图书馆订阅: Guest
Begell Digital Portal Begell 数字图书馆 电子图书 期刊 参考文献及会议录 研究收集
电信和无线电工程
SJR: 0.203 SNIP: 0.44 CiteScore™: 1

ISSN 打印: 0040-2508
ISSN 在线: 1943-6009

卷:
卷 79, 2020 卷 78, 2019 卷 77, 2018 卷 76, 2017 卷 75, 2016 卷 74, 2015 卷 73, 2014 卷 72, 2013 卷 71, 2012 卷 70, 2011 卷 69, 2010 卷 68, 2009 卷 67, 2008 卷 66, 2007 卷 65, 2006 卷 64, 2005 卷 63, 2005 卷 62, 2004 卷 61, 2004 卷 60, 2003 卷 59, 2003 卷 58, 2002 卷 57, 2002 卷 56, 2001 卷 55, 2001 卷 54, 2000 卷 53, 1999 卷 52, 1998 卷 51, 1997

电信和无线电工程

DOI: 10.1615/TelecomRadEng.v78.i18.40
pages 1659-1670

AUTHENTICATION AND SECURE COMMUNICATIONS FOR INTERNET OF VEHICLES (IOV)-ASSISTED FOG COMPUTING

J. I. Naser
Ministry of Education, General Directorate for Education in Al-Qadisiyah, Iraq
H. A. G. Alsalman
Ministry of Education, General Directorate for Education in Al-Qadisiyah, Iraq
A. J. Kadhim
Ministry of Education, General Directorate for Education in Al-Qadisiyah, Iraq

ABSTRACT

Internet of Vehicles (IoV) is the realization of the technology known as the Internet of Things (IoT). IoV has become crucial for intelligent transportation as part of smart cities. IoV enables fog computing with cloud association by using road-side units in the form of edge networks. It involves roadside infrastructure, actuators, sensors, and vehicles. The integration of these components is very important to achieve the desired goal of having IoV. Another important insight is that IoV cannot be efficient without cloud computing. While designing IoV architectures, security concerns are to be given the highest importance. The problems found in the literature include heterogeneity of nodes and the frequent handover of the network connection due to the mobility of the devices. IoT is a relatively new technology and needs further investigation into security and authentication schemes. In this paper, the security requirements of IoV are identified and proposed an authentication mechanism and provisions for secure communications for IoV assisted fog computing. A prototype application is built to simulate and demonstrate proof of the concept. The experimental results revealed that the proposed solution is effective in enhancing the security of IoV assisted fog computing.

REFERENCES

  1. Deng, R., Lu, R., Lai, C., Luan, T.H., and Liang, H., (2016) Optimal Workload Allocation in Fog- Cloud Computing Towards Balanced Delay and Power Consumption, IEEE Internet of Things Journal, 3(6), pp. 1-11.

  2. Alsalman, H.A.G. and Naser, J.I., (2018) A Framework for Optimization of Location of Fog Servers and Fog Network Formation to Minimize Latency, International Journal of Pure and Applied Mathematics, 120(5), pp. 855-868.

  3. Kadhim, A.J. and Seno, S.A.H., (2019) Energy-Efficient Multicast Routing Protocol based on SDN and Fog Computing for Vehicular Networks, Ad Hoc Networks, 84, pp. 68-81.

  4. Mahmud, R., Kotagiri, R., and Buyya, R., (2017) Fog Computing: A Taxonomy, Survey and Future Directions, Proc. Internet of Everything, Internet of Things (Technology, Communications and Computing), Springer, pp. 103-130.

  5. Bonomi, F., Milito, R., Natarajan, P., and Zhu, J., (2014) Fog Computing: A Platform for Internet of Things and Analytics, Proc. Big Data and Internet of Things: A Roadmap for Smart Environments, 46, pp. 169-186.

  6. Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., and Zhao, W., (2017) A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications, IEEE Internet of Things Journal, 4(5), pp. 1125-1142.

  7. Kadhim, A.J. and Seno, S.A.H., (2019) Maximizing the Utilization of Fog Computing in Internet of Vehicle Using SDN, IEEE Comm. Lett., 23(1), pp. 140-143.

  8. Hou, X., Li, Y., Chen, M., Wu, D., Jin, D., and Chen, S., (2016) Vehicular Fog Computing: A Viewpoint of Vehicles as the Infrastructures, IEEE Transaction on Vehicular Technology, 65(6), pp. 3860-3873.

  9. Kai, K., Cong, W., and Tao, L., (2016) Fog Computing for Vehicular Ad-hoc Networks: Paradigms, Scenarios, and Issues, Journal of China Universities of Posts and Telecommunications (Elsevier), 23(4), pp. 56-66.

  10. He, X., Ren, Z., Shi, C., and Fang, J., (2016) A Novel Load Balancing Strategy of Software-Defined Cloud/Fog Networking in the Internet of Vehicles, China Communications, 13(2), pp. 140-149.

  11. Golestan, K., Soua, R., Karray, F., and Kamel, M.S., (2016) Situation awareness within the context of connected cars: A comprehensive review and recent trends, Information Fusion, 29, pp. 68-83.

  12. Bonomi, F., (2013) The smart and connected vehicle and the internet of things, Invited Talk, Workshop on Synchronization in Telecommunication Systems.

  13. Contreras, J., Zeadally, S., and Guerrero-Ibanez, J.A., (2018) Internet of vehicles: architecture, protocols, and security, IEEE Internet of Things Journal, 5(5), pp. 3701-3709.

  14. Chellappa, R., (1997) Intermediaries in cloud computing: a new computing paradigm, INFORMS Annual Meeting, Dallas, USA.

  15. Bonomi, F., Milito, R., Zhu, J., and Addepalli, S., (2012) Fog computing and its role in the internet of things, Proc. First Edition of MCC Workshop on Mobile Cloud Computing, Helsinki, Finland, pp. 13-16.

  16. Ali, M., Dhamotharan, R., Khan, E., Khan, S.U., Vasilakos, A.V., Li, K., and Zomaya, A.Y., (2017) SeDaSC: Secure Data Sharing in Clouds, IEEE Systems Journal, 11(2), pp. 395-404.

  17. Seo, S-H., Nabeel, M., Ding, X., and Bertino, E., (2014) An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds, IEEE Transaction on Knowledge and Data Engineering, 26(9), pp. 2107-2119.

  18. Cheng, J., Zhou, M., Liu, F., Gao, S., and Liu, C., (2015) Routing in internet of vehicles: a review, IEEE Transactions on Intelligent Transportation Systems, 16(5), pp. 2339-2352.

  19. AlFuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., and Ayyash, M., (2015) Internet of things: a survey on enabling technologies, protocols, and applications, IEEE Communications Surveys & Tutorials, 17(4), pp. 2347-2376.

  20. Mokhtar, B. and Azab, M., (2015) Survey on security issues in vehicular ad hoc networks, Alexandria Engineering Journal, 54(4), pp. 1115-1126.

  21. Chen, C., Wang, X., Han, W., and Zang, B., (2009) A robust detection of the sybil attack in urban vanets, in 29th IEEE International Conference on Distributed Computing Systems Workshops, Montreal, Canada, pp. 270-276, DOI: 10.1109/ICDCSW. 2009.48.

  22. Park, S., Aslam, B., Turgut, D., and Zou, C.C., (2009) Defense against sybil attack in vehicular ad hoc network based on roadside unit support, IEEE Military Communications Conference, Boston, USA, pp. 1-7, DOI: 10.1109/MIL COM.2009.5379844.

  23. Xu, L., Wu, X., and Zhang, X., (2012) CL-PRE: A Certificate less Proxy Re-Encryption Scheme For Secure Data Sharing with Public Cloud, Proc. 7thACM Symposium on Information, Computer and Communications Security, pp. 87-88.

  24. Khan, A.N., Kiah, M.M., Madani, S.A., Ali, M., and Shamshirband, S., (2014) Incremental Proxy Re-Encryption Scheme for Mobile Cloud Computing Environment, J. Supercomputing, 68(2), pp. 624-651.

  25. Beresford A.R. and Stajano, F., (2004) Mix zones: user privacy in location aware services, Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, Orlando, USA, pp. 127-131.

  26. Xiong, H., Chen, Z., and Li, F., (2012) Efficient and multilevel privacy preserving communication protocol for VANET, Computers & Electrical Engineering, 38(3), pp. 573-581.

  27. Lin, X., Sun, X., Ho, P-H., and Shen, X., (2007) GSIS: a secure and privacy preserving protocol for vehicular communications, IEEE Transactions on Vehicular Technology, 56(6), pp. 3442-3456.

  28. Chen, J., Mamun, M.S.I., and Miyaji, A., (2015) An efficient batch verification system and its effect in a real time VANET environment, Security and Communication Networks, 8(2), pp. 298-310.

  29. Zhang, J. and Xu, Y., (2014) Privacy preserving authentication protocols with efficient verification in VANETs, International Journal of Communication Systems, 27(12), pp. 3676-3692.

  30. Yan, G., Wen, D., Olariu, S., and Weigle, M.C., (2013) Security challenges in vehicular cloud computing, IEEE Transactions on Intelligent Transportation Systems, 14(1), pp. 284-294.

  31. Hubaux, J.P., Capkun, S., and Luo, J., (2004) The security and privacy of smart vehicles, IEEE Security & Privacy, 2(3), pp. 49-55.

  32. Skala, K., Davidovic, D., Afgan, E., Sovic, I., and Sojat, Z., (2015) Scalable distributed computing hierarchy: cloud, fog and dew computing, Open Journal of Cloud Computing, 2(1), pp. 16-24.

  33. Bhatia, T. and Verma, A.K., (2017) Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues, Journal of Supercomputing, 73(6), pp. 2558-2631.

  34. Alrawais, A., Alhothaily, A., Hu, C., and Cheng, X., (2017) Fog computing for the internet of things: security and privacy issues, IEEE Internet Computing, 21(2), pp. 34-42.

  35. Rindos and Wang, Y., (2016) Dew computing: the complementary piece of cloud computing, IEEE International Conferences on Big Data and Cloud Computing (BDCloud), Social Computing and Networking (SocialCom), Sustainable Computing and Communications (SustainCom), Atlanta, USA, pp. 15-20.

  36. Kubovy, J., Huber, C., Jager, M., and Kung, J., (2016) A Secure Token-Based Communication for Authentication and Authorization Servers, Springer International Conference on Future Data and Security Engineering, Can Tho, Vietnam.

  37. X.509 Network WG: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. May 2008. http://www.ietf.org/rfc/rfc5280.txt.

  38. Choudhury, S., (2018) JDBC HSQLDB Tutorial, Java Code Geeks, https://examples.javacodegeeks. com/enterprise-java/sql-enterprise-java/jdbc-hsqldb-tutorial/.


Articles with similar content:

ROUTING PROTOCOL FOR IoV-FOG NETWORK SUPPORTED BY SDN
Telecommunications and Radio Engineering, Vol.79, 2020, issue 5
J. I. Naser, A. J. Kadhim
DEVELOPING A WEBSITE FOR THE FORMATION OF VIRTUAL ENTERPRISES
Flexible Automation and Intelligent Manufacturing, 1997:
Proceedings of the Seventh International FAIM Conference, Vol.0, 1997, issue
Carlos Bremer, Fredy J. Valente, Paulo C. de Carvalho Dias, Edson dos S. Moreira
Breaking Cryptosystem Based on Low Order Cutting-off
Journal of Automation and Information Sciences, Vol.41, 2009, issue 2
Andrey V. Fesenko
Product design methodological contribution based on product decisions : Proposition of reference decisionnal process
Flexible Automation and Intelligent Manufacturing, 1997:
Proceedings of the Seventh International FAIM Conference, Vol.0, 1997, issue
Claudine Guidat, Laure Morel, Vincent Boly, Jean Renaud, Valerie Rault-Jacquot
Automatic Control of Radio Communication Networks Design
Telecommunications and Radio Engineering, Vol.68, 2009, issue 5
A. V. Anishchenko, D. V. Chebotaryova, V. M. Bezruk