Browse Definitions :
Definition

Internet of Vehicles (IoV)

The Internet of Vehicles (IoV) is a distributed network that supports the use of data created by connected cars and vehicular ad hoc networks (VANETs). An important goal of the IoV is to allow vehicles to communicate in real time with their human drivers, pedestrians, other vehicles, roadside infrastructure and fleet management systems.

The IoV supports five types of network communication:

Intra-Vehicle systems that monitor the vehicle's internal performance through On Board Units (OBUs).

Vehicle to Vehicle (V2V) systems that support the wireless exchange of information about the speed and position of surrounding vehicles.

Vehicle to Infrastructure (V2I) systems that support the wireless exchange of information between a vehicle and supporting roadside units (RSUs).

Vehicle to Cloud (V2C) systems that allow the vehicle to access additional information from the internet through application program interfaces (APIs).

Vehicle to Pedestrian (V2P) systems that support awareness for Vulnerable Road Users (VRUs) such as pedestrians and cyclists.

When discussed in the context of 5G and intelligent transport systems (ITS), the five types of networks mentioned above are sometimes referred to as Vehicle to Everything (V2X) communication.

Future of the IoV

According to a recent report by Allied Market Research, the global IoV market is expected to be over $200 billion by 2024 and several auto manufacturers, including BMW and Daimler, have announced programs to develop a platform that will connect IoV services like route management and smart parking with onboard infotainment centers.

Information technology (IT) vendors that are currently working with manufacturers and governing organizations to help build the Internet of Vehicles include Apple, Cisco, Google, IBM, Intel, Microsoft and SAP.

This was last updated in October 2018

Continue Reading About Internet of Vehicles (IoV)

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • email virus

    An email virus consists of malicious code distributed in email messages to infect one or more devices.

  • key fob

    A key fob is a small, programmable device that provides access to a physical object.

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • JBOD (just a bunch of disks)

    JBOD, which stands for 'just a bunch of disks,' is a type of multilevel configuration for disks.

  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

Close