139 research outputs found

    Trust Management for Vehicular Networks: An Adversary-Oriented Overview

    Full text link
    © 2016 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more informationCooperative Intelligent Transportation Systems, mainly represented by vehicular ad hoc networks (VANETs), are among the key components contributing to the Smart City and Smart World paradigms. Based on the continuous exchange of both periodic and event triggered messages, smart vehicles can enhance road safety, while also providing support for comfort applications. In addition to the different communication protocols, securing such communications and establishing a certain trustiness among vehicles are among the main challenges to address, since the presence of dishonest peers can lead to unwanted situations. To this end, existing security solutions are typically divided into two main categories, cryptography and trust, where trust appeared as a complement to cryptography on some specific adversary models and environments where the latter was not enough to mitigate all possible attacks. In this paper, we provide an adversary-oriented survey of the existing trust models for VANETs. We also show when trust is preferable to cryptography, and the opposite. In addition, we show how trust models are usually evaluated in VANET contexts, and finally, we point out some critical scenarios that existing trust models cannot handle, together with some possible solutions.This work was supported by the Ministerio de Economia y Competitividad, Programa Estatal de Investigacion, Desarrollo e Innovacion Orientada a los Retos de la Sociedad, Proyectos I+D+I 2014, Spain, under Grant TEC2014-52690-R.Kerrache, CA.; Tavares De Araujo Cesariny Calafate, CM.; Cano Escribá, JC.; Lagraa, N.; Manzoni, P. (2016). Trust Management for Vehicular Networks: An Adversary-Oriented Overview. IEEE Access. 4:9293-9307. https://doi.org/10.1109/ACCESS.2016.2645452S92939307

    Emergency message dissemination schemes based on congestion avoidance in VANET and vehicular FoG computing

    Get PDF
    With the rapid growth in connected vehicles, FoG-assisted vehicular ad hoc network (VANET) is an emerging and novel field of research. For information sharing, a number of messages are exchanged in various applications, including traffic monitoring and area-specific live weather and social aspects monitoring. It is quite challenging where vehicles' speed, direction, and density of neighbors on the move are not consistent. In this scenario, congestion avoidance is also quite challenging to avoid communication loss during busy hours or in emergency cases. This paper presents emergency message dissemination schemes that are based on congestion avoidance scenario in VANET and vehicular FoG computing. In the similar vein, FoG-assisted VANET architecture is explored that can efficiently manage the message congestion scenarios. We present a taxonomy of schemes that address message congestion avoidance. Next, we have included a discussion about comparison of congestion avoidance schemes to highlight the strengths and weaknesses. We have also identified that FoG servers help to reduce the accessibility delays and congestion as compared to directly approaching cloud for all requests in linkage with big data repositories. For the dependable applicability of FoG in VANET, we have identified a number of open research challenges. © 2013 IEEE

    SGIRP: A Secure and Greedy Intersection-Based Routing Protocol for VANET using Guarding Nodes

    Get PDF
    Vehicular Ad Hoc Network (VANET) is an advance wireless technology in the field of wireless communication to provide better Intelligent Transportation Services (ITS). It is an emerging area of research in the field of vehicular technology for its high mobility and high link disruption. VANET provides better road services to the end users by providing safety to the passengers and drivers. Multimedia sharing, e-shopping, safety systems, etc. are some of ITS services provided by VANET. VANETs are strongly affected by link disruption problem for their high mobility and randomness. Security is also a main issue in VANET nowadays, which degrades the network performance. In this thesis, we present a Secure and Greedy Intersection-Based Routing Protocol (SGIRP) to transmit the data securely from source (S) to the destination (D) in a shortest path. For this, we have set Guarding Nodes (GNs) at every intersection to relay the packet from one intersection to other in a secure manner. GN helps in calculating the updated shortest paths to D, protects the network from malicious attacks by using authentication scheme and also recovers the network from Communication Voids (CV). GN plays an important role in transmitting the data from S to D in a fast and secure way. At last, we evaluate our proposed SGIRP protocol by deriving and proving the lemmas related to the protocol. It is also proved that SGIRP protocol shows better performance than Gytar protocol in terms of shorter time delay (T)

    Connected Car: technologies, issues, future trends

    Get PDF
    The connected car -a vehicle capable of accessing to the Internet, of communicating with smart devices as well as other cars and road infrastructures, and of collecting real-time data from multiple sources- is likely to play a fundamental role in the foreseeable Internet Of Things. In a context ruled by very strong competitive forces, a significant amount of car manufacturers and software and hardware developers have already embraced the challenge of providing innovative solutions for new generation vehicles. Today’s cars are asked to relieve drivers from the most stressful operations needed for driving, providing them with interesting and updated entertainment functions. In the meantime, they have to comply to the increasingly stringent standards about safety and reliability. The aim of this paper is to provide an overview of the possibilities offered by connected functionalities on cars and the associated technological issues and problems, as well as to enumerate the currently available hardware and software solutions and their main features

    Middleware Technologies for Cloud of Things - a survey

    Get PDF
    The next wave of communication and applications rely on the new services provided by Internet of Things which is becoming an important aspect in human and machines future. The IoT services are a key solution for providing smart environments in homes, buildings and cities. In the era of a massive number of connected things and objects with a high grow rate, several challenges have been raised such as management, aggregation and storage for big produced data. In order to tackle some of these issues, cloud computing emerged to IoT as Cloud of Things (CoT) which provides virtually unlimited cloud services to enhance the large scale IoT platforms. There are several factors to be considered in design and implementation of a CoT platform. One of the most important and challenging problems is the heterogeneity of different objects. This problem can be addressed by deploying suitable "Middleware". Middleware sits between things and applications that make a reliable platform for communication among things with different interfaces, operating systems, and architectures. The main aim of this paper is to study the middleware technologies for CoT. Toward this end, we first present the main features and characteristics of middlewares. Next we study different architecture styles and service domains. Then we presents several middlewares that are suitable for CoT based platforms and lastly a list of current challenges and issues in design of CoT based middlewares is discussed.Comment: http://www.sciencedirect.com/science/article/pii/S2352864817301268, Digital Communications and Networks, Elsevier (2017
    corecore