Browse Definitions :
Definition

Internet of Vehicles (IoV)

The Internet of Vehicles (IoV) is a distributed network that supports the use of data created by connected cars and vehicular ad hoc networks (VANETs). An important goal of the IoV is to allow vehicles to communicate in real time with their human drivers, pedestrians, other vehicles, roadside infrastructure and fleet management systems.

The IoV supports five types of network communication:

Intra-Vehicle systems that monitor the vehicle's internal performance through On Board Units (OBUs).

Vehicle to Vehicle (V2V) systems that support the wireless exchange of information about the speed and position of surrounding vehicles.

Vehicle to Infrastructure (V2I) systems that support the wireless exchange of information between a vehicle and supporting roadside units (RSUs).

Vehicle to Cloud (V2C) systems that allow the vehicle to access additional information from the internet through application program interfaces (APIs).

Vehicle to Pedestrian (V2P) systems that support awareness for Vulnerable Road Users (VRUs) such as pedestrians and cyclists.

When discussed in the context of 5G and intelligent transport systems (ITS), the five types of networks mentioned above are sometimes referred to as Vehicle to Everything (V2X) communication.

Future of the IoV

According to a recent report by Allied Market Research, the global IoV market is expected to be over $200 billion by 2024 and several auto manufacturers, including BMW and Daimler, have announced programs to develop a platform that will connect IoV services like route management and smart parking with onboard infotainment centers.

Information technology (IT) vendors that are currently working with manufacturers and governing organizations to help build the Internet of Vehicles include Apple, Cisco, Google, IBM, Intel, Microsoft and SAP.

This was last updated in October 2018

Continue Reading About Internet of Vehicles (IoV)

SearchNetworking
  • network packet

    A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...

  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

SearchSecurity
  • data breach

    A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed or disclosed in an...

  • insider threat

    An insider threat is a category of risk posed by those who have access to an organization's physical or digital assets.

  • data compliance

    Data compliance is a process that identifies the applicable governance for data protection, security, storage and other ...

SearchCIO
  • data privacy (information privacy)

    Data privacy, also called information privacy, is an aspect of data protection that addresses the proper storage, access, ...

  • leadership skills

    Leadership skills are the strengths and abilities individuals demonstrate that help to oversee processes, guide initiatives and ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchHRSoftware
SearchCustomerExperience
  • recommerce

    Recommerce is the selling of previously owned items through online marketplaces to buyers who reuse, recycle or resell them.

  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

Close