scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

SearchCom: Vehicular Cloud-based Secure and Energy-Efficient Communication and Searching System for Smart Transportation

TL;DR: This paper proposes a dependable system (named as SearchCom) for vehicle applicants to overcome above-mentioned challenges and provide operational facility and its performance results in execution time, memory requirement, communication overhead, searching, and energy consumption.
Abstract: The cutting-edge technologies have improved the journey of vehicle users on the road using different vehicular-based structures (vehicular ad-hoc networks (VANETs), vehicular cloud computing (VCC), and Internet of Vehicles (IoV)). Vehicles generally transmit different road-side data (e.g., traffic, details of nearby vehicles, emergency/environment, location, etc.) from/to another end in a public environment. Hence, three key challenges on data are as follows; (1) secure and effective data storage in the vehicular cloud (VC) (2) efficient data extraction from the VC and (3) reliable data transmission between two entities. Some general methods are to search/store data from/in the cloud, but these techniques are only for data storage and extraction. Next, various communication schemes are proposed for VANETs, VCC, and IoV, but they need high computational resources, and these schemes are vulnerable to multiple security attacks. We find that there is no system, which provides all these data operations (storage, searching, and communication) for vehicle users. In this paper, we propose a dependable system (named as SearchCom) for vehicle applicants to overcome above-mentioned challenges and provide operational facility. The SearchCom is analyzed to verify its security strengths against various security attacks and its performance results in execution time, memory requirement, communication overhead, searching, and energy consumption.
Citations
More filters
DOI
15 Nov 2021
TL;DR: The main considerations for green IoV from five different scenarios, including the communication, computation, traffic, Electric Vehicles (EVs), and energy harvesting management are presented.
Abstract: As one of the most promising applications in future Internet of Things, Internet of Vehicles (IoV) has been acknowledged as a fundamental technology for developing the Intelligent Transportation Systems in smart cities. With the emergence of the sixth generation (6G) communications technologies, massive network infrastructures will be densely deployed and the number of network nodes will increase exponentially, leading to extremely high energy consumption. There has been an upsurge of interest to develop the green IoV towards sustainable vehicular communication and networking in the 6G era. However, as a special mobile ad-hoc network, the energy cost in an IoV system involves the communication and computation energy in addition to the fuel consumption and the electricity cost of moving vehicles. Moreover, the energy harvesting technology, which is likely to be adopted widely in 6G systems, will complicate the optimization of energy efficiency in the entire system. Current studies focus only on part of the energy issues in IoV systems without a comprehensive discussion of the state-of-the-art energy-efficient approaches and the influence of the development of 6G networks on green IoV. In this paper, we present the main considerations for green IoV from five different scenarios, including the communication, computation, traffic, Electric Vehicles (EVs), and energy harvesting management. The literature relevant to each of the scenarios is compared from the perspective of energy optimization (e.g., with respect to resource allocation, workload scheduling, routing design, traffic control, charging management, energy harvesting and sharing) and the related factors affecting energy efficiency (e.g., resource limitation, channel state, network topology, traffic condition). In addition, we introduce the potential challenges and the emerging technologies in 6G for developing green IoV systems. Finally, we discuss the research trends in designing energy-efficient IoV systems.

35 citations


Cites background from "SearchCom: Vehicular Cloud-based Se..."

  • ...[77] propose a vehicular cloud-based secure and energy-efficient communication searching system, which supports secure and effective data storage/extraction in/from the vehicular cloud, as well as the reliable data transmission between different entities....

    [...]

Journal ArticleDOI
TL;DR: In this paper , the authors present the main considerations for green Internet of Vehicles (IoV) from five different scenarios, including the communication, computation, traffic, electric vehicles (EVs), and energy harvesting management.
Abstract: As one of the most promising applications in future Internet of Things, Internet of Vehicles (IoV) has been acknowledged as a fundamental technology for developing the Intelligent Transportation Systems in smart cities. With the emergence of the sixth generation (6G) communications technologies, massive network infrastructures will be densely deployed and the number of network nodes will increase exponentially, leading to extremely high energy consumption. There has been an upsurge of interest to develop the green IoV towards sustainable vehicular communication and networking in the 6G era. However, as a special mobile ad-hoc network, the energy cost in an IoV system involves the communication and computation energy in addition to the fuel consumption and the electricity cost of moving vehicles. Moreover, the energy harvesting technology, which is likely to be adopted widely in 6G systems, will complicate the optimization of energy efficiency in the entire system. Current studies focus only on part of the energy issues in IoV systems without a comprehensive discussion of the state-of-the-art energy-efficient approaches and the influence of the development of 6G networks on green IoV. In this paper, we present the main considerations for green IoV from five different scenarios, including the communication, computation, traffic, Electric Vehicles (EVs), and energy harvesting management. The literature relevant to each of the scenarios is compared from the perspective of energy optimization (e.g., with respect to resource allocation, workload scheduling, routing design, traffic control, charging management, energy harvesting and sharing) and the related factors affecting energy efficiency (e.g., resource limitation, channel state, network topology, traffic condition). In addition, we introduce the potential challenges and the emerging technologies in 6G for developing green IoV systems. Finally, we discuss the research trends in designing energy-efficient IoV systems.

33 citations

Posted Content
TL;DR: In this paper, the authors present the main considerations for green Internet of Vehicles (IoV) from five different scenarios, including communication, computation, traffic, electric vehicles (EVs), and energy harvesting management.
Abstract: As one of the most promising applications in future Internet of Things, Internet of Vehicles (IoV) has been acknowledged as a fundamental technology for developing the Intelligent Transportation Systems in smart cities. With the emergence of the sixth generation (6G) communications technologies, massive network infrastructures will be densely deployed and the number of network nodes will increase exponentially, leading to extremely high energy consumption. There has been an upsurge of interest to develop the green IoV towards sustainable vehicular communication and networking in the 6G era. In this paper, we present the main considerations for green IoV from five different scenarios, including the communication, computation, traffic, Electric Vehicles (EVs), and energy harvesting management. The literatures relevant to each of the scenarios are compared from the perspective of energy optimization (e.g., with respect to resource allocation, workload scheduling, routing design, traffic control, charging management, energy harvesting and sharing, etc.) and the related factors affecting energy efficiency (e.g., resource limitation, channel state, network topology, traffic condition, etc.). In addition, we introduce the potential challenges and the emerging technologies in 6G for developing green IoV systems. Finally, we discuss the research trends in designing energy-efficient IoV systems.

32 citations

Journal ArticleDOI
TL;DR: In this paper , the authors provide a comprehensive overview of all computing paradigms related to vehicular networks and present the architectural details, similarities, differences, and key features of each computing paradigm.
Abstract: Road safety, optimized traffic management, and passenger comfort have always been the primary goals of the vehicle networking research community. Advances in computer and communication technologies have made the dream of modern intelligent vehicles a reality through the use of smart sensors, cameras, networking devices, and storage capabilities. Autonomous operation of modern intelligent vehicles requires massive computations where tasks are outsourced. In recent years, various computing paradigms, e.g., mobile cloud computing (MCC), vehicular cloud computing (VCC), multi-access or mobile edge computing (MEC), vehicular edge computing (VEC), vehicular fog computing (VFC), and volunteer computing based VANET (VCBV), have been developed to move computational resources close to the user and handle the delay-sensitive applications of modern intelligent vehicles. Therefore, in this study, we provide a comprehensive overview of all computing paradigms related to vehicular networks. We also present the architectural details, similarities, differences, and key features of each computing paradigm. Finally, we conclude the study with open research challenges in vehicular networks along with future research directions.

15 citations

Journal ArticleDOI
TL;DR: This study has provided a comprehensive overview of all computing paradigms related to vehicular networks and presented the architectural details, similarities, differences, and key features of each computing paradigm.
Abstract: Road safety, optimized traffic management, and passenger comfort have always been the primary goals of the vehicle networking research community. Advances in computer and communication technology have made the dream of modern intelligent vehicles a reality through the use of smart sensors, cameras, networking devices, and storage capabilities. Autonomous operation of modern intelligent vehicles requires massive computations where tasks are outsourced. The research community has proposed various computing paradigms: mobile cloud computing, vehicle cloud computing, multi-access edge computing, vehicle edge computing, vehicle fog computing, and voluntary computing-based VANET (VCBV) to move computational power close to the user and handle the delay-sensitive applications of modern intelligent vehicles. In this study, we have provided a comprehensive overview of all computing paradigms related to vehicular networks. We have presented the architectural details, similarities, differences, and key features of each computing paradigm. Finally, we concluded the study with open research challenges in vehicular networks.

12 citations

References
More filters
Book ChapterDOI
15 Aug 1999
TL;DR: In this paper, the authors examine specific methods for analyzing power consumption measurements to find secret keys from tamper resistant devices. And they also discuss approaches for building cryptosystems that can operate securely in existing hardware that leaks information.
Abstract: Cryptosystem designers frequently assume that secrets will be manipulated in closed, reliable computing environments. Unfortunately, actual computers and microchips leak information about the operations they process. This paper examines specific methods for analyzing power consumption measurements to find secret keys from tamper resistant devices. We also discuss approaches for building cryptosystems that can operate securely in existing hardware that leaks information.

6,757 citations

Journal ArticleDOI
John Kenney1
16 Jun 2011
TL;DR: The content and status of the DSRC standards being developed for deployment in the United States are explained, including insights into why specific technical solutions are being adopted, and key challenges remaining for successful DSRC deployment.
Abstract: Wireless vehicular communication has the potential to enable a host of new applications, the most important of which are a class of safety applications that can prevent collisions and save thousands of lives. The automotive industry is working to develop the dedicated short-range communication (DSRC) technology, for use in vehicle-to-vehicle and vehicle-to-roadside communication. The effectiveness of this technology is highly dependent on cooperative standards for interoperability. This paper explains the content and status of the DSRC standards being developed for deployment in the United States. Included in the discussion are the IEEE 802.11p amendment for wireless access in vehicular environments (WAVE), the IEEE 1609.2, 1609.3, and 1609.4 standards for Security, Network Services and Multi-Channel Operation, the SAE J2735 Message Set Dictionary, and the emerging SAE J2945.1 Communication Minimum Performance Requirements standard. The paper shows how these standards fit together to provide a comprehensive solution for DSRC. Most of the key standards are either recently published or expected to be completed in the coming year. A reader will gain a thorough understanding of DSRC technology for vehicular communication, including insights into why specific technical solutions are being adopted, and key challenges remaining for successful DSRC deployment. The U.S. Department of Transportation is planning to decide in 2013 whether to require DSRC equipment in new vehicles.

1,866 citations


"SearchCom: Vehicular Cloud-based Se..." refers background in this paper

  • ...Therefore, VANET is a complex structure, and its applications are divided into three parts as (1) traffic management (2) road safety and (3) infotainment [1], [2]....

    [...]

Proceedings ArticleDOI
30 Oct 2006
TL;DR: In this paper, the authors proposed a searchable symmetric encryption (SSE) scheme for the multi-user setting, where queries to the server can be chosen adaptively during the execution of the search.
Abstract: Searchable symmetric encryption (SSE) allows a party to outsource the storage of its data to another party (a server) in a private manner, while maintaining the ability to selectively search over it. This problem has been the focus of active research in recent years. In this paper we show two solutions to SSE that simultaneously enjoy the following properties: Both solutions are more efficient than all previous constant-round schemes. In particular, the work performed by the server per returned document is constant as opposed to linear in the size of the data. Both solutions enjoy stronger security guarantees than previous constant-round schemes. In fact, we point out subtle but serious problems with previous notions of security for SSE, and show how to design constructions which avoid these pitfalls. Further, our second solution also achieves what we call adaptive SSE security, where queries to the server can be chosen adaptively (by the adversary) during the execution of the search; this notion is both important in practice and has not been previously considered.Surprisingly, despite being more secure and more efficient, our SSE schemes are remarkably simple. We consider the simplicity of both solutions as an important step towards the deployment of SSE technologies.As an additional contribution, we also consider multi-user SSE. All prior work on SSE studied the setting where only the owner of the data is capable of submitting search queries. We consider the natural extension where an arbitrary group of parties other than the owner can submit search queries. We formally define SSE in the multi-user setting, and present an efficient construction that achieves better performance than simply using access control mechanisms.

1,673 citations

Journal ArticleDOI
TL;DR: The basic characteristics of vehicular networks are introduced, an overview of applications and associated requirements, along with challenges and their proposed solutions are provided, and the current and past major ITS programs and projects in the USA, Japan and Europe are provided.
Abstract: Vehicular networking has significant potential to enable diverse applications associated with traffic safety, traffic efficiency and infotainment. In this survey and tutorial paper we introduce the basic characteristics of vehicular networks, provide an overview of applications and associated requirements, along with challenges and their proposed solutions. In addition, we provide an overview of the current and past major ITS programs and projects in the USA, Japan and Europe. Moreover, vehicular networking architectures and protocol suites employed in such programs and projects in USA, Japan and Europe are discussed.

1,422 citations


"SearchCom: Vehicular Cloud-based Se..." refers background in this paper

  • ...If the communication protocol requires more resources, then information delivery gets delay and hence, vehicle users may not receive important messages on-time [5]....

    [...]

Proceedings ArticleDOI
23 Oct 2011
TL;DR: The evaluation shows that CryptDB has low overhead, reducing throughput by 14.5% for phpBB, a web forum application, and by 26% for queries from TPC-C, compared to unmodified MySQL.
Abstract: Online applications are vulnerable to theft of sensitive information because adversaries can exploit software bugs to gain access to private data, and because curious or malicious administrators may capture and leak data. CryptDB is a system that provides practical and provable confidentiality in the face of these attacks for applications backed by SQL databases. It works by executing SQL queries over encrypted data using a collection of efficient SQL-aware encryption schemes. CryptDB can also chain encryption keys to user passwords, so that a data item can be decrypted only by using the password of one of the users with access to that data. As a result, a database administrator never gets access to decrypted data, and even if all servers are compromised, an adversary cannot decrypt the data of any user who is not logged in. An analysis of a trace of 126 million SQL queries from a production MySQL server shows that CryptDB can support operations over encrypted data for 99.5% of the 128,840 columns seen in the trace. Our evaluation shows that CryptDB has low overhead, reducing throughput by 14.5% for phpBB, a web forum application, and by 26% for queries from TPC-C, compared to unmodified MySQL. Chaining encryption keys to user passwords requires 11--13 unique schema annotations to secure more than 20 sensitive fields and 2--7 lines of source code changes for three multi-user web applications.

1,269 citations


"SearchCom: Vehicular Cloud-based Se..." refers methods in this paper

  • ...CryptoDB [13] is the first system in which they used a dedicated query planner [16] and property-preserving encryption (PPE) methods....

    [...]

  • ...The schemes (CryptoDB [13], BuildSeer [14], Arx [15]) are designed to save significant data efficiently in the database....

    [...]