You can view the full text of this article for free using the link below.

Title: Security analysis for intelligent urban freight transport

Authors: El Arbi Abdellaoui Alaoui; Mustapha El Moudden

Addresses: Department of Mathematics and Computer Science, Engineering School EIGSI-Casablanca, 282 Route of the Oasis, Casablanca, Morocco; Department of Computer Science, Faculty of Sciences and Technology, Moulay Ismail University, BP 509, Boutalamine – 52 000, Errachidia, Morocco ' Department of Mathematics and Computer Science, Faculty of Sciences, Moulay Ismail University, Meknes, Morocco

Abstract: The actual evolution of the traditional transport functions resulted from to the prominent digital revolution, the emergence of the internet of things (IoT), the use of intelligent transport systems (ITS) and the development of communication technologies. In fact, the development of the internet of things (IoT) and geo-localisation contributes significantly in the actual evolution, meanwhile allowing the emergence of new mobility services such as e-commerce, carpooling, car sharing and management vehicle fleet. Hence, impacting strongly the traditional economic means. In this context, one of the important obstacles to consider is the security. In this paper, we will analyse the interaction between selfish smart vehicles/parcels and malicious smart vehicles/parcels, that was formulated as a game model. As a result, we have calculated the Nash equilibrium and the utilities for the both selfish smart vehicles/parcels and malicious smart vehicles/parcels, evaluate the parameters that can maximise the selfish smart vehicles/parcels' utility when the smart parcels are transported by vehicles between different centres (shops, supermarket, ...) was planned and identify the potential malicious smart vehicles/parcels.

Keywords: intelligent transport system; ITS; smart city; smart parcel; internet of things; IoT; security; smart vehicle; game theory; Nash equilibrium.

DOI: 10.1504/IJIPSI.2019.103552

International Journal of Information Privacy, Security and Integrity, 2019 Vol.4 No.1, pp.49 - 64

Received: 16 Jun 2018
Accepted: 03 Feb 2019

Published online: 11 Nov 2019 *

Full-text access for editors Full-text access for subscribers Free access Comment on this article