913 research outputs found
TrustE-VC: Trustworthy Evaluation Framework for Industrial Connected Vehicles in the Cloud
The integration between cloud computing and vehicular ad hoc networks, namely, vehicular clouds (VCs), has become a significant research area. This integration was proposed to accelerate the adoption of intelligent transportation systems. The trustworthiness in VCs is expected to carry more computing capabilities that manage large-scale collected data. This trend requires a security evaluation framework that ensures data privacy protection, integrity of information, and availability of resources. To the best of our knowledge, this is the first study that proposes a robust trustworthiness evaluation of vehicular cloud for security criteria evaluation and selection. This article proposes three-level security features in order to develop effectiveness and trustworthiness in VCs. To assess and evaluate these security features, our evaluation framework consists of three main interconnected components: 1) an aggregation of the security evaluation values of the security criteria for each level; 2) a fuzzy multicriteria decision-making algorithm; and 3) a simple additive weight associated with the importance-performance analysis and performance rate to visualize the framework findings. The evaluation results of the security criteria based on the average performance rate and global weight suggest that data residency, data privacy, and data ownership are the most pressing challenges in assessing data protection in a VC environment. Overall, this article paves the way for a secure VC using an evaluation of effective security features and underscores directions and challenges facing the VC community. This article sheds light on the importance of security by design, emphasizing multiple layers of security when implementing industrial VCsThis work was supported in part by the Ministry of Education, Culture, and Sport, Government of Spain under Grant TIN2016-76373-P, in part by the Xunta de Galicia Accreditation 2016–2019 under Grant ED431G/08 and Grant ED431C 2018/2019, and in part by the European Union under the European Regional Development FundS
Traffic Road Congestion System using by the internet of vehicles (IoV)
Traffic problems have increased in modern life due to a huge number of
vehicles, big cities, and ignoring the traffic rules. Vehicular ad hoc network
(VANET) has improved the traffic system in previous some and plays a vital role
in the best traffic control system in big cities. But due to some limitations,
it is not enough to control some problems in specific conditions. Now a day
invention of new technologies of the Internet of Things (IoT) is used for
collaboratively and efficiently performing tasks. This technology was also
introduced in the transportation system which makes it an intelligent
transportation system (ITS), this is called the Internet of vehicles (IOV). We
will elaborate on traffic problems in the traditional system and elaborate on
the benefits, enhancements, and reasons to better IOV by Systematic Literature
Review (SLR). This technique will be implemented by targeting needed papers
through many search phrases. A systematic literature review is used for 121
articles between 2014 and 2023. The IoV technologies and tools are required to
create the IoV and resolve some traffic rules through SUMO (simulation of urban
mobility) which is used for the design and simulation the road traffic. We have
tried to contribute to the best model of the traffic control system. This paper
will analysis two vehicular congestion control models in term of select the
optimized and efficient model and elaborate on the reasons for efficiency by
searching the solution SLR based questions. Due to some efficient features, we
have suggested the IOV based on vehicular clouds. These efficient features make
this model the best and most effective than the traditional model which is a
great reason to enhance the network system.Comment: pages 16, figures
A Threat Model for Vehicular Fog Computing
Vehicular Fog Computing (VFC) facilitates the deployment of distributed, latency-aware services, residing between smart vehicles and cloud services. However, VFC systems are exposed to manifold security threats, putting human life at risk. Knowledge on such threats is scattered and lacks empirical validation. We performed an extensive threat assessment by reviewing literature and conducting expert interviews, leading to a comprehensive threat model with 33 attacks and example security mitigation strategies, among others. We thereby synthesize and extend prior research; provide rich descriptions for threats; and raise awareness of physical attacks that underline importance of the cyber-physical manifestation of VFC
Dense Moving Fog for Intelligent IoT: Key Challenges and Opportunities
As the ratification of 5G New Radio technology is being completed, enabling
network architectures are expected to undertake a matching effort. Conventional
cloud and edge computing paradigms may thus become insufficient in supporting
the increasingly stringent operating requirements of
\emph{intelligent~Internet-of-Things (IoT) devices} that can move unpredictably
and at high speeds. Complementing these, the concept of fog emerges to deploy
cooperative cloud-like functions in the immediate vicinity of various moving
devices, such as connected and autonomous vehicles, on the road and in the air.
Envisioning gradual evolution of these infrastructures toward the increasingly
denser geographical distribution of fog functionality, we in this work put
forward the vision of dense moving fog for intelligent IoT applications. To
this aim, we review the recent powerful enablers, outline the main challenges
and opportunities, and corroborate the performance benefits of collaborative
dense fog operation in a characteristic use case featuring a connected fleet of
autonomous vehicles.Comment: 7 pages, 5 figures, 1 table. The work has been accepted for
publication in IEEE Communications Magazine, 2019. Copyright may be
transferred without notice, after which this version may no longer be
accessibl
Security Enhancement of IoT and Fog Computing Via Blockchain Applications
Blockchain technology is now becoming highly appealing to the next generation because it is better tailored to the information age. Blockchain technologies can also be used in the Internet of Things (IoT) and fog computing. The development of IoT and Fog Computing technologies in different fields has resulted in a major improvement in distributed networks. Blockchain technology is now becoming highly appealing to the next generation because it is better tailored to the information age. Blockchain technologies can also be used in IoT and fog computing. The blockchain principle necessitates a transparent data storage mechanism for storing and exchanging data and transactions throughout the network. In this paper, first, we explained Blockchain, its architecture, and its security. Then we view Blockchain application in IoT security. Then we explained Fog computing, Generic Security Requirements for Fog Computing, and we also discuss Blockchain applications that enhance Fog Computing Security. Finally, we conduct a review of some recent literature on using Blockchain applications to improve the security of IoT and fog computing and a comparison of the methods proposed in the literature
- …