A Survey on Vehicular Cloud Network Security

被引:5
作者
Deng, Junyi [1 ]
Deng, Jikai [1 ]
Liu, Peihao [1 ]
Wang, Huan [1 ]
Yan, Junjie [2 ]
Pan, Deru [1 ]
Liu, Jiahua [1 ]
机构
[1] Guangxi Univ Sci & Technol, Sch Comp Sci & Technol, Liuzhou 545026, Peoples R China
[2] Guangxi Univ Sci & Technol, Sch Elect Engn, Liuzhou 545026, Peoples R China
关键词
Security; Cloud computing; Reliability; Roads; Network security; Authentication; Surveys; Edge computing; Vehicular ad hoc networks; edge computing; security; VANETs; vehicular cloud network; INTRUSION DETECTION SYSTEM; TO-MANY AUTHENTICATION; SYBIL ATTACK DETECTION; KEY AGREEMENT SCHEME; TRUST MANAGEMENT; NEURAL-NETWORK; DOS ATTACKS; IN-VEHICLE; CHALLENGES; IDENTIFICATION;
D O I
10.1109/ACCESS.2023.3339192
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The novel Vehicular Cloud Network (VCN) is a close combination of Vehicular Ad hoc Network, Cloud Computing, and Edge Computing. However, VCN is facing the enormous challenge of security and privacy before it is generalized. To address these issues, VCN communication characteristics and security requirements are summarized first. Secondly, the paper conducts an in-depth analysis of the existing security problems and solutions in VCN based on several attack models, including routing, data, identity, DoS, and hostile attacks. And we summarize the security solutions into two categories: security defense measures based on identity authentication and access control, and security protection measures based on traffic detection and anomaly detection. Thirdly, this paper proposes a reliable VCN security architecture consisting of three types of clouds: vehicular, edge, and central clouds. Moreover, the VCN architecture combines a Vehicle Intrusion Detection and Prevention System with a Vehicular Cloud Security Management Platform to ensure the security of VCN. Last but not least, some open issues worth investigating are discussed.
引用
收藏
页码:136741 / 136757
页数:17
相关论文
共 84 条
[1]   Vehicular Cloud Networks: Architecture, Applications and Security Issues [J].
Ahmad, Farhan ;
Kazim, Muhammad ;
Adnane, Asma ;
Awad, Abir .
2015 IEEE/ACM 8TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC), 2015, :571-576
[2]   A comprehensive survey on vehicular Ad Hoc network [J].
Al-Sultan, Saif ;
Al-Doori, Moath M. ;
Al-Bayatti, Ali H. ;
Zedan, Hussien .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 37 :380-392
[3]  
Alrehan AM, 2019, 2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS)
[4]  
Bao S., 2023, Inf. Secur. Commun. Privacy, V2023, P10
[5]   Detecting Sybil Attacks Using Proofs of Work and Location in VANETs [J].
Baza, Mohamed ;
Nabil, Mahmoud ;
Mahmoud, Mohamed M. E. A. ;
Bewermeier, Niclas ;
Fidan, Kemal ;
Alasmary, Waleed ;
Abdallah, Mohamed .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (01) :39-53
[6]   Botnet traffic identification using neural networks [J].
Biswas, Rajib ;
Roy, Sambuddha .
MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (16) :24147-24171
[7]   Vehicular cloud computing: Architectures, applications, and mobility [J].
Boukerche, Azzedine ;
De Grande, Robson E. .
COMPUTER NETWORKS, 2018, 135 :171-189
[8]  
Dasgupta S, 2020, Arxiv, DOI arXiv:2010.11722
[9]  
Deeksha R., 2021, P INT C ADV EL EL CO, P1
[10]  
Deng J. Y., 2019, Research on YARN security and its application in vehicular ad hoc networks, DOI [10.27162/d.cnki.gjlin.2019.000155, DOI 10.27162/D.CNKI.GJLIN.2019.000155]