Secure intelligent traffic light control using fog computing

As the number of vehicles grows, traffic efficiency is becoming a worldwide problem. Intelligent transportation system aims to improve the traffic efficiency, where intelligent traffic light control is an important component. Existing intelligent traffic light control systems face some challenges, e.g., avoiding heavy roadside sensors, resisting malicious vehicles and avoiding single-point failure. To cope with those challenges, we propose two secure intelligent traffic light control schemes using fog computing whose security are based on the hardness of the computational DiffieHellman puzzle and the hash collision puzzle respectively. The two schemes assume the traffic lights are fog devices. The first scheme is a simple extension of a recent scheme for defending denial-of-service attacks. We show this simple extension is not efficient when the vehicle density is high. The second scheme is much more efficient and is fog device friendly. Even the vehicle density is high, the traffic light may verify the validity of the vehicles efficiently. Our schemes may resist the attacks from malicious vehicles.Our schemes can avoid the problem of single-point failure.Our improved scheme is fog device friendly.

[1]  Gongjun Yan,et al.  An efficient geographic location-based security mechanism for vehicular adhoc networks , 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.

[2]  D. Denning,et al.  A Location Based Encryption Technique and Some of Its Applications , 2003 .

[3]  Josep Domingo-Ferrer,et al.  Practical secure and privacy-preserving scheme for value-added applications in VANETs , 2015, Comput. Commun..

[4]  Maythem K. Abbas,et al.  Traffic light control using VANET system architecture , 2011, 2011 National Postgraduate Conference.

[5]  Kim-Kwang Raymond Choo,et al.  A Domain-Based Multi-cluster SIP Solution for Mobile Ad Hoc Network , 2014, SecureComm.

[6]  Shahaboddin Shamshirband,et al.  A Lightweight Radio Propagation Model for Vehicular Communication in Road Tunnels , 2016, PloS one.

[7]  Moonseong Kim,et al.  Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation , 2015, PloS one.

[8]  Md. Rafiqul Islam,et al.  A Secure Cross-Domain SIP Solution for Mobile Ad Hoc Network Using Dynamic Clustering , 2015, SecureComm.

[9]  Josep Domingo-Ferrer,et al.  A Scalable Robust Authentication Protocol for Secure Vehicular Communications , 2010, IEEE Transactions on Vehicular Technology.

[10]  Josep Domingo-Ferrer,et al.  Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response , 2015, IEEE Transactions on Computers.

[11]  Dipak Ghosal,et al.  Adaptive Traffic Signal Control With Vehicular Ad hoc Networks , 2013, IEEE Transactions on Vehicular Technology.

[12]  Brent Waters,et al.  New client puzzle outsourcing techniques for DoS resistance , 2004, CCS '04.

[13]  Jalal Almhana,et al.  Adaptive Traffic Light Control using VANET: A case study , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).

[14]  Edward Chung,et al.  AN EVALUATION OF SCATS MASTER ISOLATED CONTROL , 1998 .

[15]  Wann-Ming Wey,et al.  Model formulation and solution algorithm of traffic signal control in an urban network , 2000 .

[16]  D I Robertson,et al.  "TRANSYT" METHOD FOR AREA TRAFFIC CONTROL , 1969 .

[17]  Dorothy E. Denning,et al.  Location-based authentication: Grounding cyberspace for better security , 1996 .

[18]  Kuntal Sengupta,et al.  Framework for real-time behavior interpretation from traffic video , 2005, IEEE Transactions on Intelligent Transportation Systems.

[19]  Ivan Stojmenovic,et al.  The Fog computing paradigm: Scenarios and security issues , 2014, 2014 Federated Conference on Computer Science and Information Systems.

[20]  Osama Masoud,et al.  A vision-based approach to collision prediction at traffic intersections , 2005, IEEE Transactions on Intelligent Transportation Systems.

[21]  Sateesh Addepalli,et al.  Fog computing and its role in the internet of things , 2012, MCC '12.

[22]  Adnan Yazici,et al.  An adaptive, energy-aware and distributed fault-tolerant topology-control algorithm for heterogeneous wireless sensor networks , 2016, Ad Hoc Networks.

[23]  Lei Zhang,et al.  Privacy-Preserving Public Auditing Protocol for Low-Performance End Devices in Cloud , 2016, IEEE Transactions on Information Forensics and Security.

[24]  Christian Priemer,et al.  A decentralized adaptive traffic signal control using V2I communication data , 2009, 2009 12th International IEEE Conference on Intelligent Transportation Systems.

[25]  R. D. Bretherton,et al.  INTELLIGENT SYSTEMS FOR PRIORITY AT TRAFFIC SIGNALS IN LONDON: THE INCOME PROJECT , 1997 .

[26]  Tu Shiliang,et al.  A realtime dynamic traffic control system based on wireless sensor network , 2005, 2005 International Conference on Parallel Processing Workshops (ICPPW'05).

[27]  Jiannong Cao,et al.  Protocols for Traffic Safety Using Wireless Sensor Network , 2007, ICA3PP.

[28]  Slobodan Guberinic,et al.  Optimal Traffic Control: Urban Intersections , 2007 .

[29]  Tuomas Aura DOS-Resistant Authentication with Client Puzzles (Transcript of Discussion) , 2000, Security Protocols Workshop.

[30]  Danda B. Rawat,et al.  A Geographic Location-Based Security Mechanism for Intelligent Vehicular Networks , 2011, ICIC 2011.

[31]  Josep Domingo-Ferrer,et al.  Distributed Aggregate Privacy-Preserving Authentication in VANETs , 2017, IEEE Transactions on Intelligent Transportation Systems.