Browse Definitions :
Definition

Internet of Vehicles (IoV)

The Internet of Vehicles (IoV) is a distributed network that supports the use of data created by connected cars and vehicular ad hoc networks (VANETs). An important goal of the IoV is to allow vehicles to communicate in real time with their human drivers, pedestrians, other vehicles, roadside infrastructure and fleet management systems.

The IoV supports five types of network communication:

Intra-Vehicle systems that monitor the vehicle's internal performance through On Board Units (OBUs).

Vehicle to Vehicle (V2V) systems that support the wireless exchange of information about the speed and position of surrounding vehicles.

Vehicle to Infrastructure (V2I) systems that support the wireless exchange of information between a vehicle and supporting roadside units (RSUs).

Vehicle to Cloud (V2C) systems that allow the vehicle to access additional information from the internet through application program interfaces (APIs).

Vehicle to Pedestrian (V2P) systems that support awareness for Vulnerable Road Users (VRUs) such as pedestrians and cyclists.

When discussed in the context of 5G and intelligent transport systems (ITS), the five types of networks mentioned above are sometimes referred to as Vehicle to Everything (V2X) communication.

Future of the IoV

According to a recent report by Allied Market Research, the global IoV market is expected to be over $200 billion by 2024 and several auto manufacturers, including BMW and Daimler, have announced programs to develop a platform that will connect IoV services like route management and smart parking with onboard infotainment centers.

Information technology (IT) vendors that are currently working with manufacturers and governing organizations to help build the Internet of Vehicles include Apple, Cisco, Google, IBM, Intel, Microsoft and SAP.

This was last updated in October 2018

Continue Reading About Internet of Vehicles (IoV)

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyber attackers and detect, deflect and study hacking attempts ...

  • spam trap

    A spam trap is an email address that is used to identify and monitor spam email.

  • cracker

    A cracker is someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close