Malicious Node Detection in Vehicular Cloud Computing

Authors(3) :-Jaida Khatoon, Abhishek Bajpai, Dr. Neeraj Kumar Tiwari

In this paper, we discuss malicious node detection in mobile cloud computing. There are various methods used previously to detect malicious nodes and prevent from any kind of attack. Various security measures have been implemented already. But now combination or hybrid of 2 or more methods provide more efficient more reliable and more cost effective method to prevent from any kind of attack. Vehicular networking has become a significant research area due to its specific features and applications such as standardization, efficient traffic management, road safety and infotainment. Vehicles are expected to carry relatively more communication systems, on board computing facilities, storage and increased sensing power. Hence, several technologies have been deployed to maintain and promote Intelligent Transportation Systems (ITS). Recently, a number of solutions were proposed to address the challenges and issues of vehicular networks. Vehicular Cloud Computing (VCC) is one of the solutions. VCC is a new hybrid technology that has a remarkable impact on traffic management and road safety by instantly using vehicular resources, such as computing, storage and internet for decision making. This paper presents the state-of-the-art survey of vehicular cloud computing. Moreover, we present a taxonomy for vehicular cloud in which special attention has been devoted to the extensive applications, cloud formations, key management, inter cloud communication systems, and broad aspects of privacy and security issues. Through an extensive review of the literature, we design an architecture for VCC, itemize the properties required in vehicular cloud that support this model. We compare this mechanism with normal Cloud Computing (CC) and discuss open research issues and future directions. By reviewing and analyzing literature, we found that VCC is a technologically feasible and economically viable technological shifting paradigm for converging intelligent vehicular networks towards autonomous traffic, vehicle control and perception systems.

Vehicular Cloud Computing, Vehicular Network, Security Of Vehicular Networks, Security Challenges

  1. Abolfazli S, Sanaei Z, Ahmed E, Gani A, Buyya R. Cloud-based augmentation for mobile devices: motivation, taxonomies, and open challenges. In: IEEE Communications Surveys and Tutorials, June 2013. 2013.070813.00285 S , in press.
  2. Abid H, Phuong LTT, Wang J, Lee S, Qaisar S. V-Cloud: vehicular cyber-physical systems and cloud computing. In: Proceedings of the 4th international symposium on applied sciences in biomedical and communication technologies. Barcelona, Spain: ACM; 2011. p. 1 - 5.
  3. Aijaz A, Bochow B, Dötzer F, Festag A, Gerlach M, Kroh R, et al. Attacks on inter vehicle communication systems-an analysis; 2006.
  4. Akbari Torkestani J. Mobility prediction in mobile wireless networks. Journal of Network and Computer Applications 2012;35:1633-45.
  5. Al-Sultan S, Al-Doori MM, Al-Bayatti AH, Zedan H. A comprehensive survey on vehicular Ad Hoc network. Journal of Network and Computer Applications 2013
  6. Alamri A, Ansari WS, Hassan MM, Shamim Hossain M, Alelaiwi A, Hossain MA. A survey on sensor-cloud: architecture, applications, and approaches. International Journal of Distributed Sensor Networks 2013;2013;1-18.
  7. Alazawi Z, Altowaijri S, Mehmood R, Abdljabar MB. Intelligent disaster management system based on cloud-enabled vehicular networks. In: Proceedings of the 11th international conference on ITS telecommunications ITST). St. Petersburg; 2011. p. 361-8.
  8. Anda J, LeBrun J, Ghosal D, Chuah CN, Zhang M. VGrid: vehicular adhoc networking and computing grid for intelligent traffic control. In: Proceedings of IEEE; 2005. p. 2905-9.
  9. Arif S, Olariu S, Wang J, Yan G, Yang W, Khalil I. Datacenter at the airport: reasoning about time-dependent parking lot occupancy. IEEE Transactions on Parallel and Distributed Systems 2012;23:2067-80.
  10. Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, et al. A view of cloud computing. Communications of the ACM 2010;53:50-8.
  11. Baby D, Sabareesh RD, Saravanaguru RAK, Thangavelu A. VCR: vehicular cloud for road side scenarios. In: Meghanathan N, Nagamalai D, Chaki N, editors. Advances in computing and information technology. Berlin Heidelberg: Springer; 2013. p. 541 -52
  12. Bilal SM, Bernardos CJ, Guerrero C. Position-based routing in vehicular networks: a survey. Journal of Network and Computer Applications 2013;36:685 -97
  13. Blum JJ, Neiswender A, Eskandarian A. Denial of service attacks on inter-vehicle  communication networks. In: Proceedings of the 11th international IEEE conference on intelligent transportation systems, ITSC'08 1; 2008. p. 797-802.
  14. Boneh D, Shacham H. Group signatures with verifier-local revocation. In: Proceedings of 11th ACM conference on omputer and communications security. Washington, DC, USA: ACM; 2004. p. 168-77.

Publication Details

Published in : Volume 3 | Issue 3 | May-June 2017
Date of Publication : 2017-06-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 136-139
Manuscript Number : IJSRSET173331
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

Jaida Khatoon, Abhishek Bajpai, Dr. Neeraj Kumar Tiwari , " Malicious Node Detection in Vehicular Cloud Computing, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 3, Issue 3, pp.136-139, May-June.2017

Follow Us

Contact Us