targeted policy measures, may incentivize this process. Certainly, the development of the IoV raises various ethical concerns related to privacy, security, and social justice. These should be treated seriously and considered at all levels of IoV solutions development, implementation, and usage. However, thanks to novel IT systems and good data management and storage, such a problem can be minimalized and hopefully, in time, even definitely resolved. All the perspectives should be included within the design of networks intended to cooperate as IoV systems. An approach of this type, albeit just in its infancy, can be seen within the cohort of publications analyzed. This approach applies to the issues concerning each of the perspectives, and these are:
  • Environmental factors monitoring;
  • Supporting traffic management;
  • Reducing CO2 emissions;
  • Sharing cohorts of data.
The remaining identified issues are either related to only one perspective (e.g., the issue of energy loss) or at most two perspectives at the same time (e.g., the communication overhead). Therefore, it is worth stating that future research agendas should move toward specific perspectives, as described below.
For future research agendas, it would be desirable to steer the following issues toward a corporate governance perspective (in the case of these issues, the other two perspectives have already been considered):
  • Signal and data flow delays and execution time;
  • Energy loss.
On the other hand, the following issues should be directed toward the social perspective (again, the other perspectives have already been considered for these issues):
  • Communication efficiency, computational cost, and expenditures;
  • Data security and information privacy;
  • Communication overhead;
  • Security and data processing regulations;
  • Energy loss.
Certainly, at the same time, it is recommended that existing research directions be sustained.

Author Contributions

M.K. and L.U. proposed the idea; M.K. edited the manuscript; M.K. and M.M. conducted the literature review and arrived at the results; introduction, M.M.; literature review, M.K. (67%) and M.M. (33%); materials and methods, M.K. and M.M.; data curation M.K.; graphics M.K.; results, M.K. and M.M.; conclusion, M.K.; writing—original draft, M.K. and M.M.; visualization, M.M.; final revision, M.K., M.M., and L.U. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Balasubramaniam, A.; Paul, A.; Hong, W.-H.; Seo, H.; Kim, J.H. Comparative Analysis of Intelligent Transportation Systems for Sustainable Environment in Smart Cities. Sustainability 2017, 9, 1120. [Google Scholar] [CrossRef] [Green Version]
  2. Balasubramaniam, A.; Paul, A. Comparative study of sustainable transportation systems: A futuristic approach. In Proceedings of the ICSNS 2018—IEEE International Conference on Soft-Computing and Network Security 2018, Coimbatore, India, 14–16 February 2018; Curran Associates: Ney York, NY, USA, 2018. [Google Scholar] [CrossRef]
  3. Aamir, M.; Masroor, S.; Ali, Z.A.; Ting, B.T. Sustainable Framework for Smart Transportation System: A Case Study of Karachi. Wirel. Pers. Commun. 2019, 106, 27–40. [Google Scholar] [CrossRef]
  4. Hussain, H.I.; Kamarudin, F.; Mohd-Sanusi, Z.; Shuhidan, S.M.; Saad Al-Dhubaibi, A.A.; Ahmad Razimi, M.S. Governance in the internet of vehicles (IoV) context: Examination of information privacy, transport anxiety, intention, and usage. J. Adv. Transp. 2021, 2021, 5563260. [Google Scholar] [CrossRef]
  5. Zhao, L.; Jia, Y. Intelligent transportation system for sustainable environment in smart cities. Int. J. Electr. Eng. Educ. 2021, 1–9. [Google Scholar] [CrossRef]
  6. Eccles, N.; Viviers, S. The Origins and Meanings of Names Describing Investment Practices that Integrate a Consideration of ESG Issues in the Academic Literature. J. Bus. Ethics 2011, 104, 389–402. [Google Scholar] [CrossRef]
  7. Nirino, N.; Santoro, G.; Miglietta, N.; Quaglia, R. Corporate controversies and company’s financial performance: Exploring the moderating role of ESG practices. Technol. Forecast. Soc. Chang. 2021, 162, 120341. [Google Scholar] [CrossRef]
  8. Capelle-Blancard, G.; Petit, A. Every Little Helps? ESG News and Stock Market Reaction. J. Bus. Ethics 2019, 157, 543–565. [Google Scholar] [CrossRef]
  9. Daugaard, D. Emerging new themes in environmental, social and governance investing: A systematic literature review. Account. Financ. 2020, 60, 1501–1530. [Google Scholar] [CrossRef]
  10. Friede, G. Why don’t we see more action? A metasynthesis of the investor impediments to integrate environmental, social, and governance factors. Bus. Strategy Environ. 2019, 28, 1260–1282. [Google Scholar] [CrossRef]
  11. Cordeiro, J.J.; Profumo, G.; Tutore, I. Family ownership and stockholder reactions to environmental performance disclosure: A test of secondary agency relationships. Bus. Strategy Environ. 2021, 30, 2091–2107. [Google Scholar] [CrossRef]
  12. Mukandwal, P.S.; Cantor, D.E.; Grimm, C.M.; Elking, I.; Hofer, C. Do Firms Spend More on Suppliers That Have Environmental Expertise? An Empirical Study of U.S. Manufacturers’ Procurement Spend. J. Bus. Logist. 2020, 41, 129–148. [Google Scholar] [CrossRef]
  13. Fritz, M.M.C.; Ruel, S.; Kallmuenzer, A.; Harms, R. Sustainability management in supply chains: The role of familiness. Technol. Forecast. Soc. Chang. 2021, 173, 121078. [Google Scholar] [CrossRef]
  14. Brooks, C.; Oikonomou, I. The effects of environmental, social and governance disclosures and performance on firm value: A review of the literature in accounting and finance. Br. Account. Rev. 2018, 50, 1–15. [Google Scholar] [CrossRef]
  15. Grant, M.J.; Booth, A. A Typology of Reviews: An Analysis of 14 Review Types and Associated Methodologies. Health Inf. Libr. J. 2009, 26, 91–108. [Google Scholar] [CrossRef]
  16. Daudt, H.M.; van Mossel, C.; Scott, S.J. Enhancing the Scoping Study Methodology: A Large, Inter-Professional Team’s Experience with Arksey and O’Malley’s Framework. BMC Med. Res. Methodol. 2013, 13, 1–9. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  17. Colquhoun, H.L.; Levac, D.; O’Brien, K.K.; Straus, S.; Tricco, A.C.; Perrier, L.; Kastner, M.; Moher, D. Scoping Reviews: Time for Clarity in Definition Methods, and Reporting. J. Clin. Epidemiol. 2014, 67, 1291–1294. [Google Scholar] [CrossRef] [PubMed]
  18. Zia, K.; Muhammad, A.; Khalid, A.; Din, A.; Ferscha, A. Towards Exploration of Social in Social Internet of Vehicles Using an Agent-Based Simulation. Complexity 2019, 2019, 8201396. [Google Scholar] [CrossRef]
  19. Talib, M.A.; Abbas, S.; Nasir, Q.; Mowakeh, M.F. Systematic literature review on Internet-of-Vehicles communication security. Int. J. Distrib. Sens. Netw. 2018, 14, 1550147718815054. [Google Scholar] [CrossRef] [Green Version]
  20. Atzori, L.; Floris, A.; Girau, R.; Nitti, M.; Pau, G. Towards the implementation of the Social Internet of Vehicles. Comput. Netw. 2018, 147, 132–145. [Google Scholar] [CrossRef]
  21. Yang, F.; Wang, S.; Li, J.; Liu, Z.; Sun, Q. An overview of Internet of Vehicles. China Commun. 2014, 11, 1–15. [Google Scholar] [CrossRef]
  22. Sheikh, M.S.; Liang, J.; Wang, W. A Survey of Security Services, Attacks, and Applications for Vehicular Ad Hoc Networks (VANETs). Sensors 2019, 19, 3589. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  23. Xu, X.; Wang, Y.; Wang, P. Review Article Comprehensive Review on Misbehavior Detection for Vehicular Ad Hoc Networks. J. Adv. Transp. 2022, 2022, 4725805. [Google Scholar] [CrossRef]
  24. Mejri, N.; Ben-Othman, J.; Hamdi, M. Survey on VANET security challenges and possible cryptographic solutions. Veh. Commun. 2014, 1, 53–66. [Google Scholar] [CrossRef]
  25. Mouftah, H.T.; Erol-Kantarci, M.; Sorour, S. (Eds.) Connected and Autonomous Vehicles in Smart Cities, 1st ed.; CRC Press: Boca Raton, FL, USA, 2020. [Google Scholar] [CrossRef]
  26. Kuutti, S.; Fallah, S.; Katsaros, K.; Dianati, M.; Mccullough, F.; Mouzakitis, A. A Survey of the State-of-the-Art Localization Techniques and Their Potentials for Autonomous Vehicle Applications. IEEE Internet Things J. 2018, 5, 829–846. [Google Scholar] [CrossRef]
  27. Minerva, R.; Biru, A.; Rotondi, D. Towards a Definition of the Internet of Things (IoT). IEEE Internet Initiat. 2015, 1, 1–86. [Google Scholar]
  28. Dua, A.; Kumar, N.; Bawa, S. A systematic review on routing protocols for Vehicular Ad Hoc Networks. Veh. Commun. 2014, 1, 33–52. [Google Scholar] [CrossRef]
  29. Liu, K.; Ng, J.K.Y.; Lee, V.C.S.; Son, S.H.; Stojmenovic, I. Cooperative data scheduling in hybrid vehicular ad hoc networks: VANET as a software defined network. IEEE/ACM Trans. Netw. 2016, 24, 1759–1773. [Google Scholar] [CrossRef]
  30. Chahal, M.; Harit, S.; Mishra, K.K.; Sangaiah, A.K.; Zheng, Z. A Survey on software-defined networking in vehicular ad hoc networks: Challenges, applications and use cases. Sustain. Cities Soc. 2017, 35, 830–840. [Google Scholar] [CrossRef]
  31. Wang, J.; Shao, Y.; Ge, Y.; Yu, R. A Survey of Vehicle to Everything (V2X) Testing. Sensors 2019, 19, 334. [Google Scholar] [CrossRef] [Green Version]
  32. 5G Americas. Cellular V2X Communications Towards 5G. March 2018. Available online: http://www.5gamericas.org/en/resources/white-papers/ (accessed on 12 June 2022).
  33. White Paper of Internet of Vehicles (IoV). Available online: http://mddb.apec.org/Documents/2014/TEL/TEL50-PLEN/14_tel50_plen_020.pdf (accessed on 4 June 2022).
  34. Kong, Q.; Lu, R.; Ma, M.; Bao, H. A privacy-preserving sensory data sharing scheme in Internet of Vehicles. Future Gener. Comput. Syst. 2019, 92, 644–655. [Google Scholar] [CrossRef]
  35. Sun, X.; Yu, F.R.; Zhang, P.; Xie, W.; Peng, X. A Survey on Secure Computation Based on Homomorphic Encryption in Vehicular Ad Hoc Networks. Sensors 2020, 20, 4253. [Google Scholar] [CrossRef] [PubMed]
  36. Langley, D.J.; van Doorn, J.; Ng, I.C.L.; Stieglitz, S.; Lazovik, A.; Boonstra, A. The Internet of Everything: Smart things and their impact on business models. J. Bus. Res. 2021, 122, 853–863. [Google Scholar] [CrossRef]
  37. Arooj, A.; Farooq, M.S.; Akram, A.; Iqbal, R.; Sharma, A.; Dhiman, G. Big Data Processing and Analysis in Internet of Vehicles: Architecture, Taxonomy, and Open Research Challenges. Arch. Comput. Methods Eng. 2022, 29, 793–829. [Google Scholar] [CrossRef]
  38. Lyamin, N.; Kleyko, D.; Delooz, Q.; Vinel, A. AI-Based Malicious Network Traffic Detection in VANETs. IEEE Netw. 2018, 32, 15–21. [Google Scholar] [CrossRef]
  39. Keshari, N.; Singh, D.; Maurya, A.K. A survey on Vehicular Fog Computing: Current state-of-the-art and future directions. Veh. Commun. 2022, 38, 100512. [Google Scholar] [CrossRef]
  40. Zhang, L. Key Management Scheme for Secure Channel Establishment in Fog Computing. IEEE Trans. Cloud Comput. 2021, 9, 1117–1128. [Google Scholar] [CrossRef]
  41. Mo, T.; Lau, K.-T.; Li, Y.; Poon, C.-k.; Wu, Y.; Chu, P.K.; Luo, Y. Commercialization of Electric Vehicles in Hong Kong. Energies 2022, 15, 942. [Google Scholar] [CrossRef]
  42. Garg, S.; Mehrotra, D.; Pandey, H.M.; Pandey, S. Accessible review of internet of vehicle models for intelligent transportation and research gaps for potential future directions. Peer-to-Peer Netw. Appl. 2021, 14, 978–1005. [Google Scholar] [CrossRef]
  43. Sakai, K. Japan perspective. In Smart Sensing for Traffic Monitoring; Ozaki, N., Ed.; The Institution of Engineering and Technology: Herts, UK, 2021. [Google Scholar]
  44. Ishikawa, H.; Yamauchi, Y.; Mizouchi, K. Vehicle detection at intersection by LIDAR system. In Smart Sensing for Traffic Monitoring; Ozaki, N., Ed.; The Institution of Engineering and Technology: Herts, UK, 2021. [Google Scholar]
  45. Lu, N.; Cheng, N.; Zhang, N.; Shen, X.; Mark, J.W. Connected vehicles: Solutions and challenges. IEEE Internet Things J. 2014, 1, 289–299. [Google Scholar] [CrossRef]
  46. Sadiku, M.N.O.; Tembely, M.; Musa, S.M. Internet of Vehicles: An Introduction. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2018, 8, 11–13. [Google Scholar] [CrossRef] [Green Version]
  47. Fadhil, J.A.; Sarhan, Q.I. Internet of Vehicles (IoV): A Survey of Challenges and Solutions. In Proceedings of the 2020 21st International Arab Conference on Information Technology (ACIT), Muscat, Oman, 28–30 November 2020; pp. 1–10. [Google Scholar] [CrossRef]
  48. Alam, K.M.; Saini, M.; El Saddik, A.E. Toward social internet of vehicles: Concept, architecture, and applications. IEEE Access 2015, 3, 343–357. [Google Scholar] [CrossRef]
  49. Wu, L.; Zhang, R.; Li, Q.; Ma, C.; Shi, X. A mobile edge computing-based applications execution framework for Internet of Vehicles. Front. Comput. Sci. 2022, 16, 165506. [Google Scholar] [CrossRef]
  50. Richter, A.; Löwner, M.O.; Ebendt, R.; Scholz, M. Towards an integrated urban development considering novel intelligent transportation systems: Urban Development Considering Novel Transport. Technol. Forecast. Soc. Chang. 2020, 155, 119970. [Google Scholar] [CrossRef]
  51. Internet of Vehicles (IoV). Available online: https://www.techtarget.com/whatis/definition/Internet-of-Vehicles (accessed on 2 December 2020).
  52. Chen, C.; Quan, S. Review Article A Summary of Security Techniques-Based Blockchain in IoV. Secur. Commun. Netw. 2022, 2022, 8689651. [Google Scholar] [CrossRef]
  53. Latif, M.B.; Liu, F.; Liu, K. A TDMA-Based MAC Protocol for Mitigating Mobility-Caused Packet Collisions in Vehicular Ad Hoc Networks. Sensors 2022, 22, 643. [Google Scholar] [CrossRef]
  54. Huang, J.; Xu, C.; Ji, Z.; Xiao, S.; Liu, T.; Ma, N.; Zhou, Q. Research Article AFLPC: An Asynchronous Federated Learning Privacy-Preserving Computing Model Applied to 5G-V2X. Secur. Commun. Netw. 2022, 2022, 9334943. [Google Scholar] [CrossRef]
  55. Wu, H.; Liu, Q.; Liu, Q.; Zhang, Y.; Yang, Z. An edge-assisted cloud framework using a residual concatenate FCN approach to beam correction in the internet of weather radars. World Wide Web 2022, 25, 1923–1949. [Google Scholar] [CrossRef]
  56. Yin, D.; Gong, B. Auto-Adaptive Trust Measurement Model Based on Multidimensional Decision-Making Attributes for Internet of Vehicles. Wirel. Commun. Mob. Comput. 2022, 2022, 3537771. [Google Scholar] [CrossRef]
  57. Tomar, A.; Tripathi, S. BCAV: Blockchain-based certificateless authentication system for vehicular network. Peer-to-Peer Netw. Appl. 2022, 15, 1733–1756. [Google Scholar] [CrossRef]
  58. Shah, K.; Chadotra, S.; Tanwar, S.; Gupta, R.; Kumar, N. Blockchain for IoV in 6G environment: Review solutions and challenges. Cluster Comput. 2022, 25, 1927–1955. [Google Scholar] [CrossRef]
  59. Liu, Y.; Liu, J.; Liu, T.; He, X. BSS-ITS: Blockchain Scaling Scheme with Sharding for Intelligent Transportation System. Scale Blockchain for Better Data Exchange and Storage with Full Sharding for Intelligent Transportation System. In Proceedings of the ICBTA 2021, Xi’an, China, 17–19 December 2021; pp. 128–134. [Google Scholar]
  60. Evariste, T.; Rwigema, J.; Datta, R. Design and Deployment of Vehicular Internet of Things for Smart City Applications. Sustainability 2022, 14, 176. [Google Scholar] [CrossRef]
  61. Kakkavas, G.; Diamanti, M.; Stamou, A.; Karyotis, V.; Bouali, F.; Pinola, J.; Apilo, O.; Papavassiliou, S.; Moessner, K. Design, Development, and Evaluation of 5G-Enabled Vehicular Services: The 5G-HEART Perspective. Sensors 2022, 22, 426. [Google Scholar] [CrossRef] [PubMed]
  62. Xu, W.; Li, N.; Liang, W.; Liu, H. Research Article Dissipation Characteristics of Vehicle Queue in V2X Environment Based on Improved Car-Following Model. Math. Probl. Eng. 2022, 2022, 8281919. [Google Scholar] [CrossRef]
  63. Shiny, G.S.; Kumar, B.M. E2IA-HWSN: Energy Efficient Dual Intelligent Agents based Data Gathering and Emergency Event Delivery in Heterogeneous WSN Enabled IoT. Wirel. Pers. Commun. 2022, 122, 379–408. [Google Scholar] [CrossRef]
  64. Ullah, S.; Khan, M.A.; Ahmad, J.; Jamal, S.S.; e Huma, Z.; Hassan, M.T.; Pitropakis, N.; Arshad; Buchanan, W.J. HDL-IDS: A Hybrid Deep Learning Architecture for Intrusion Detection in the Internet of Vehicles. Sensors 2022, 22, 1340. [Google Scholar] [CrossRef] [PubMed]
  65. Smida, K.; Tounsi, H.; Frikha, M. Intelligent and resizable control plane for software defined vehicular network: A deep reinforcement learning approach. Telecommun. Syst. 2022, 79, 163–180. [Google Scholar] [CrossRef]
  66. Wang, Y.; Wang, X.; Huang, Z.; Li, W.; Xu, S. Joint optimization of dynamic resource allocation and packet scheduling for virtual switches in cognitive internet of vehicles. EURASIP J. Adv. Signal Process. 2022, 2022, 32. [Google Scholar] [CrossRef]
  67. Pachala, S.; Rupa, C.; Sumalatha, L. l−PEES-IMP: Lightweight proxy re-encryption-based identity management protocol for enhancing privacy over multi-cloud environment. Autom. Softw. Eng. 2022, 29, 4. [Google Scholar] [CrossRef]
  68. Khan, S.; Shah, I.A.; Tairan, N.; Shah, H.; Nadeem, M.F. Optimal Resource Allocation in Fog Computing for Healthcare Applications. Comput. Mater. Contin. 2022, 71, 6147–6163. [Google Scholar] [CrossRef]
  69. Yuan, Z.; Wu, T.; Wang, Q.; Yang, Y.; Li, L.; Zhang, L. T3 OMVP: A Transformer-Based Time and Team Reinforcement Learning Scheme for Observation-Constrained MultiVehicle Pursuit in Urban Area. Electronics 2022, 11, 1339. [Google Scholar] [CrossRef]
  70. Bhabani, B.; Mahapatro, J. ReUse: Reliable and efficient RSU-enabled relay vehicle selection using harmony search and EDAS for message dissemination in VANETs. Ad Hoc Netw. 2022, 137, 102985. [Google Scholar] [CrossRef]
  71. Zhang, L.; Zhou, W.; Xia, J.; Ou, J. DQN-based mobile edge computing for smart Internet of vehicle. EURASIP J. Adv. Signal Process. 2022, 2022, 45. [Google Scholar] [CrossRef]
  72. You, K.; Peng, G.; Ding, L.; Dou, Q.; Wu, Z.; Zhou, C. Smart T-box of unmanned earthwork machinery for Internet of Vehicles. Autom. Constr. 2022, 144, 104589. [Google Scholar] [CrossRef]
  73. Sellami, B.; Hakiri, A.; Yahiac, S.B. Deep Reinforcement Learning for energy-aware task offloading in join SDN-Blockchain 5G massive IoT edge network. Future Gener. Comput. Syst. 2022, 137, 363–379. [Google Scholar] [CrossRef]
  74. Peng, H.; Dong, L.; Sun, Y.; Jiang, Y. Analysis of Marketing Prediction Model Based on Genetic Neural Network: Taking Clothing Marketing as an Example. J. Math. 2022, 2022, 8743568. [Google Scholar] [CrossRef]
  75. Jamalzadeh, M.; Maadani, M.; Mahdavi, M. EC-MOPSO: An edge computing-assisted hybrid cluster and MOPSO-based routing protocol for the Internet of Vehicles. Ann. Telecommun. 2022, 77, 491–503. [Google Scholar] [CrossRef]
  76. Li, Q.; Wu, H.; Wu, X.; Zhao, N.; Dong, L. A Road Truncation-Based Location Privacy-Preserving Method against Side-Weight Inference Attack. Appl. Sci. 2022, 12, 1107. [Google Scholar] [CrossRef]
  77. Hemavathi; Akhila, S.R.; Alotaibi, Y.; Khalaf, O.I.; Alghamdi, S. Authentication and Resource Allocation Strategies during Handoff for 5G IoVs Using Deep Learning. Energies 2022, 15, 2006. [Google Scholar] [CrossRef]
  78. Gurumoorthi, E.; Ayyasamy, A. Performance analysis of Geocast based location aided routing using Cache agent in VANET. Int. J. Inf. Technol. 2022, 14, 125–134. [Google Scholar] [CrossRef]
  79. Zhang, L.; Zhong, W.; Zhang, J.; Lin, Z.; Yang, Z.; Wang, J. mmWave Beam Tracking for V2I Communication Systems Based on Spectrum Environment Awareness. Symmetry 2022, 14, 677. [Google Scholar] [CrossRef]
  80. Wang, M.; Chen, T.; Du, F.; Wang, J.; Yin, G.; Zhang, Y. Research on adaptive beacon message transmission power in VANETs. J. Ambient. Intell. Humaniz. Comput. 2022, 13, 1307–1319. [Google Scholar] [CrossRef]
  81. Chen, X.; Jin, Z.; Zhang, Q.; Li, P.; Zhang, S.; Sun, J.; Tian, X.; Wang, Y.; Zhang, J. Research on Automatic Driving Simulation Test System Based on Digital Twin. J. Phys. Conf. Ser. 2022, 2170, 012039. [Google Scholar] [CrossRef]
  82. Khasawneh, A.M.; Helou, M.A.; Khatri, A.; Aggarwal, G.; Kaiwartya, O.; Altalhi, M.; Abu-ulbeh, W.; AlShboul, R. Service-Centric Heterogeneous Vehicular Network Modeling for Connected Traffic Environments. Sensors 2022, 22, 1247. [Google Scholar] [CrossRef] [PubMed]
  83. González-Saavedra, J.F.; Figueroa, M.; Céspedes, S.; Montejo-Sánchez, S. Survey of Cooperative Advanced Driver Assistance Systems: From a Holistic and Systemic Vision. Sensors 2022, 22, 3040. [Google Scholar] [CrossRef]
  84. Zhu, C.; Ye, D.; Zhu, T.; Zhou, W. Time-optimal and privacy preserving route planning for carpool policy. World Wide Web 2022, 25, 1151–1168. [Google Scholar] [CrossRef]
  85. Xie, H.; Zhu, J.; Duan, H. Research Article Analysis of the Relationship between the Density and Lane-Changing Behavior of Circular Multilane Urban Expressway in Mixed Traffic. J. Adv. Transp. 2022, 2022, 4499477. [Google Scholar] [CrossRef]
  86. Dhanare, R.; Nagwanshi, K.K.; Varma, S. Enhancing the Route Optimization Using Hybrid MAF Optimization Algorithm for the Internet of Vehicle. Wirel. Pers. Commun. 2022, 125, 1715–1735. [Google Scholar] [CrossRef]
  87. Guerna, A.; Bitam, S.; Calafate, C.T. Roadside Unit Deployment in Internet of Vehicles Systems: A Survey. Sensors 2022, 22, 3190. [Google Scholar] [CrossRef]
  88. Wang, L.; Li, H.; Guo, M.; Chen, Y. The Effects of Dynamic Complexity on Drivers’ Secondary Task Scanning Behavior under a Car-Following Scenario. Int. J. Environ. Res. Public Health 2022, 19, 1881. [Google Scholar] [CrossRef]
  89. Bustamante-Bello, R.; García-Barba, A.; Arce-Saenz, L.A.; Curiel-Ramirez, L.A.; Izquierdo-Reyes, J.; Ramirez-Mendoza, R.A. Visualizing Street Pavement Anomalies through Fog Computing V2I Networks and Machine Learning. Sensors 2022, 22, 456. [Google Scholar] [CrossRef]
  90. Lu, Y.; Wang, X.; Yi, B.; Huang, M. The reliable routing for software-defined vehicular networks towards beyond 5G. Peer-to-Peer Netw. Appl. 2022, 15, 134–148. [Google Scholar] [CrossRef]
  91. Dai, F.; Liu, G.; Mo, Q.; Xu, W.H.; Huang, B. Task offloading for vehicular edge computing with edge-cloud cooperation. World Wide Web 2022, 25, 1999–2017. [Google Scholar] [CrossRef]
  92. Seng, K.P.; Ang, L.M.; Ngharamike, E. Artificial intelligence Internet of Things: A new paradigm of distributed sensor networks. Int. J. Distrib. Sens. Netw. 2022, 18, 15501477211062835. [Google Scholar] [CrossRef]
  93. Mir, M.; Yaghoobi, M.; Khairabadi, M. A new approach to energy-aware routing in the Internet of Things using improved Grasshopper Metaheuristic Algorithm with Chaos theory and Fuzzy Logic. Multimed. Tools Appl. 2022, 82, 5133–5159. [Google Scholar] [CrossRef]
  94. Khezri, E.; Zeinali, E.; Sargolzaey, H. A Novel Highway Routing Protocol in Vehicular Ad Hoc Networks Using VMaSC-LTE and DBA-MAC Protocols. Wirel. Commun. Mob. Comput. 2022, 2022, 1680507. [Google Scholar] [CrossRef]
  95. Safara, F.; Souri, A.; Baker, T.; Al Ridhawi, I.; Aloqaily, M. A priority-based energy-efficient routing method for IoT systems. J. Supercomput. 2020, 76, 8609–8626. [Google Scholar] [CrossRef]
  96. Li, H.; Ou, D.; Rasheed, I.; Tu, M. Research Article A Software-Defined Networking Roadside Unit Cloud Resource Management Framework for Vehicle Ad Hoc Networks. J. Adv. Transp. 2022, 2022, 5918128. [Google Scholar] [CrossRef]
  97. Guan, Z.; Wang, Y.; He, M. Deep Reinforcement Learning-Based Spectrum Allocation Algorithm in Internet of Vehicles Discriminating Services. Appl. Sci. 2022, 12, 1764. [Google Scholar] [CrossRef]
  98. Pereira, P.; Melo, C.; Araujo, J.; Dantas, J.; Santos, V.; Maciel, P. Availability model for edge-fog-cloud continuum: An evaluation of an end-to-end infrastructure of intelligent traffic management service. J. Supercomput. 2022, 78, 4421–4448. [Google Scholar] [CrossRef]
  99. Hasan, M.K.; Alkhalifah, A.; Islam, S.; Babiker, N.B.M.; Habib, A.K.M.A.; Mohd Aman, A.H.; Hossain, M.A. Blockchain Technology on Smart Grid, Energy Trading, and Big Data: Security Issues, Challenges, and Recommendations. Wirel. Commun. Mob. Comput. 2022, 2022, 9065768. [Google Scholar] [CrossRef]
  100. Zhu, Y.; Li, X.; Liu, Q.; Li, Q.; Xu, Y. A comprehensive review of energy management strategies for hybrid electric vehicles. Mech. Sci. 2022, 13, 147–188. [Google Scholar] [CrossRef]
  101. Alsaawy, Y.; Alkhodre, A.; Abi Sen, A.; Alshanqiti, A.; Bhat, W.A.; Bahbouh, N.M. A Comprehensive and Effective Framework for Traffic Congestion Problem Based on the Integration of IoT and Data Analytics. Appl. Sci. 2022, 12, 2043. [Google Scholar] [CrossRef]
  102. Ang, L.M.; Seng, K.P.; Ijemaru, G.K.; Zungeru, A.M. Deployment of IoV for smart cities: Applications, architecture, and challenges. IEEE Access 2018, 7, 6473–6492. [Google Scholar] [CrossRef]
  103. Salih, K.O.M.; Rashid, T.A.; Radovanovic, D.; Bacanin, N. A Comprehensive Survey on the Internet of Things with the Industrial Marketplace. Sensors 2022, 22, 730. [Google Scholar] [CrossRef]
  104. Tan, L.; Wang, N. Future Internet: The Internet of Things. In Proceedings of the 3rd International Conference on Advanced Computer Theory and Engineering, ICACTE 2010, Chengdu, China, 20–22 August 2010; pp. V5-376–V5-380. [Google Scholar] [CrossRef]
  105. Kopelias, P.; Demiridi, E.; Vogiatzis, K.; Skabardonis, A.; Zafiropoulou, V. Connected & autonomous vehicles—Environmental impacts—A review. Sci. Total Environ. 2020, 712, 135237. [Google Scholar] [CrossRef]
  106. Sharma, N.; Habibullah, P.S. A Review of IoT Technology for the Connected Autonomous Vehicles Ecosystem. Trends Sci. 2022, 19, 3072. [Google Scholar] [CrossRef]
  107. Butt, T.A.; Iqbal, R.; Shah, S.C.; Umar, T. Social Internet of Vehicles: Architecture and enabling technologies. Comput. Electr. Eng. 2018, 69, 68–84. [Google Scholar] [CrossRef]
  108. Zhang, L.; Zhao, Z.; Wu, Q.; Zhao, H.; Xu, H.; Wu, X. Energy-aware dynamic resource allocation in UAV assisted mobile edge computing over social internet of vehicles. IEEE Access 2018, 6, 56700–56715. [Google Scholar] [CrossRef]
  109. Silva, R.; Iqbal, R. Ethical Implications of Social Internet of Vehicles Systems. IEEE Internet Things J. 2019, 6, 517–531. [Google Scholar] [CrossRef] [Green Version]
  110. Javaid, U.; Sikdar, B. A Secure and Scalable Framework for Blockchain Based Edge Computation Offloading in Social Internet of Vehicles. IEEE Trans. Veh. Technol. 2021, 70, 4022–4036. [Google Scholar] [CrossRef]
  111. Zhao, Y.; Liu, W.; Li, B.; Zhou, X.; Ning, Z.; Qiu, T.; Atiquzzaman, M. Entity and Sociality Trust-Aware Model for Content Distribution in Social Internet of Vehicles. IEEE Trans. Veh. Technol. 2022, 71, 12511–12522. [Google Scholar] [CrossRef]
  112. Howard, M.; Sparrow, R. When human beings are like drunk robots: Driverless vehicles, ethics, and the future of transport. Transp. Res. C Emerg. Technol. 2017, 80, 206–215. [Google Scholar] [CrossRef]
  113. Maglaras, L.A.; Al-Bayatti, A.H.; He, Y.; Wagner, I.; Janicke, H. Social Internet of Vehicles for Smart Cities. J. Sens. Actuator Netw. 2016, 5, 3. [Google Scholar] [CrossRef] [Green Version]
  114. Butt, T.A.; Iqbal, R.; Salah, K.; Aloqaily, M.; Jararweh, Y. Privacy Management in Social Internet of Vehicles: Review, Challenges and Blockchain Based Solutions. IEEE Access 2019, 7, 79694–79713. [Google Scholar] [CrossRef]
  115. Loscri, V.; Manzoni, O.; Nitti, M.; Ruggeri, G.; Vegni, A.M. A social internet of vehicles sharing SIoT relationships. In Proceedings of the MobiHoc 2019: Twentieth International Symposium on Mobile Ad Hoc Networking, Catania, Italy, 2–5 July 2019; Association for Computing Machinery: New York, NY, USA, 2019. [Google Scholar] [CrossRef]
  116. Eftekhari, S.A.; Nikooghadam, M.; Rafighi, M. Robust session key generation protocol for social internet of vehicles with enhanced security provision. J. Supercomput. 2021, 77, 2511–2544. [Google Scholar] [CrossRef]
  117. Khan, S.; Zhu, L.; Yu, X.; Zhang, Z.; Rahim, M.A.; Khan, M.; Du, X.; Guizani, M. Accountable credential management system for vehicular communication. Veh. Commun. 2020, 25, 100279. [Google Scholar] [CrossRef]
  118. Li, Y.; Tao, X.; Zhang, X.; Xu, J.; Wang, Y.; Xia, W. A DAG-based reputation mechanism for preventing peer disclosure in SIoV. IEEE Internet Things J. 2022, 9, 24095–24106. [Google Scholar] [CrossRef]
  119. García-Magariño, I.; Sendra, S.; Lacuesta, R.; Lloret, J. Security in vehicles with iot by prioritization rules, vehicle certificates and trust management. IEEE Int. Things J. 2019, 6, 5927–5934. [Google Scholar] [CrossRef]
  120. Lin, K.; Li, C.; Fortino, G.; Rodrigues, J.J. Vehicle route selection based on game evolution in social internet of vehicles. IEEE Int. Things J. 2018, 5, 2423–2430. [Google Scholar] [CrossRef]
  121. Tang, C.; Wei, X.; Liu, C.; Jiang, H.; Wu, H.; Li, Q. UAV-enabled social internet of vehicles: Roles, security issues and use cases. In Proceedings of the Security and Privacy in Social Networks and Big Data: 6th International Symposium, SocialSec 2020, Tianjin, China, 26–27 September 2020; Springer: Singapore, 2020; pp. 153–163. [Google Scholar] [CrossRef]
  122. Atzori, L.; Iera, A.; Morabito, G.; Nitti, M. The social internet of things (SIoT) when social networks meet the internet of things: Concept, architecture and network characterization. Comput. Netw. 2012, 56, 3594–3608. [Google Scholar] [CrossRef]
  123. Hussain, R.; Kim, D.; Son, J.; Lee, J.; Kerrache, C.A.; Benslimane, A.; Oh, H. Secure and Privacy-Aware Incentives-Based Witness Service in Social Internet of Vehicles Clouds. IEEE Internet Things J. 2018, 5, 2441–2448. [Google Scholar] [CrossRef]
  124. Jain, B.; Brar, G.; Malhotra, J.; Rani, S.; Ahmed, S.H. A cross layer protocol for traffic management in social internet of vehicles. Future Gener. Comput. Syst. 2018, 82, 707–714. [Google Scholar] [CrossRef]
  125. Raza, N.; Jabbar, S.; Han, J.; Han, K. Social Vehicle-To-Everything (V2X) communication model for Intelligent Transportation Systems based on 5G scenario. ACM Int. Conf. Proceeding Ser. 2018, 54, 1–8. [Google Scholar] [CrossRef]
  126. Zualkernan, I.A.; Aloul, F.; Al Qasimi, S.; AlShamsi, A.; Al Marashda, M.; Ahli, A. DigiMesh-based Social Internet of Vehicles (SIoV) for Driver Safety. In Proceedings of the 2018 International Symposium in Sensing and Instrumentation in IoT Era, ISSI 2018, Shanghai, China, 6–7 September 2018; IEEE: Piscataway, NJ, USA, 2018; p. 8538167. [Google Scholar] [CrossRef]
  127. Wang, T.; Hussain, A.; Zhang, L.; Zhao, C. Collaborative Edge Computing for Social Internet of Vehicles to Alleviate Traffic Congestion. IEEE Trans. Comput. Soc. Syst. 2022, 9, 184–196. [Google Scholar] [CrossRef]
  128. Roopa, M.S.; Ayesha Siddiq, S.; Buyya, R.; Venugopal, K.R.; Iyengar, S.S.; Patnaik, L.M. Dynamic traffic congestion management in Social Internet of Vehicles (SIoV). Internet Things 2021, 16, 100311. [Google Scholar] [CrossRef]
  129. Tang, C.; Wu, H. Reputation-based service provisioning for vehicular fog computing. J. Syst. Archit. 2022, 131, 102735. [Google Scholar] [CrossRef]
  130. Jennath, H.S.; Asharaf, S. Reputation management in vehicular network using blockchain. Peer-to-Peer Netw. Appl. 2022, 15, 901–920. [Google Scholar] [CrossRef]
  131. Ochoa-Zambrano, J.; Garbajosa, J. Social Internet of Things: Architectural Approaches and Challenges. In Proceedings of the Actas de las 24th Jornadas de Ingenieria del Software y Bases de Datos, JISBD 2019, Caceres, Spain, 2–4 September 2019. [Google Scholar]
  132. Kehal, M.; Zhang, Z. Social internet of vehicles: An epistemological and systematic perspective. Library Hi Tech 2020, 38, 221–231. [Google Scholar] [CrossRef]
  133. Kerrache, C.A.; Lagraa, N.; Hussain, R.; Ahmed, S.H.; Benslimane, A.; Calafate, C.T.; Cano, J.-C.; Vegni, A.M. TACASHI: Trust-Aware Communication Architecture for Social Internet of Vehicles. IEEE Internet Things J. 2019, 6, 5870–5877. [Google Scholar] [CrossRef]
  134. Xia, Z.; Mao, X.; Gu, K.; Jia, W.J. Dual-Mode Data Forwarding Scheme Based on Interest Tags for Fog Computing-based SIoVs. IEEE Trans. Netw. Serv. Manag. 2022, 19, 2780–2797. [Google Scholar] [CrossRef]
  135. Xia, Z.; Mao, X.; Gu, K.; Jia, W. Two-Dimensional Behavior-Marker-Based Data Forwarding Incentive Scheme for Fog-Computing-Based SIoVs. IEEE Trans. Comput. Soc. Syst. 2022, 9, 1406–1418. [Google Scholar] [CrossRef]
  136. Ruan, Z.; Liang, W.; Luo, H.; Yan, H. A novel data sharing mechanism via cloud-based dynamic audit for social internet of vehicles. In Proceedings of the Internet of Vehicles-Safe and Intelligent Mobility: Second International Conference, IOV 2015, Chengdu, China, 19–21 December 2015; pp. 78–88. [Google Scholar] [CrossRef]
  137. Nitti, M.; Girau, R.; Floris, A.; Atzori, L. On adding the social dimension to the Internet of Vehicles: Friendship and middleware. In Proceedings of the 2014 IEEE International Black Sea Conference on Communications and Networking, BlackSeaCom 2014, Chişinău, Moldova, 27–30 May 2014; pp. 134–138. [Google Scholar] [CrossRef]
  138. Wang, X.; Ning, Z.; Hu, X.; Ngai, E.C.-H.; Wang, L.; Hu, B.; Kwok, R.Y.K. A City-Wide Real-Time Traffic Management System: Enabling Crowdsensing in Social Internet of Vehicles. IEEE Commun. Mag. 2018, 56, 19–25. [Google Scholar] [CrossRef] [Green Version]
  139. Zhao, P.-C.; Huang, Y.-H.; Zhang, D.-X.; Xing, L.; Wu, H.-H.; Gao, J.-P. CCP-federated deep learning based on user trust chain in social IoV. Wirel. Netw. 2022, 2022, 1–12. [Google Scholar] [CrossRef]
  140. Li, Y.; Cao, B.; Peng, M.; Zhang, L.; Zhang, L.; Feng, D.; Yu, J. Direct Acyclic Graph-Based Ledger for Internet of Things: Performance and Security Analysis. IEEE/ACM Trans. Netw. 2020, 28, 1643–1656. [Google Scholar] [CrossRef]
  141. Zhao, P.; Huang, Y.; Gao, J.; Xing, L.; Wu, H.; Ma, H. Federated Learning-Based Collaborative Authentication Protocol for Shared Data in Social IoV. IEEE Sens. J. 2022, 22, 7385–7398. [Google Scholar] [CrossRef]
  142. Kong, X.; Gao, H.; Shen, G.; Duan, G.; Das, S.K. FedVCP: A Federated-Learning-Based Cooperative Positioning Scheme for Social Internet of Vehicles. IEEE Trans. Comput. Soc. Syst. 2022, 9, 197–206. [Google Scholar] [CrossRef]
  143. Jia, X.; Xing, L.; Gao, J.; Wu, H. A Survey of Location Privacy Preservation in Social Internet of Vehicles. IEEE Access 2020, 8, 201966–201984. [Google Scholar] [CrossRef]
  144. Xing, L.; Jia, X.; Gao, J.; Wu, H. A Location Privacy Protection Algorithm Based on Double K-Anonymity in the Social Internet of Vehicles. IEEE Commun. Lett. 2021, 25, 3199–3203. [Google Scholar] [CrossRef]
  145. Li, Z.; Miao, Q.; Chaudhry, S.A.; Chen, C.-M. A provably secure and lightweight mutual authentication protocol in fog-enabled social Internet of vehicles. Int. J. Distrib. Sens. Netw. 2022, 18, 15501329221104332. [Google Scholar] [CrossRef]
  146. Wu, T.Y.; Guo, X.; Yang, L.; Meng, Q.; Chen, C.-M. A lightweight authenticated key agreement protocol using fog nodes in social Internet of vehicles. Mob. Inf. Syst. 2021, 2021, 3277113. [Google Scholar] [CrossRef]
  147. Chen, P.-Y.; Cheng, S.-M.; Sung, M.-H. Analysis of Data Dissemination and Control in Social Internet of Vehicles. IEEE Internet Things J. 2018, 5, 2466–2477. [Google Scholar] [CrossRef]
  148. Kumar, N.; Chaudhry, R.; Kaiwartya, O.; Kumar, N.; Ahmed, S.H. Green Computing in Software Defined Social Internet of Vehicles. IEEE Trans. Intell. Transp. Syst. 2021, 22, 3644–3653. [Google Scholar] [CrossRef]
  149. Kumar, T.A.; Rajmohan, R.; Julie, E.G.; Robinson, Y.H.; Vimal, S.; Kadry, S. Reinforced resource management in vehicular fog computing using deep beacon power control protocol. Int. J. Web Grid Serv. 2021, 17, 371–388. [Google Scholar] [CrossRef]
  150. Gulati, A.; Aujla, G.S.; Chaudhary, R.; Kumar, N.; Obaidat, M.S.; Benslimane, A. DiLSe: Lattice-Based Secure and Dependable Data Dissemination Scheme for Social Internet of Vehicles. IEEE Trans. Dependable Secur. Comput. 2021, 18, 2520–2534. [Google Scholar] [CrossRef]
  151. Liu, Y.; Xiong, Z.; Hu, Q.; Niyato, D.; Zhang, J.; Miao, C.; Leung, C.; Tian, Z. VRepChain: A Decentralized and Privacy-preserving Reputation System for Social Internet of Vehicles Based on Blockchain. IEEE Trans. Veh. Technol. 2022, 71, 13242–13253. [Google Scholar] [CrossRef]
  152. Bao, Y.; Qiu, W.; Cheng, X.; Sun, J. Fine-Grained Data Sharing with Enhanced Privacy Protection and Dynamic Users Group Service for the IoV. IEEE Trans. Intell. Transp. Syst. 2022, 2022, 3187980. [Google Scholar] [CrossRef]
  153. Al Zamil, M.G.; Samarah, S.; Rawashdeh, M.; Hossain, M.S.; Alhamid, M.F.; Guizani, M.; Alnusair, A. False-Alarm Detection in the Fog-Based Internet of Connected Vehicles. IEEE Trans. Veh. Technol. 2019, 68, 7035–7044. [Google Scholar] [CrossRef]
  154. Qian, Y.; Chen, M.; Chen, J.; Hossain, M.S.; Alamri, A. Secure enforcement in cognitive Internet of Vehicles. IEEE Internet Things J. 2018, 5, 1242–1250. [Google Scholar] [CrossRef]
  155. Alotaibi, J.; Alazzawi, L. PPIoV: A privacy preserving-based framework for IoV-fog environment using federated learning and blockchain. In Proceedings of the 2022 IEEE World AI IoT Congress, AIIoT 2022, Seattle, DC, USA, 6–9 June 2022; pp. 597–603. [Google Scholar] [CrossRef]
  156. Campanile, L.; Iacono, M.; Marulli, F.; Mastroianni, M. Designing a GDPR compliant blockchain-based IoV distributed information tracking system. Inf. Process. Manag. 2021, 58, 102511. [Google Scholar] [CrossRef]
  157. Wu, X.; Xu, X.; Bilal, M. Towards privacy protection composition framework on internet of vehicles. IEEE Consum. Electron. Mag. 2021, 11, 32–38. [Google Scholar] [CrossRef]
  158. Kim, S.-K. Enhanced IoV Security Network by Using Blockchain Governance Game. Mathematics 2021, 9, 109. [Google Scholar] [CrossRef]
  159. Abbas, S.; Talib, M.A.; Ahmed, A.; Khan, F.; Ahmad, S.; Kim, D.-H. Blockchain-Based Authentication in Internet of Vehicles: A Survey. Sensors 2021, 21, 7927. [Google Scholar] [CrossRef]
  160. Feng, X.; Li, C.; Chen, D.; Tang, J. A method for defensing against multi-source Sybil attacks in VANET. Peer-to-Peer Netw. Appl. 2017, 10, 305–314. [Google Scholar] [CrossRef] [Green Version]
  161. Xie, Y.; Wu, L.; Shen, J.; Alelaiwi, A. EIAS-CP: New efficient identity-based authentication scheme with conditional privacy preserving for VANETs. Telecommun. Syst. 2017, 65, 229–240. [Google Scholar] [CrossRef]
  162. Biswas, S.; Misic, J. A cross-layer approach to privacy-preserving authentication in WAVE-enabled VANETs. IEEE Trans. Veh. Technol. 2013, 62, 2182–2192. [Google Scholar] [CrossRef]
  163. Sahraoui, Y.; Kerrache, C.A.; Korichi, A.; Vegni, A.M.; Amadeo, M. LearnPhi: A real-time learning model for early prediction of phishing attacks in IoV. In Proceedings of the IEEE Consumer Communications and Networking Conference, CCNC 2022, Virtual, 8–11 January 2022; pp. 252–255. [Google Scholar] [CrossRef]
  164. Kumar, A.; Das, D. SIoVChain: Efficient and secure blockchain based internet of vehicles (IoV). In Proceedings of the 23rd International Conference on Distributed Computing and Networking, Association for Computing Machinery International Conference Proceeding Series, Delhi, India, 4–7 January 2022; Association for Computing Machinery: New York, NY, USA, 2022; pp. 284–289. [Google Scholar] [CrossRef]
  165. Li, F.; Li, X.; Fu, Y.; Zhao, P.; Liu, S. A secure and privacy preserving incentive mechanism for vehicular crowdsensing with data quality assurance. In Proceedings of the IEEE Vehicular Technology Conference 2021, Virtual, 27 September–28 October 2021. [Google Scholar] [CrossRef]
  166. Bai, X.; Chen, S.; Shi, Y.; Liang, C.; Lv, X. Blockchain-based authentication and proof-of-reputation mechanism for trust data sharing in internet of vehicles. Ad-Hoc Sens. Wirel. Netw. 2022, 53, 85–113. [Google Scholar] [CrossRef]
  167. Hou, B.; Zhu, H.; Xin, Y.; Wang, J.; Yang, Y. MPoR: A modified consensus for blockchain-based internet of vehicles. Wirel. Commun. Mob. Comput. 2022, 2022, 1644851. [Google Scholar] [CrossRef]
  168. Zhang, J.; Wu, M. Blockchain-based authentication with optional privacy preservation for internet of vehicles. Math. Probl. Eng. 2021, 2021, 9954599. [Google Scholar] [CrossRef]
  169. Ma, Z.; Wang, L.; Zhao, W. Blockchain-driven trusted data sharing with privacy protection in IoT sensor network. IEEE Sens. J. 2021, 21, 25472–25479. [Google Scholar] [CrossRef]
  170. Liu, J.; Zhang, G.; Sun, R.; Du, X.; Guizani, M. A blockchain-based conditional privacy-preserving traffic data sharing in cloud. In Proceedings of the IEEE International Conference on Communications 2020, Virtual, 7–11 June 2020. [Google Scholar] [CrossRef]
  171. Firdaus, M.; Rahmadika, S.; Rhee, K. Decentralized trusted data sharing management on internet of vehicle edge computing (iovec) networks using consortium blockchain. Sensors 2021, 21, 2410. [Google Scholar] [CrossRef]
  172. Haddaji, A.; Ayed, S.; Chaari, L. Federated Learning with Blockchain Approach for Trust Management in IoV. In Advanced Information Networking and Applications. AINA 2022; Lecture Notes in Networks and Systems; Barolli, L., Hussain, F., Enokido, T., Eds.; Springer: Cham, Switzerland, 2022; Volume 449, pp. 411–423. [Google Scholar] [CrossRef]
  173. Shrivastava, A.L.; Dwivedi, R.K. A secure design of the smart vehicular IoT system using blockchain technology. In Proceedings of the 2022 9th International Conference on Computing for Sustainable Global Development, INDIACom 2022, New Delhi, India, 23–25 March 2022; pp. 616–620. [Google Scholar] [CrossRef]
  174. Gong, Y.; Feng, H.; Zhang, C. Research on the Development Strategy of the Internet of Vehicles. J. Phys. Conf. Ser. 2021, 1907, 012063. [Google Scholar] [CrossRef]
Figure 1. Allocation of ESG perspectives and related issues within the conceptual model of IoV systems. Source: the layer-based architecture of the IoV system based on [174].
Figure 1. Allocation of ESG perspectives and related issues within the conceptual model of IoV systems. Source: the layer-based architecture of the IoV system based on [174].
Energies 16 03208 g001
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Kostrzewski, M.; Marczewska, M.; Uden, L. The Internet of Vehicles and Sustainability—Reflections on Environmental, Social, and Corporate Governance. Energies 2023, 16, 3208. https://doi.org/10.3390/en16073208

AMA Style

Kostrzewski M, Marczewska M, Uden L. The Internet of Vehicles and Sustainability—Reflections on Environmental, Social, and Corporate Governance. Energies. 2023; 16(7):3208. https://doi.org/10.3390/en16073208

Chicago/Turabian Style

Kostrzewski, Mariusz, Magdalena Marczewska, and Lorna Uden. 2023. "The Internet of Vehicles and Sustainability—Reflections on Environmental, Social, and Corporate Governance" Energies 16, no. 7: 3208. https://doi.org/10.3390/en16073208

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop