Security against malicious node in the vehicular cloud computing using a software-defined networking architecture

Recently Vehicular Cloud Computing (VCC) has become a significant research area, due to its potential to ensure passenger comfort and improve road safety. It has emerged as a promising technology that leverages the cloud computing functionalities to exploit vehicles underutilized computational, storage and communications. However, it has recently shown that the VCC might be vulnerable to various kinds of attacks, due to the public nature of its network. Therefore, ensuring security and privacy in this paradigm is considered as one of its most important challenges. In this paper, we exploit software-defined network (SDN) technology to design a new security approach that protects vehicles from malicious nodes, using pseudonyms, key management and revocation list which provides authentication, confidentiality, integrity and Availability.

[1]  Sunilkumar S. Manvi,et al.  Thesis Proposal Summary: Key Management Authentication and Non Repudiation for Information Transaction in Vehicular Cloud Environments , 2016, 2016 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM).

[2]  Xiaolei Dong,et al.  Secure and Privacy Preserving Protocol for Cloud-Based Vehicular DTNs , 2015, IEEE Transactions on Information Forensics and Security.

[3]  Frank Kargl,et al.  Context-adaptive detection of insider attacks in VANET information dissemination schemes , 2015, 2015 IEEE Vehicular Networking Conference (VNC).

[4]  Sangheon Pack,et al.  On security in Software-defined vehicular cloud , 2016, 2016 International Conference on Information and Communication Technology Convergence (ICTC).

[5]  Rajkumar Buyya,et al.  A survey on vehicular cloud computing , 2014, J. Netw. Comput. Appl..

[6]  Rajkumar Buyya,et al.  Software-Defined Cloud Computing: Architectural elements and open challenges , 2014, 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[7]  G. Mahadevan,et al.  Defensive mechanism for VANET security in game theoretic approach using heuristic based ant colony optimization , 2013, 2013 International Conference on Computer Communication and Informatics.

[8]  Anil Kumar,et al.  Techniques to isolate sybil attack in VANET-A review , 2016, 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT).

[9]  Radhika M. Pai,et al.  Cloud enabled secure communication in Vehicular Ad-hoc Networks , 2014, 2014 International Conference on Connected Vehicles and Expo (ICCVE).

[10]  Yong Yu,et al.  Survey on key revocation mechanisms in wireless sensor networks , 2016, J. Netw. Comput. Appl..

[11]  Jahan Roshan,et al.  Detection of malicious node and development of routing strategy in VANET , 2016 .

[12]  Panos Papadimitratos,et al.  Scaling VANET security through cooperative message verification , 2015, 2015 IEEE Vehicular Networking Conference (VNC).

[13]  K. Deepa Thilak,et al.  DoS attack on VANET routing and possible defending solutions - A survey , 2016, 2016 International Conference on Information Communication and Embedded Systems (ICICES).

[14]  Levent Ertaul,et al.  Security Challenges in Cloud Computing , 2010, Security and Management.

[15]  Ning Wang,et al.  Software Defined Networking With Pseudonym Systems for Secure Vehicular Clouds , 2016, IEEE Access.

[16]  Bernd Eissfeller,et al.  Emerging attacks on VANET security based on GPS Time Spoofing , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).