Advertisement

SDN-Based Secure VANETs Communication with Fog Computing

  • Muhammad Arif
  • Guojun Wang
  • Tian Wang
  • Tao Peng
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11342)

Abstract

We present a new VANETS architecture, which is a composition of two modules, software defined network (SDN), and Fog computing. The SDN-based framework gives the scalability, flexibility, programming capability, and the global information, while the Fog computing delivers delicate and locations-aware services that can meet the future demands of VANETs. The proposed framework can address the main problems of VANETs by providing vehicles communications (V2V), vehicle to infrastructures (V2I). We used hybrid SDN architecture and addition od security plane, proposed secure mechanism for communication. In addition, our proposed framework provides a textual awareness system that automatically and intelligently provides possible traffic safety and provides secure and fast communications. Results indicates that the proposed system provides the best results in terms of both type of communication in VANETs.

Keywords

VANETs SDN Vehicles Fog computing Cloud computing Communication Infrastructure 

Notes

Acknowledgment

This work was supported in part by the National Natural Science Foundation of China under Grant 61632009 and Grant 61472451, in part by the Guangdong Provincial Natural Science Foundation under Grant 2017A030308006, and in part by the High-Level Talents Program of Higher Education in Guangdong Province under Grant 2016ZJ01.

References

  1. 1.
    Arif, M., Alam, K.A., Hussain, M.: Application of data mining using artificial neural network: survey. Int. J. Database Theory Appl. 8(1), 245–270 (2015)CrossRefGoogle Scholar
  2. 2.
    Arif, M., Mahmood, T.: Cloud computing and its environmental effects. Int. J. Grid Distrib. Comput. 8(1), 279–286 (2015)CrossRefGoogle Scholar
  3. 3.
    Arif, M., Shakeel, H.: Virtualization security: analysis and open challenges. Int. J. Hybrid Inf. Technol. 8(2), 237–246 (2015)CrossRefGoogle Scholar
  4. 4.
    Arif, M., Wang, G., Balas, V.E.: Secure VANETs: trusted communication scheme between vehicles and infrastructure based on fog computing. Stud. Inform. Control 27(2), 235–246 (2018)Google Scholar
  5. 5.
    Arif, M., Wang, G., Chen, S.: Deep learning with non-parametric regression model for traffic flow prediction. In: Proceedings of IEEE 16th International Conference on Dependable, Autonomic and Secure Computer, 16th International Conference on Pervasive Intelligence and Computer, 4th International Conference on Big Data Intelligence and Computer, and 3rd Cyber Science and Technology Congress, pp. 681–688. IEEE, August 2018Google Scholar
  6. 6.
    Arif, M., Wang, G., Peng, T.: Track me if you can? query based dual location privacy in VANETs for V2V and V2I. In: 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), pp. 1091–1096. IEEE (2018)Google Scholar
  7. 7.
    Ghosal, A., Halder, S.: Building intelligent systems for smart cities: issues, challenges and approaches. In: Mahmood, Z. (ed.) Smart Cities. CCN, pp. 107–125. Springer, Cham (2018).  https://doi.org/10.1007/978-3-319-76669-0_5CrossRefGoogle Scholar
  8. 8.
    Guerrero-Ibáñez, J., Zeadally, S., Contreras-Castillo, J.: Sensor technologies for intelligent transportation systems. Sensors 18(4), 1212 (2018)CrossRefGoogle Scholar
  9. 9.
    Klingler, F., Cohen, R., Sommer, C., Dressler, F.: Bloom hopping: bloom filter based 2-hop neighbor management in VANETs. IEEE Trans. Mob. Comput., 1 (2018)Google Scholar
  10. 10.
    Li, H., Lu, R., Misic, J., Mahmoud, M.: Security and privacy of connected vehicular cloud computing. IEEE Netw. 32(3), 4–6 (2018)CrossRefGoogle Scholar
  11. 11.
    Ligo, A.K., Peha, J.M.: Cost-effectiveness of sharing roadside infrastructure for internet of vehicles. IEEE Trans. Intell. Transp. Syst. 19, 2362–2372 (2018)CrossRefGoogle Scholar
  12. 12.
    Liu, Q., Wang, G., Liu, X., Peng, T., Wu, J.: Achieving reliable and secure services in cloud computing environments. Comput. Electr. Eng. 59, 153–164 (2017)CrossRefGoogle Scholar
  13. 13.
    Naman, A.T., Wang, Y., Gharakheili, H.H., Sivaraman, V., Taubman, D.: Responsive high throughput congestion control for interactive applications over sdn-enabled networks. Comput. Netw. 134, 152–166 (2018)CrossRefGoogle Scholar
  14. 14.
    Nobre, J., et al.: Vehicular software-defined networking and fog computing: integration and design principles. Ad Hoc Netw. 82, 172–181 (2018)CrossRefGoogle Scholar
  15. 15.
    Peng, S., Wang, G., Zhou, Y., Wan, C., Wang, C., Yu, S.: An immunization framework for social networks through big data based influence modeling. IEEE Trans. Dependable Secure Comput. (2017)Google Scholar
  16. 16.
    Peng, T., Liu, Q., Meng, D., Wang, G.: Collaborative trajectory privacy preserving scheme in location-based services. Inf. Sci. 387, 165–179 (2017)CrossRefGoogle Scholar
  17. 17.
    Rahmani, A.M., et al.: Exploiting smart e-health gateways at the edge of healthcare internet-of-things: a fog computing approach. Future Gener. Comput. Syst. 78, 641–658 (2018)CrossRefGoogle Scholar
  18. 18.
    Rego, A., Garcia, L., Sendra, S., Lloret, J.: Software defined networks for traffic management in emergency situations. In: 2018 Fifth International Conference on Software Defined Systems (SDS), pp. 45–51. IEEE (2018)Google Scholar
  19. 19.
    Singh, G.D., Tomar, R., Sastry, H.G., Prateek, M.: A review on VANET routing protocols and wireless standards. In: Satapathy, S.C., Bhateja, V., Das, S. (eds.) Smart Computing and Informatics. SIST, vol. 78, pp. 329–340. Springer, Singapore (2018).  https://doi.org/10.1007/978-981-10-5547-8_34CrossRefGoogle Scholar
  20. 20.
    Teniou, A., Bensaber, B.A.: Efficient and dynamic elliptic curve qu-vanstone implicit certificates distribution scheme for vehicular cloud networks. Secur. Priv. 1(1), e11 (2018)CrossRefGoogle Scholar
  21. 21.
    Truong, N.B., Lee, G.M., Ghamri-Doudane, Y.: Software defined networking-based vehicular adhoc network with fog computing. In: 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), pp. 1202–1207. IEEE (2015)Google Scholar
  22. 22.
    Wang, F., Jiang, W., Li, X., Wang, G.: Maximizing positive influence spread in online social networks via fluid dynamics. Future Gener. Comput. Syst. 86, 1491–1502 (2018)CrossRefGoogle Scholar
  23. 23.
    Wang, T., et al.: Data collection from WSNs to the cloud based on mobile fog elements. Future Gener. Comput. Syst. (2017, in press).  https://doi.org/10.1016/j.future.2017.07.031
  24. 24.
    Wang, T., Zhang, G., Bhuiyan, M.Z.A., Liu, A., Jia, W., Xie, M.: A novel trust mechanism based on fog computing in sensor-cloud system. Future Gener. Comput. Syst. (2018, in press).  https://doi.org/10.1016/j.future.2018.05.049
  25. 25.
    Wang, T., et al.: Fog-based storage technology to fight with cyber threat. Future Gener. Comput. Syst. 83, 208–218 (2018)CrossRefGoogle Scholar
  26. 26.
    Xing, X., Wang, G., Li, J.: Collaborative target tracking in wireless sensor networks. Adhoc Sens. Wirel. Netw. 23, 117–135 (2014)Google Scholar
  27. 27.
    Yi, S., Li, C., Li, Q.: A survey of fog computing: concepts, applications and issues. In: Proceedings of the 2015 Workshop on Mobile Big Data, pp. 37–42. ACM (2015)Google Scholar
  28. 28.
    Zhang, Q., Liu, Q., Wang, G.: PRMS: a personalized mobile search over encrypted outsourced data. IEEE Access 6, 31541–31552 (2018)CrossRefGoogle Scholar
  29. 29.
    Zhang, S., Wang, G., Bhuiyan, M.Z.A., Liu, Q.: A dual privacy preserving scheme in continuous location-based services. IEEE Internet of Things J. 5, 4191–4200 (2018)Google Scholar
  30. 30.
    Zhou, Z., Dong, M., Ota, K., Wang, G., Yang, L.T.: Energy-efficient resource allocation for D2D communications underlaying cloud-RAN-based LTE-A networks. IEEE Internet of Things J. 3(3), 428–438 (2016)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  • Muhammad Arif
    • 1
  • Guojun Wang
    • 1
  • Tian Wang
    • 2
  • Tao Peng
    • 1
  1. 1.School of Computer Science and TechnologyGuangzhou UniversityGuangzhouChina
  2. 2.Department of Computer Science and TechnologyHuaqiao UniversityXiamenChina

Personalised recommendations