IoV – the cutting edge of vehicle automation

Issue 6 2022 Integrated Solutions, Infrastructure, Transport (Industry), Logistics (Industry)


George Senzere.

Today’s vehicles have become, if you’d excuse the pun, computer-driven machines. Software forms a vital part of the entire manufacturing lifecycle, from production to testing to in-car navigation.

However, with each manufacturing milestone up to decommissioning, modern vehicles generate a significant amount of data. Plus, if, if you add the connected vehicle or rather its evolved version, the Internet of Vehicles (IoV), we are dealing with mountains of data that require seamless processing and storage.

The evolution

Today’s cars have become bona fide connected machines and not merely an extension of our mobile devices such as smartphones. And this connectivity has given way to intelligent vehicle networks that are drastically changing the landscape.

Vehicles feature a myriad of sensors which in turn generate huge amounts of data. These sensors are, for example, used to monitor safety, environmental parameters and traffic.

And now we are on the verge of yet another evolutionary step in transportation; the IoV is not only communicating information to the driver and manufacturer, but also other transport infrastructure. It is becoming a network of objects, people, vehicles and even smart city infrastructure.

Like the IoT, the IoV can, through intuitive technologies such as AI, anticipate a driver’s intent and provide communications and intelligence, realising a safer and optimised driving experience.

With the IoV comes extensive consumption of big data which then fuels valuable business evidence-based decisions. Interestingly, big data has undoubtedly formed a part of the evolution that has led to IoV.

To understand IoV, we have to look at the architecture. The IoV network is made up of three layers:

1.The bottom layer comprises sensors that measure and gather data such as driving patterns, detecting collisions, fuel consumption, braking and various other parameters. With wireless sensors like radio frequency identification (RFID), light detection and ranging (lidar) and radio detection and ranging (radar), the vehicles could map the environment three-dimensionally and calculate the relative positions of other objects in a vehicle’s vicinity.

2.The second layer includes various sensors that are connected to the sensor platform via fifth-generation mobile network (5G), Bluetooth, Wi-Fi, local area network (LAN) or wireless local area network (WLAN).

3.At the very top is the application layer. This is made up of embedded applications and/or others residing elsewhere on the network, like the cloud, the edge and in adjacent infrastructure.

Data navigates the IoV

IoV is all about data, whether real-time or historical. Translating this data results in valuable information to enable real-time decision-making, safety and to continue to fuel innovation.

Vehicle manufacturers must harness the value of data. In the IoV, opportunities will open for many other players. Those that will succeed will be able to connect everything that can be connected, gather the data, process it and draw real, meaningful insights from it. The infrastructure to collect this data is going to be key.

The bulk of the infrastructure needed for IoV will lean on industrial edge computing. Vehicle owners will have the convenience of being connected, avoid traffic congestion, and improved road safety without too many fatalities.

As for facility operators, this could be the dawn of intelligent traffic and parking management as well as vehicle tracking systems. Manufacturers, on the other hand, will not be left behind – industrial edge will enable them to become highly automated and benefit from connected and uninterrupted production systems that are fully in tune with customer needs and wants.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Data privacy best practices for physical security teams
Genetec Surveillance Integrated Solutions IoT & Automation
Physical security systems produce large amounts of information from video footage, access control records, and licence plate data. Recommendations assist organisations in safeguarding sensitive data, while ensuring effective security operations.

Read more...
Gallagher Security strengthens KwaZulu-Natal presence
Gallagher News & Events Integrated Solutions
Gallagher Security has reinforced its commitment to the KwaZulu-Natal region with its Command the Future event. The full-day event welcomed over 100 channel partners, end users, and consultants, marking Gallagher’s third major event in Durban.

Read more...
Driving down fleet management costs
Asset Management Transport (Industry) Logistics (Industry)
As we move into the latter part of the first quarter of 2026, businesses operating fleets can expect expenses to increase from the procurement stage through to termination, due to various local and international factors.

Read more...
Cloud security in visitor management and access control
SA Technologies Access Control & Identity Management Infrastructure Residential Estate (Industry) Commercial (Industry)
Cloud has become the default platform for modern security operations, from visitor management portals and remote access control to incident logging, reporting, analytics, and integrations. But “in the cloud” does not mean “someone else is securing it for us”.

Read more...
Surveillance & AI roundtable
DeepAlert Lytehouse Refraime SMART Security Solutions Technews Publishing Editor's Choice Surveillance Integrated Solutions AI & Data Analytics
SMART Security Solutions held an online roundtable with a few surveillance experts to explore the intersection of surveillance and AI, gaining insights into the market and how control rooms are evolving.

Read more...
Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
New commercial and technical appointments at Veeam
News & Events Infrastructure
Veeam Software has announced two senior appointments in its South African business as it continues to invest in local market growth and partner and customer engagement.

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.