Monitoring Vehicle Communication and Road Condition in VANET
DOI:
https://doi.org/10.32628/CSEIT206497Keywords:
The connected vehicular ad-hoc network (VANET) and cloud computing technology allows entities in VANET to enjoy the advantageous storage and computing services offered by some cloud service provider. However, the advantages do not come free since their combination brings many new security and privacy requirements for VANET applications. In this article, we investigate the cloud-based road condition monitoring (RCoM) scenario, where the authority needs to monitor real-time road conditions with the help of a cloud server so that it could make sound responses to emergency cases timely. When some bad road condition is detected, e.g., some geologic hazard or accident happens, vehicles on site are able to report such information to a cloud server engaged by the authority. We focus on addressing three key issues in RCoM. First, the vehicles have to be authorized by some roadside unit before generating a road condition report in the domain and uploading it to the cloud server. Second, to guarantee the privacy against the cloud server, the road condition information should be reported in ciphertext format, which requires that the cloud server should be able to distinguish the reported data from different vehicles in ciphertext format for the same place without compromising their confidentiality. Third, the cloud server and authority should be able to validate the report source, i.e., to check whether the road conditions are reported by legitimate vehicles. To address these issues, we present an efficient RCoM scheme, analyze its efficiency theoretically, and demonstrate the practicality through experimentsAbstract
The connected vehicular ad-hoc network (VANET) and cloud computing technology allows entities in VANET to enjoy the advantageous storage and computing services offered by some cloud service provider. However, the advantages do not come free since their combination brings many new security and privacy requirements for VANET applications. In this article, we investigate the cloud-based road condition monitoring (RCoM) scenario, where the authority needs to monitor real-time road conditions with the help of a cloud server so that it could make sound responses to emergency cases timely. When some bad road condition is detected, e.g., some geologic hazard or accident happens, vehicles on site are able to report such information to a cloud server engaged by the authority. We focus on addressing three key issues in RCoM. First, the vehicles have to be authorized by some roadside unit before generating a road condition report in the domain and uploading it to the cloud server. Second, to guarantee the privacy against the cloud server, the road condition information should be reported in ciphertext format, which requires that the cloud server should be able to distinguish the reported data from different vehicles in ciphertext format for the same place without compromising their confidentiality. Third, the cloud server and authority should be able to validate the report source, i.e., to check whether the road conditions are reported by legitimate vehicles. To address these issues, we present an efficient RCoM scheme, analyze its efficiency theoretically, and demonstrate the practicality through experiments
References
- L. Zhang, C. Hu, Q. Wu, J. Domingo-Ferrer, and B.Qin, “Privacy-preserving vehicular communication authentication with hierarchical aggregation and fast response,” IEEE Transactions on Computers, vol. 65, no. 8, pp. 2562–2574, Aug. 2016.
- Q. Wu, J. Domingo-Ferrer, and U. Gonzalez-Nicolas, “Balanced trustworthiness, safety, and privacy in vehicle-to-vehicle communications,” IEEE Transactions on Vehicular Technology, vol. 59, no. 2,pp. 559–573, Feb 2010.
- F. Qu, Z. Wu, F. Y. Wang, and W. Cho, “A security and privacy review of vanets,” IEEE Transactions on Intelligent Transportation Systems, vol. 16, no. 6, pp. 2985-2996, Dec 2015.
- “IEEE Standard for Wireless Access in Vehicular Environments Security Services for Applications and Management Messages,”IEEEStd 1609.2-2016 (Revision of IEEE Std 1609.2-2013), pp. 1-240, March 2016.
- “L. Zhang, Q. Wu, J. Domingo-Ferrer, B. Qin, and C. Hu, “Distributed aggregate privacy-preserving authentication in vanets,” IEEE Transactions on Intelligent Transportation Systems, vol. 18, no. 3, pp. 516–526, March 2017.
- L. Chen, S. L. Ng, and G. Wang, “Threshold anonymous announcement in vanets,” IEEE Journal on Selected Areas in Communications, vol. 29, no. 3, pp.605 -615, March 2011.
- Y. Liu, J. Ling, Q. Wu, and B. Qin, “Scalable privacy-enhanced traffic monitoring in vehicular ad hoc, networks,” Soft Computing, vol. 20, no.8, pp.3355-3346, Aug 2016.
- R. Yu, Y. Zhang, S. Gjessing, W. Xia, and K. Yang, “Toward cloud based vehicular networks with efficient resource management,”IEEE Network, vol. 27, no. 5, pp. 48–55, September 2013.0
- J. A. Guerrero-ibanez, S. Zeadally, and J. Contreras-Castillo, “Integration challenges of intelligent transportation systems with connected vehicle, cloud computing, and internet of things technologies,” IEEE Wireless Communications, vol. 22, no. 6, pp. 122–128, December 2015.
- M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia,“A view of cloud computing,” Commun. ACM, vol. 53, no. 4, pp.50–58, Apr. 2010
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.