scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

Secure communication protocol for smart transportation based on vehicular cloud

TL;DR: This work proposes reliable data transmission protocols for cutting-edge architecture to search data from the storage, to resist against various security attacks, and provide better performance results in diverse smart city applications.
Abstract: The pioneering concept of connected vehicles has transformed the way of thinking for researchers and entrepreneurs by collecting relevant data from nearby objects. However, this data is useful for a specific vehicle only. Moreover, vehicles get a high amount of data (e.g., traffic, safety, and multimedia infotainment) on the road. Thus, vehicles expect adequate storage device for this data, but it is infeasible to have a large memory in each vehicle. Hence, the vehicular cloud computing (VCC) framework came into the picture to provide a storage facility by connecting a road-side-unit (RSU) with the vehicular cloud (VC). In this, data should be saved in an encrypted form to preserve security, but there is a challenge to search for information over encrypted data. Next, we understand that many of vehicular communication schemes are inefficient for data transmissions due to its poor performance results and vulnerable to different fundamental security attacks. Accordingly, on-device performance is critical, but data damages and secure on-time connectivity are also significant challenges in a public environment. Therefore, we propose reliable data transmission protocols for cutting-edge architecture to search data from the storage, to resist against various security attacks, and provide better performance results. Thus, the proposed data transmission protocol is useful in diverse smart city applications (business, safety, and entertainment) for the benefits of society.
Citations
More filters
Journal ArticleDOI
TL;DR: This survey identifies promising applications and draws attention to a number of research challenges facing the vehicular clouds community at large.
Abstract: The past decade has seen the emergence of Vehicular Clouds as a topic of research in its own right. Vehicular clouds were inspired by the reality of present-day vehicles featuring an impressive array of on-board compute, storage and sensing capabilities and by the insight that these on-board capabilities are a vast untapped resource that, at the moment, is wasted. Harvesting these vehicular resources and putting them to work in a meaningful and productive way promises to have a significant and lasting societal impact. One of the defining ways in which vehicular clouds differ from conventional clouds is resource volatility. As vehicles enter and leave the cloud, new compute resources become available while others depart, creating a volatile environment where reasoning about fundamental performance metrics becomes very challenging. Given that vehicular clouds and their numerous variants have becomes a very active field of research, this seems to be a good moment to survey the state of the art of vehicular cloud research. In this survey, we adopt an inclusive rather than an exclusive definition of various flavors of vehicular clouds. Vehicular clouds, in their many incarnations, have a huge array of potential applications. In order to bring this potential to fruition, significant research challenges have to be overcome. With this in mind, this survey identifies promising applications and draws attention to a number of research challenges facing the vehicular clouds community at large.

75 citations


Cites methods from "Secure communication protocol for s..."

  • ...In the literature MCC-inspired VC architectures have been referred to in a variety of ways including VANET-Clouds [55], Mobile Ad-hoc Clouds [56], Cloud-based Vehicular Networks [57], [58], Cloud-Based Mobile Augmentation [59], Vehicle using Cloud [60], [61], Hybrid Cloud [10], [56], [60], and Comprehensive Vehicular Cloud Computing [62], Cloud-Fog-Vehicular System [63], and Internet of Vehicles (IoV) [64], to name just a few....

    [...]

01 Jan 2014
TL;DR: The aim of this beta is to extend the class of equivalences that ProVerif handles, so this beta can only take input file with an equivalence query, and any other query has been disabled.
Abstract: This manual describes the ProVerif software package version 1.87beta. Additional information can be found in the research paper, in the file docs/paper.pdf in this distribution. ProVerif is a tool for automatically analyzing the security of cryptographic protocols. In particular, ProVerif is capable of proving observational equivalence between processes. The aim of this beta is to extend the class of equivalences that ProVerif handles. As such, this beta can only take input file with an equivalence query. Any other query has been disabled. Moreover, only typed processes are allowed in this beta. All these restrictions will be lifted in the next stable release.

22 citations

Posted Content
TL;DR: In this paper, the authors investigated how to provide timely computational services in VCC systems, in particular, minimizing the deadline violation probability given a set of tasks to be executed in vehicular clouds.
Abstract: In vehicular cloud computing (VCC) systems, the computational resources of moving vehicles are exploited and managed by infrastructures, e.g., roadside units, to provide computational services. The offloading of computational tasks and collection of results rely on successful transmissions between vehicles and infrastructures during encounters. In this paper, we investigate how to provide timely computational services in VCC systems. In particular, we seek to minimize the deadline violation probability given a set of tasks to be executed in vehicular clouds. Due to the uncertainty of vehicle movements, the task replication methodology is leveraged which allows one task to be executed by several vehicles, and thus trading computational resources for delay reduction. The optimal task replication policy is of key interest. We first formulate the problem as a finite-horizon sampled-time Markov decision problem and obtain the optimal policy by value iterations. To conquer the complexity issue, we propose the balanced-task-assignment (BETA) policy which is proved optimal and has a clear structure: it always assigns the task with the minimum number of replicas. Moreover, a tight closed-form performance upper bound for the BETA policy is derived, which indicates that the deadline violation probability follows the Rayleigh distribution approximately. Applying the vehicle speed-density relationship in the traffic flow theory, we find that vehicle mobility benefits VCC systems more compared with road traffic systems, by showing that the optimum vehicle speed to minimize the deadline violation probability is larger than the critical vehicle speed in traffic theory which maximizes traffic flow efficiency.

11 citations

Journal ArticleDOI
TL;DR: A secure and efficient V2V message communication protocol for vehicle users using a low-cost function (i.e., SHA-256) while preserving user anonymity is proposed using a test-bed implementation results show that the VCom is comparatively efficient in the computational cost, communication overhead, storage cost, and energy consumption.
Abstract: Vehicles are especially capable of exchanging pertinent information with nearby vehicles. However, there are multiple challenges like secure data exchange, fast message transmission, dynamic topology, and user data protection while transmitting relevant information between moving vehicles on the road. Therefore, researchers suggested different vehicle-to-vehicle (V2V) message communication and verification mechanisms, but they are vulnerable to crucial security attacks. Furthermore, the existing V2V communication schemes relatively require high operational costs for the implementation, taking more time and computational resources for road safety and traffic data exchanges. In this article, we propose a secure and efficient V2V message communication protocol (named as VCom ) for vehicle users using a low-cost function (i.e., SHA-256) while preserving user anonymity. The security proof and analysis are discussed for the VCom to confirm its security and user privacy strengths against different security attributes and attacks. The test-bed implementation results show that the VCom is comparatively efficient in the computational cost, communication overhead, storage cost, and energy consumption.

9 citations


Cites background from "Secure communication protocol for s..."

  • ...Therefore, it is imperative to use a reliable message transmission system for data exchanges [1]....

    [...]

Journal ArticleDOI
TL;DR: In this article , the authors present an artan ulaşım araçları ile ilgili tehditleri ve siber güvenlik risklerini analiz etmek ve bu son derece karmaşık, heterojen ve değişken ortamın özelliklerini dikkate alarak bu riskleri ele almak için güvelik önlemleri ortaya koymak son dece ônemli hale gelmektedir.
Abstract: Teknolojide yaşanan hızlı gelişmelerle günümüzde kullanımı hızlı artan akıllı ulaşım araçları, artan talep ve sağladıkları kolaylıklar sebebiyle kısa zamanda dünya çapında önemli bir yere sahip olacaktır. Akıllı ve otonom ulaşım araçları alanındaki teknolojik gelişmeler söz konusu olduğunda hızlı bir ivme kazanıldığı göz ardı edilemez. Gelişmiş makine öğrenimi ve yapay zekâ tekniklerinden yararlanan yarı otonom ve otonom arabaların ortaya çıkmasıyla birlikte potansiyel riskler ve siber güvenlik zorlukları artmaktadır. Dahası, akıllı ulaşım sistemlerinin ve otonom araçların konuşlandırılması için gerekli Araçtan Araca (V2V) ve Araçtan Altyapıya (V2I) ara yüzler, potansiyel saldırı yüzeyini ve saldırı vektörlerini büyük ölçüde genişlettikleri için güvenlik risklerini daha da artırmaktadır. Yapay zekâ ve yazılımla çalışan bu araçlar her ne kadar sürücü güvenliği ve konforunu artırsa da dışarıdan gelebilecek siber saldırılardan dolayı büyük ölçekte can ve mal kaybına da sebep olabilmektedir. Bu nedenle, akıllı ulaşım araçları ile ilgili tehditleri ve siber güvenlik risklerini analiz etmek ve bu son derece karmaşık, heterojen ve değişken ortamın özelliklerini dikkate alarak bu riskleri ele almak için güvenlik önlemleri ortaya koymak son derece önemli hale gelmektedir. Bu çalışmada akıllı ulaşım araçlarına yapılan siber güvenlik saldırıları, doğabilecek sonuçlar ve alınabilecek güvenlik önlemleri açıklanmaya ve analiz edilmeye çalışılacaktır. Ayrıca bu sistemlerde kullanılan çok katmanlı savunma sistemi incelenerek değerlendirilmiştir.

1 citations

References
More filters
Journal ArticleDOI
John Kenney1
16 Jun 2011
TL;DR: The content and status of the DSRC standards being developed for deployment in the United States are explained, including insights into why specific technical solutions are being adopted, and key challenges remaining for successful DSRC deployment.
Abstract: Wireless vehicular communication has the potential to enable a host of new applications, the most important of which are a class of safety applications that can prevent collisions and save thousands of lives. The automotive industry is working to develop the dedicated short-range communication (DSRC) technology, for use in vehicle-to-vehicle and vehicle-to-roadside communication. The effectiveness of this technology is highly dependent on cooperative standards for interoperability. This paper explains the content and status of the DSRC standards being developed for deployment in the United States. Included in the discussion are the IEEE 802.11p amendment for wireless access in vehicular environments (WAVE), the IEEE 1609.2, 1609.3, and 1609.4 standards for Security, Network Services and Multi-Channel Operation, the SAE J2735 Message Set Dictionary, and the emerging SAE J2945.1 Communication Minimum Performance Requirements standard. The paper shows how these standards fit together to provide a comprehensive solution for DSRC. Most of the key standards are either recently published or expected to be completed in the coming year. A reader will gain a thorough understanding of DSRC technology for vehicular communication, including insights into why specific technical solutions are being adopted, and key challenges remaining for successful DSRC deployment. The U.S. Department of Transportation is planning to decide in 2013 whether to require DSRC equipment in new vehicles.

1,866 citations


"Secure communication protocol for s..." refers background in this paper

  • ...ions as V2I (vehicle-to-infrastructure) and V2V (vehicle-to-vehicle), which are done using dedicated short-range communications (DSRC) over the physical layer and the data link layer of the OSI model [1]. The VANET has various applications, e.g., road safety, driver assistance, payment, curve speed warning, lane change warning, emergency status, forward collision, store location, etc. Thus, an intell...

    [...]

Journal ArticleDOI
TL;DR: An overview of the field of vehicular ad hoc networks is given, providing motivations, challenges, and a snapshot of proposed solutions.
Abstract: There has been significant interest and progress in the field of vehicular ad hoc networks over the last several years. VANETs comprise vehicle-to-vehicle and vehicle-to-infrastructure communications based on wireless local area network technologies. The distinctive set of candidate applications (e.g., collision warning and local traffic information for drivers), resources (licensed spectrum, rechargeable power source), and the environment (e.g., vehicular traffic flow patterns, privacy concerns) make the VANET a unique area of wireless communication. This article gives an overview of the field, providing motivations, challenges, and a snapshot of proposed solutions.

1,545 citations


"Secure communication protocol for s..." refers background in this paper

  • ...lopments projects, which are already implemented in the EU, Japan, the United States, and other countries in the world but there are vital challenges (large-level data transmission and security) [3], [14]. Therefore, the communication scope of VANET is limited. Next, an adversary has an opportunity to perform various security attacks (e.g., impersonation, modication, replay, man-in-the-middle, plain-...

    [...]

Journal ArticleDOI
TL;DR: The basic characteristics of vehicular networks are introduced, an overview of applications and associated requirements, along with challenges and their proposed solutions are provided, and the current and past major ITS programs and projects in the USA, Japan and Europe are provided.
Abstract: Vehicular networking has significant potential to enable diverse applications associated with traffic safety, traffic efficiency and infotainment. In this survey and tutorial paper we introduce the basic characteristics of vehicular networks, provide an overview of applications and associated requirements, along with challenges and their proposed solutions. In addition, we provide an overview of the current and past major ITS programs and projects in the USA, Japan and Europe. Moreover, vehicular networking architectures and protocol suites employed in such programs and projects in USA, Japan and Europe are discussed.

1,422 citations


"Secure communication protocol for s..." refers background in this paper

  • ...Thus, an intelligent transport system (ITS) is an essential application of VANETs [2], [3]....

    [...]

Journal ArticleDOI
TL;DR: In this article, the authors present aspects related to this field to help researchers and developers to understand and distinguish the main features surrounding VANET in one solid document, without the need to go through other relevant papers and articles.

1,216 citations


"Secure communication protocol for s..." refers background in this paper

  • ...Further, there are many research and developments projects, which are already implemented in the EU, Japan, the United States, and other countries in the world but there are vital challenges (large-level data transmission and security) [3], [14]....

    [...]

  • ...Thus, an intelligent transport system (ITS) is an essential application of VANETs [2], [3]....

    [...]

Journal ArticleDOI
TL;DR: A taxonomy for vehicular cloud is presented in which special attention has been devoted to the extensive applications, cloud formations, key management, inter cloud communication systems, and broad aspects of privacy and security issues, which found that VCC is a technologically feasible and economically viable technological shifting paradigm for converging intelligent vehicular networks towards autonomous traffic, vehicle control and perception systems.

711 citations


"Secure communication protocol for s..." refers background in this paper

  • ...Next, other researchers ( [8], [10], and [11]) suggested a VCC framework and did security analysis on them....

    [...]

  • ...After studying different VCC structures as discussed in [7], [8], [9], [10], [11], and [12], we understand that these architectures have limited scope in communication....

    [...]

  • ...Researchers ( [7], [8], [9], [10], [11], and [12]) suggested different VCC architectures to enhance the VANET system....

    [...]

  • ...Here, we have primarily three communications (vehicle-to-RSU, vehicle-to-vehicle, and RSU-to-VC) to transfer data over an insecure channel [7], [8], [9]....

    [...]