An Overview on Security and Privacy Challenges and Their Solutions in Fog-Based Vehicular Application

Fog computing is an emerging computing paradigm that extends cloud services to the edge of the network by moving computation tasks from cloud to network edges to reduce response latency in a wireless network. Fog computing inherits the principle of peer-to-peer networking, decentralization, and geographical distribution from clouds. Hence, fog computing becomes an ideal platform for readily supporting vehicular applications due to its dynamic support for mobility of client-devices and low latent heterogeneous communication capabilities. Despite many advantages, a multitude of security and privacy issues affects the platforms and renders it as a target for unknown adversaries. This has significant implication in the development of safety critical applications, such as vehicular cloud and intelligent transportation system. This paper presents, an overview of existing security and privacy vulnerabilities in fog computing, particularly in vehicular networks. Moreover, state-of-the-art security and privacy solutions for fog based vehicular networks are analyzed. In conclusion, open challenges and future research directions are discussed.

[1]  Aiqing Zhang,et al.  Security, Privacy, and Fairness in Fog-Based Vehicular Crowdsensing , 2017, IEEE Communications Magazine.

[2]  Matthew Green,et al.  Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.

[3]  Leandros Maglaras,et al.  Security and Privacy in Fog Computing: Challenges , 2017, IEEE Access.

[4]  Aryeh Kontorovich,et al.  Advanced Analytics for Connected Car Cybersecurity , 2017, 2018 IEEE 87th Vehicular Technology Conference (VTC Spring).

[5]  Fei-Yue Wang,et al.  A Security and Privacy Review of VANETs , 2015, IEEE Transactions on Intelligent Transportation Systems.

[6]  Eui-nam Huh,et al.  Fog Computing and Smart Gateway Based Communication for Cloud of Things , 2014, 2014 International Conference on Future Internet of Things and Cloud.

[7]  Jian Shen,et al.  Secure intelligent traffic light control using fog computing , 2018, Future Gener. Comput. Syst..

[8]  Nenghai Yu,et al.  Fog-Aided Verifiable Privacy Preserving Access Control for Latency-Sensitive Data Sharing in Vehicular Cloud Computing , 2018, IEEE Network.

[9]  Josef Noll,et al.  Measurable Security, Privacy and Dependability in Smart Grids , 2014, J. Cyber Secur. Mobil..

[10]  Gregory Epiphaniou,et al.  Proactive Threat Detection for Connected Cars Using Recursive Bayesian Estimation , 2018, IEEE Sensors Journal.

[11]  Luis Rodero-Merino,et al.  Finding your Way in the Fog: Towards a Comprehensive Definition of Fog Computing , 2014, CCRV.

[12]  Vrizlynn L. L. Thing,et al.  Autonomous Vehicle Security: A Taxonomy of Attacks and Defences , 2016, 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

[13]  Ayman I. Kayssi,et al.  SDN VANETs in 5G: An architecture for resilient security services , 2017, 2017 Fourth International Conference on Software Defined Systems (SDS).

[14]  Chan Yeob Yeun,et al.  Recent Advances in VANET Security: A Survey , 2015, 2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall).

[15]  Xiaodong Lin,et al.  A Privacy-Preserving Vehicular Crowdsensing-Based Road Surface Condition Monitoring System Using Fog Computing , 2017, IEEE Internet of Things Journal.

[16]  Rajkumar Buyya,et al.  Fog Computing: A Taxonomy, Survey and Future Directions , 2016, Internet of Everything.

[17]  Cheng Huang,et al.  Vehicular Fog Computing: Architecture, Use Case, and Security and Forensic Challenges , 2017, IEEE Communications Magazine.

[18]  Rodrigo Roman,et al.  Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..

[19]  Raja Lavanya,et al.  Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.

[20]  Pandi Vijayakumar,et al.  Comprehensive survey on security services in vehicular ad-hoc networks , 2016 .

[21]  Xiao Chen,et al.  Exploring Fog Computing-Based Adaptive Vehicular Data Scheduling Policies Through a Compositional Formal Method—PEPA , 2017, IEEE Communications Letters.

[22]  Ramesh Karri,et al.  Hardware and embedded security in the context of internet of things , 2013, CyCAR '13.

[23]  Joseph K. Liu,et al.  A Survey on Access Control in Fog Computing , 2018, IEEE Communications Magazine.

[24]  Guojun Wang,et al.  Secure VANETs: Trusted Communication Scheme Between Vehicles and Infrastructure Based on Fog Computing , 2019, Studies in Informatics and Control.

[25]  Desta Haileselassie Hagos,et al.  A Crowd-Based Intelligence Approach for Measurable Security, Privacy, and Dependability in Internet of Automated Vehicles with Vehicular Fog , 2018, Mob. Inf. Syst..

[26]  Samee Ullah Khan,et al.  Potentials, trends, and prospects in edge technologies: Fog, cloudlet, mobile edge, and micro data centers , 2018, Comput. Networks.

[27]  Kyung Sup Kwak,et al.  Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications , 2010, Journal of Medical Systems.

[28]  Simon Parkinson,et al.  Fog computing security: a review of current applications and security solutions , 2017, Journal of Cloud Computing.

[29]  Mayank Dave,et al.  Secure and efficient key delivery in VANET using cloud and fog computing , 2017, 2017 International Conference on Computer, Communications and Electronics (Comptelix).

[30]  Chunqiang Hu,et al.  LoDPD: A Location Difference-Based Proximity Detection Protocol for Fog Computing , 2017, IEEE Internet of Things Journal.

[31]  Victor I. Chang,et al.  A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments , 2018, Comput. Secur..

[32]  Wei Ni,et al.  Anatomy of Threats to the Internet of Things , 2019, IEEE Communications Surveys & Tutorials.

[33]  Arun Venkataramani,et al.  Disaster Recovery as a Cloud Service: Economic Benefits & Deployment Challenges , 2010, HotCloud.