scispace - formally typeset
Search or ask a question
Author

Jianer Chen

Bio: Jianer Chen is an academic researcher from Guangzhou University. The author has contributed to research in topics: Encryption & Cloud computing. The author has an hindex of 6, co-authored 18 publications receiving 135 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: An extensive overview of the ITS and the evolution of ITS to VANets is provided, the details of VANETs are provided, and the privacy and security attacks in VANets with their applications and challenges are discussed.

131 citations

Journal ArticleDOI
TL;DR: This paper opens a discourse on the security attacks that future SDN-based VANETs should confront and examines how SDNs could be advantageous in building new countermeasures and provides the conclusion of the whole study.
Abstract: Vehicular ad-hoc networks (VANETs) are the specific sort of ad-hoc networks that are utilized in intelligent transportation systems (ITS). VANETs have become one of the most reassuring, promising, and quickest developing subsets of the mobile ad-hoc networks (MANETs). They include smart vehicles, roadside units (RSUs), and on-board units (OBUs) which correspond through inconsistent wireless network. The current research in the vehicles industry and media transmission innovations alongside the remarkable multimodal portability administrations expedited center-wise ITS, of which VANETs increase considerably more attention. The particular characteristics of the software defined networks (SDNs) use the vehicular systems by its condition of the centralized art having a complete understanding of the network. Security is an important issue in the SDN-based VANETs, as a result of the effect the threats and vulnerabilities can have on driver’s conduct and personal satisfaction. This paper opens a discourse on the security attacks that future SDN-based VANETs should confront and examines how SDNs could be advantageous in building new countermeasures. SDN-based VANETs encourage us to dispose of the confinement and difficulties that are available in the traditional VANETs. It helps us to diminish the general burden on the system by dealing with the general system through a single wireless controller. While SDN-based VANETs provide us some benefits in terms of applications and services, they also have some important challenges which need to be solved. In this study we discuss and elaborate the challenges, along with the applications, and the future directions of SDN-based VANETs. At the end we provide the conclusion of the whole study.

38 citations

Journal ArticleDOI
TL;DR: A new VANETs structure for secure communications is offered, and it contains two sub modules, the Software Defined Network (SDN) and the Fog Computing (FC), which provides scalability, programmability complaisance, and the global information about the network.

33 citations

Proceedings ArticleDOI
01 Oct 2018
TL;DR: Prior to evaluating the latest version of hypervisors (commercial and open source), the best virtual CPU to virtual machine (vCPU-VM) configuration as well as the effect of virtual CPUs on performance is analyzed for each hypervisor.
Abstract: Organizations are adopting virtualization technology to reduce the cost while maximizing the productivity, flexibility, responsiveness, and efficiency. There are a variety of vendors for the virtualization environments, all of them claim that their virtualization hypervisor is the best in terms of performance. Furthermore, when a system administrator or a researcher want to deploy a virtual machine in a cloud environment, which vCPU-VM configuration is the best for better performance? In this paper, prior to evaluating the latest version of hypervisors (commercial and open source), the best virtual CPU to virtual machine (vCPU-VM) configuration as well as the effect of virtual CPUs on performance is analyzed for each hypervisor. We used Phoronix Test Suite (PTS) benchmarking tool as a traffic generator and analyzer. The results have shown that commercial and open source hypervisors have similar performance. As per our observation, the performance of a system would degrade by improper allocation of vCPUs to VMs, or when there is a massive over-allocation of vCPUs.

15 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: A three-module framework, named “Ontology-Based Privacy-Preserving” (OBPP) is proposed to address the heterogeneity issue while keeping the privacy information of IoT devices, and can be widely applied to smart cities.

135 citations

Journal ArticleDOI
TL;DR: Many different perspectives on VANETs are investigated, including historical perspectives and ideas for uses as well as more modern perspectives, and how they have changed over time are investigated.

94 citations

Journal ArticleDOI
TL;DR: This survey comprehensively covers the location privacy and trust management models of the VANETs and discusses the security and privacy issues in the VCC, which fills the gap of existing surveys.
Abstract: Vehicular networks are becoming a prominent research field in the intelligent transportation system (ITS) due to the nature and characteristics of providing high-level road safety and optimized traffic management. Vehicles are equipped with the heavy communication equipment which requires a high power supply, on-board computing device, and data storage devices. Many wireless communication technologies are deployed to maintain and enhance the traffic management system. The ITS is capable of providing services to the traffic authorities and precautionary measures to the drivers and passengers. Several methods have been proposed for discussing the security and privacy issues for the vehicular ad hoc networks (VANETs) and vehicular cloud computing (VCC). They receive a great deal of attention from researchers around the world since they are new technologies, and they can improve road safety and enhance traffic flow by utilizing the vehicles resources and communication system. Firstly, the VANETs are presented, including the basic overview, characteristics, threats, and attacks. The location privacy methodologies are elaborated, which can protect the confidential information of the vehicle, such as the location detail and driver information. Secondly, the trust management models in the VANETs are comprehensively discussed, followed by the comparison of the cryptography and trust models in terms of different kinds of attacks. Then, the simulation tools and applications of the VANETs are discussed, and the evolution is presented from the VANETs to VCC in the vehicular network. Thirdly, the VCC is discussed from its architecture and the security and privacy issues. Finally, several research challenges on the VANETs and VCC are presented. In sum, this survey comprehensively covers the location privacy and trust management models of the VANETs and discusses the security and privacy issues in the VCC, which fills the gap of existing surveys. Also, it indicates the research challenges in the VANETs and VCC.

86 citations

Journal ArticleDOI
TL;DR: The purpose of this paper is to list and characterize all backdoors that can be exploited to seriously harm either EV and EVCS equipments, or power grid, or both and to ignite research efforts on cybersecurity of smart EV charging and enhancing power grid resiliency against such demand-side cyberattacks in general.
Abstract: With the roll-out of electric vehicles (EVs), the automobile industry is transitioning away from conventional gasoline-fueled vehicles. As a result, the EV charging demand is continuously growing and to meet this growing demand, various types of electric vehicle charging stations (EVCSs) are being deployed for commercial and residential use. This nexus of EVs, EVCSs, and power grids creates complex cyber-physical interdependencies that can be maliciously exploited to damage each of these components. This paper describes and analyzes cyber vulnerabilities that arise at this nexus and points to the current and emerging gaps in the security of the EV charging ecosystem. These vulnerabilities must be addressed as the number of EVs continue to grow worldwide and their impact on the power grid becomes more viable. The purpose of this paper is to list and characterize all backdoors that can be exploited to seriously harm either EV and EVCS equipments, or power grid, or both. The presented issues and challenges intend to ignite research efforts on cybersecurity of smart EV charging and enhancing power grid resiliency against such demand-side cyberattacks in general.

74 citations

Journal ArticleDOI
TL;DR: This review article aims to classify recently published studies and investigate the current status in the area of fog computing, and proposed taxonomy for fog computing frameworks based on the existing literature and compared the different research work based on taxonomy.

63 citations