A Software Defined Networking-Oriented Security Scheme for Vehicle Networks

In the intelligent transportation system (ITS), vehicle networks (VNs) can well solve the network related problems. However, as VNs are expected to have a wide range of applications in future services, security challenges are widely recognized. Consequently, security solutions for VNs are urgently needed. In this paper, we propose a new security strategy for VNs. We first construct the network architecture for VNs through the software defined networking. The security schemes are then embedded in the protocol to defend the common security attacks in the network. Moreover, in order to meet the security requirements of different data and computation overhead, several security schemes are studied for anti-replay, anti-eavesdropping, anti-tamper, anti-wormhole, and anti-forger, through the selection of packets to choose different modules. In particular, we focus on the anti-replay security scheme and use sequence number algorithm and MAC complete sequence number method in master and multi-service modules, respectively. The security schemes are simulated and analyzed by NS-2, which shows that the performance of the proposed security schemes is superior in terms of packet delivery ratio, average end-to-end delay, and control overhead.

[1]  Lei Guo,et al.  Temporal, Functional and Spatial Big Data Computing Framework for Large-Scale Smart Grid , 2019, IEEE Transactions on Emerging Topics in Computing.

[2]  Ruidong Li,et al.  Future trust management framework for mobile ad hoc networks , 2008, IEEE Communications Magazine.

[3]  Shengli Xie,et al.  Cognitive machine-to-machine communications: visions and potentials for the smart grid , 2012, IEEE Network.

[4]  Yijie Wang,et al.  Weighted partial network coding and its applications in wireless mesh networks , 2013, Wirel. Commun. Mob. Comput..

[5]  Lei Guo,et al.  Novel Framework of Risk-Aware Virtual Network Embedding in Optical Data Center Networks , 2018, IEEE Systems Journal.

[6]  John C. S. Lui,et al.  DCAR: Distributed Coding-Aware Routing in Wireless Networks , 2010, IEEE Trans. Mob. Comput..

[7]  Ana R. Cavalli,et al.  A distributed intrusion detection scheme for wireless ad hoc networks , 2012, SAC '12.

[8]  Jianxin Li,et al.  Most Influential Community Search over Large Social Networks , 2017, 2017 IEEE 33rd International Conference on Data Engineering (ICDE).

[9]  Prasant Mohapatra,et al.  Provenance-Based Information Trustworthiness Evaluation in Multi-Hop Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[10]  Feng Xia,et al.  Green and Sustainable Cloud of Things: Enabling Collaborative Edge Computing , 2019, IEEE Communications Magazine.

[11]  Guisheng Yin,et al.  A trust-based probabilistic recommendation model for social networks , 2015, J. Netw. Comput. Appl..

[12]  Mohammad S. Obaidat,et al.  A cryptography-based protocol against packet dropping and message tampering attacks on mobile ad hoc networks , 2014, Secur. Commun. Networks.

[13]  R. Yeung,et al.  Secure network coding , 2002, Proceedings IEEE International Symposium on Information Theory,.

[14]  Dharma P. Agrawal,et al.  TIDS: threshold and identity-based security scheme for wireless ad hoc networks , 2004, Ad Hoc Networks.

[15]  Jianwei Liu,et al.  A key distribution scheme using network coding for mobile ad hoc network , 2010 .

[16]  Mohsen Guizani,et al.  Home M2M networks: Architectures, standards, and QoS improvement , 2011, IEEE Communications Magazine.

[17]  Bin Hu,et al.  A City-Wide Real-Time Traffic Management System: Enabling Crowdsensing in Social Internet of Vehicles , 2018, IEEE Communications Magazine.

[18]  Jun Huang,et al.  Vehicular Fog Computing: Enabling Real-Time Traffic Management for Smart Cities , 2019, IEEE Wireless Communications.

[19]  K. Selvakumar,et al.  A swarm-based efficient distributed intrusion detection system for mobile ad hoc networks (MANET) , 2014, Int. J. Parallel Emergent Distributed Syst..

[20]  Rahim Tafazolli,et al.  Security concerns and countermeasures in network coding based communication systems: A survey , 2015, Comput. Networks.

[21]  MengChu Zhou,et al.  A Privacy-Preserving Message Forwarding Framework for Opportunistic Cloud of Things , 2018, IEEE Internet of Things Journal.

[22]  Lei Guo,et al.  On-Chip Hardware Accelerator for Automated Diagnosis Through Human–Machine Interactions in Healthcare Delivery , 2019, IEEE Transactions on Automation Science and Engineering.

[23]  Quanyan Zhu,et al.  Dependable Demand Response Management in the Smart Grid: A Stackelberg Game Approach , 2013, IEEE Transactions on Smart Grid.

[24]  Lei Wang,et al.  Offloading in Internet of Vehicles: A Fog-Enabled Real-Time Traffic Management System , 2018, IEEE Transactions on Industrial Informatics.

[25]  Jianxin Li,et al.  Personalized Influential Topic Search via Social Network Summarization , 2016, IEEE Trans. Knowl. Data Eng..

[26]  Jianxin Li,et al.  Geo-Social Influence Spanning Maximization , 2017, IEEE Transactions on Knowledge and Data Engineering.

[27]  MengChu Zhou,et al.  Emotion-Aware Cognitive System in Multi-Channel Cognitive Radio Ad Hoc Networks , 2018, IEEE Communications Magazine.

[28]  Xiangjie Kong,et al.  A Cooperative Partial Computation Offloading Scheme for Mobile Edge Computing Enabled Internet of Things , 2019, IEEE Internet of Things Journal.

[29]  Thierry Turletti,et al.  A Survey of Software-Defined Networking: Past, Present, and Future of Programmable Networks , 2014, IEEE Communications Surveys & Tutorials.

[30]  Joni da Silva Fraga,et al.  Algorithms for a distributed IDS in MANETs , 2014, J. Comput. Syst. Sci..

[31]  Lei Guo,et al.  Quick Answer for Big Data in Sharing Economy: Innovative Computer Architecture Design Facilitating Optimal Service-Demand Matching , 2018, IEEE Transactions on Automation Science and Engineering.