SDN based communications privacy-preserving architecture for VANETs using fog computing

被引:28
作者
Arif, Muhammad [1 ]
Wang, Guojun [1 ]
Balas, Valentina Emilia [2 ]
Geman, Oana [3 ]
Castiglione, Aniello [4 ]
Chen, Jianer [1 ]
机构
[1] Guangzhou Univ, Sch Comp Sci, Guangzhou 510006, Peoples R China
[2] Aurel Vlaicu Univ Arad, Dept Automat & Appl Informat, Arad, Romania
[3] Stefan cel Mare Univ, Dept Hlth & Human Dev, Suceava, Romania
[4] Univ Naples Parthenope, Ctr Direz Napoli, Dept Sci & Technol, Isola C4, I-80143 Naples, Italy
基金
中国国家自然科学基金;
关键词
Vehicles; Privacy; Networks; Software defined networks; Fog computing; Communication; SOFTWARE-DEFINED NETWORKING; MOBILE EDGE; CLOUD; SECURE; AUTHENTICATION; INTERNET; INFRASTRUCTURE; REQUIREMENTS; SCHEME; MODEL;
D O I
10.1016/j.vehcom.2020.100265
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Vehicular Ad-hoc Networks (VANETs) have become the one of the most, reassuring, encouraging and the quickest developing subsets of Mobile Ad-hoc Networks (MANETs). They are involved smart vehicles, Onboard Units (OBUs), and Roadside Units (RSUs) which convey by the temperamental wireless media. Other than lacking frameworks, forwarding elements move with various speeds. Hence, this postpones setting up dependable start to finish correspondence ways and having the proficient on the information move. As such, VANETs have the differing framework concerns and security troubles in getting the openness of universal accessibility, secure correspondence, exchanges, and notoriety the executives framework which impact the trust in coordinated effort and game plan between convenient frameworks. A new VANETs structure for secure communications is offered, and it contains two sub modules, the Software Defined Network (SDN) and the Fog Computing (FC). The SDN provides scalability, programmability complaisance, and the global information about the network, while the FC provides sensitive and location-aware services that meet future VANETs requirements. Additionally, we used the HABE encryption method to provide central security and offers secure and reliable communication. The proposed framework can address major VANETs problems by delivering Vehicle to Infrastructure (V2I) and Vehicle to Vehicle (V2V) communications. In this work, we demonstrated the communication example as well as the use case examples. We provide communication and computation performance along with security analysis. We provide the simulation results, in which we calculate the communication delays and the probability density function, and also compute the moving and running time with respect to the communication radius, that shows the method performs outclass for V2V and the V2I communications in terms of running time, moving distance, communication delays, storage, communication load and responce time. (c) 2020 Elsevier Inc. All rights reserved.
引用
收藏
页数:21
相关论文
共 74 条
  • [71] Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system
    Zhang, Guangxue
    Wang, Tian
    Wang, Guojun
    Liu, Anfeng
    Jia, Weijia
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (07)
  • [72] Autonomic Communications in Software-Driven Networks
    Zhao, Zhongliang
    Schiller, Eryk
    Kalogeiton, Eirini
    Braun, Torsten
    Stiller, Burkhard
    Garip, Mevlut Turker
    Joy, Joshua
    Gerla, Mario
    Akhtar, Nabeel
    Matta, Ibrahim
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2017, 35 (11) : 2431 - 2445
  • [73] Zheng K, 2016, IEEE NETWORK, V30, P72, DOI 10.1109/MNET.2016.7513867
  • [74] Efficient Privacy-Preserving Authentication for Vehicular Ad Hoc Networks
    Zhu, Xiaoyan
    Jiang, Shunrong
    Wang, Liangmin
    Li, Hui
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2014, 63 (02) : 907 - 919