A Trust and Priority Based Code Updated Approach to Guarantee Security for Vehicles Network

With the development of smart equipment and technologies, vehicular networks (VNs) are expected to have wide-range applications in intelligent transportation system services. The software code in these devices often contains bugs that can be remotely exploited by attackers, so gathering software vulnerabilities information and updating program codes timely in those devices are crucial for network security. To improve the security of VN, a Complete Software Update based on Trust and Priority (CSUTP) scheme is proposed. The scheme includes two processes: one is the process of collecting status information of program codes from devices to data centers and another is the process of disseminating program codes from data centers to devices. When collecting status information of program codes, mobile vehicles pick up the status information with higher priority due to the limited storage space. Furthermore, mobile vehicles can also disseminate the status information to data centers though another mobile vehicles which is with higher trust. Thus, the success arrival ratio and the coverage ratio of collecting status information of program codes are improved. In the process of dissemination program codes, data centers select the mobile vehicles with higher trust and higher coverage ratio to disseminate program codes. The comprehensive experimental results indicate that the performance of CSUTP scheme is better than the random program codes diffusion and collection scheme (RPCDC). The CSUTP scheme increases data coverage ratio by 25%–86.67% and success arrival ratio by 52.119%–93.65%. The ratio of data redundancy in the CSUTP scheme to the RPCDC scheme is about 54.07%–62.061%, and the ratio of dissemination delay in the CSUTP scheme to the RPCDC scheme is about 80.854%–91.492%.

[1]  Kaoru Ota,et al.  Orchestrating Data as a Services-Based Computing and Communication Model for Information-Centric Internet of Things , 2018, IEEE Access.

[2]  Naixue Xiong,et al.  A Cross-Layer Optimized Opportunistic Routing Scheme for Loss-and-Delay Sensitive WSNs , 2018, Sensors.

[3]  Jie Wu,et al.  Understanding Graph-Based Trust Evaluation in Online Social Networks , 2016, ACM Comput. Surv..

[4]  Qing Liu,et al.  On the hybrid using of unicast-broadcast in wireless sensor networks , 2017, Comput. Electr. Eng..

[5]  Enzo Baccarelli,et al.  Energy-Efficient Adaptive Resource Management for Real-Time Vehicular Cloud Services , 2019, IEEE Transactions on Cloud Computing.

[6]  Laurence T. Yang,et al.  Trace malicious source to guarantee cyber security for mass monitor critical infrastructure , 2018, J. Comput. Syst. Sci..

[7]  Lei Wang,et al.  Offloading in Internet of Vehicles: A Fog-Enabled Real-Time Traffic Management System , 2018, IEEE Transactions on Industrial Informatics.

[8]  Zhiwen Zeng,et al.  A Services Routing Based Caching Scheme for Cloud Assisted CRNs , 2018, IEEE Access.

[9]  Naixue Xiong,et al.  Differentiated Data Aggregation Routing Scheme for Energy Conserving and Delay Sensitive Wireless Sensor Networks , 2018, Sensors.

[10]  Jianfeng Ma,et al.  Verifiable Computation over Large Database with Incremental Updates , 2014, IEEE Transactions on Computers.

[11]  Zhetao Li,et al.  MSDG: A novel green data gathering scheme for wireless sensor networks , 2018, Comput. Networks.

[12]  Naixue Xiong,et al.  An Effective Delay Reduction Approach through a Portion of Nodes with a Larger Duty Cycle for Industrial WSNs , 2018, Sensors.

[13]  Lei Guo,et al.  On-Chip Hardware Accelerator for Automated Diagnosis Through Human–Machine Interactions in Healthcare Delivery , 2019, IEEE Transactions on Automation Science and Engineering.

[14]  Naixue Xiong,et al.  An Energy Conserving and Transmission Radius Adaptive Scheme to Optimize Performance of Energy Harvesting Sensor Networks , 2018, Sensors.

[15]  Yuxin Liu,et al.  Privacy-Preserving Protocol for Sink Node Location in Telemedicine Networks , 2018, IEEE Access.

[16]  Jin Li,et al.  A Hybrid Cloud Approach for Secure Authorized Deduplication , 2015, IEEE Transactions on Parallel and Distributed Systems.

[17]  Jun Cheng,et al.  Mobile Cyber Physical Systems: Current Challenges and Future Networking Applications , 2018, IEEE Access.

[18]  Anthony Ephremides,et al.  Energy-Efficient Broadcast and Multicast Trees in Wireless Networks , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[19]  Lei Guo,et al.  Quick Answer for Big Data in Sharing Economy: Innovative Computer Architecture Design Facilitating Optimal Service-Demand Matching , 2018, IEEE Transactions on Automation Science and Engineering.

[20]  Anfeng Liu,et al.  High-performance target tracking scheme with low prediction precision requirement in WSNs , 2018 .

[21]  Jin Li,et al.  Secure attribute-based data sharing for resource-limited users in cloud computing , 2018, Comput. Secur..

[22]  Jun Huang,et al.  Vehicular Fog Computing: Enabling Real-Time Traffic Management for Smart Cities , 2019, IEEE Wireless Communications.

[23]  Jie Wu,et al.  Effective Query Grouping Strategy in Clouds , 2017, Journal of Computer Science and Technology.

[24]  Youxian Sun,et al.  Towards balanced energy charging and transmission collision in wireless rechargeable sensor networks , 2017, Journal of Communications and Networks.

[25]  MengChu Zhou,et al.  Emotion-Aware Cognitive System in Multi-Channel Cognitive Radio Ad Hoc Networks , 2018, IEEE Communications Magazine.

[26]  Naixue Xiong,et al.  Construction Low Complexity and Low Delay CDS for Big Data Code Dissemination , 2018, Complex..

[27]  Mianxiong Dong,et al.  Adaptive Transmission Range Based Topology Control Scheme for Fast and Reliable Data Collection , 2018, Wirel. Commun. Mob. Comput..

[28]  Naixue Xiong,et al.  Caching Joint Shortcut Routing to Improve Quality of Service for Information-Centric Networking , 2018, Sensors.

[29]  Feng Xia,et al.  Green and Sustainable Cloud of Things: Enabling Collaborative Edge Computing , 2019, IEEE Communications Magazine.

[30]  Naixue Xiong,et al.  An Adaption Broadcast Radius-Based Code Dissemination Scheme for Low Energy Wireless Sensor Networks , 2018, Sensors.

[31]  Justin Cappos,et al.  Uptane: Security and Customizability of Software Updates for Vehicles , 2018, IEEE Vehicular Technology Magazine.

[32]  Yuxin Liu,et al.  Construction of Large-Scale Low-Cost Delivery Infrastructure Using Vehicular Networks , 2018, IEEE Access.

[33]  Weihua Zhuang,et al.  Distributed and Adaptive Medium Access Control for Internet-of-Things-Enabled Mobile Networks , 2017, IEEE Internet of Things Journal.

[34]  Naixue Xiong,et al.  Minimum-cost mobile crowdsourcing with QoS guarantee using matrix completion technique , 2018, Pervasive Mob. Comput..

[35]  Jie Wu,et al.  e-Sampling , 2017, ACM Trans. Auton. Adapt. Syst..

[36]  Sangheon Pack,et al.  The Software-Defined Vehicular Cloud: A New Level of Sharing the Road , 2017, IEEE Vehicular Technology Magazine.

[37]  Anfeng Liu,et al.  Feature Selection Method Based on Class Discriminative Degree for Intelligent Medical Diagnosis , 2018 .

[38]  Zhetao Li,et al.  Wireless Network Optimization via Physical Layer Information for Smart Cities , 2018, IEEE Network.

[39]  Anfeng Liu,et al.  DDSV: Optimizing Delay and Delivery Ratio for Multimedia Big Data Collection in Mobile Sensing Vehicles , 2018, IEEE Internet of Things Journal.

[40]  Anfeng Liu,et al.  Reliable Code Disseminations Through Opportunistic Communication in Vehicular Wireless Networks , 2018, IEEE Access.

[41]  MengChu Zhou,et al.  A Privacy-Preserving Message Forwarding Framework for Opportunistic Cloud of Things , 2018, IEEE Internet of Things Journal.

[42]  Jie Wu,et al.  Achieving reliable and secure services in cloud computing environments , 2017, Comput. Electr. Eng..

[43]  Zhiwen Zeng,et al.  Adaptive Beaconing Based MAC Protocol for Sensor Based Wearable System , 2018, IEEE Access.

[44]  G. Lakpathi,et al.  Identity-Based Encryption with Outsourced Revocation in Cloud Computing , 2016 .

[45]  Jie Wu,et al.  Dependable Structural Health Monitoring Using Wireless Sensor Networks , 2015, IEEE Transactions on Dependable and Secure Computing.