Vehicular cloud networks: Architecture and security

Book chapter


Ahmad, F., Kazim, M. and Adnane, Asma 2015. Vehicular cloud networks: Architecture and security. in: Springer.
AuthorsAhmad, F., Kazim, M. and Adnane, Asma
Abstract

Cloud computing has been widely adopted across the IT industry due to its scalable, cost-effective, and efficient services. It has many applications in areas such as healthcare, mobile cloud computing (MCC), and vehicular ad hoc networks (VANET). Vehicular cloud networks (VCN) is another application of cloud computing which is a combination of cloud and VANET technologies. It is composed of three clouds named vehicular cloud, infrastructure cloud, and traditional IT cloud. In this chapter, the three clouds involved in VCN are presented using a three-tier architecture, and the security issues related to each tier are described in detail. After describing the detailed architecture of VANET, their components, and their important characteristics, this chapter presents the architecture of VCN. It is followed by the detailed analysis of the threats to which each tier-cloud of VCN is vulnerable.

KeywordsCloud computing; Vehicular networks; Security; Threats
Year2015
PublisherSpringer
SeriesComputer communications and networks
ISBN978-3-319-25986-4
Web address (URL)http://hdl.handle.net/10545/620828
hdl:10545/620828
File
File Access Level
Open
Publication dates2015
Publication process dates
Deposited14 Nov 2016, 12:24
ContributorsUniversity of Derby
Permalink -

https://repository.derby.ac.uk/item/9406y/vehicular-cloud-networks-architecture-and-security

Download files


File
license.txt
File access level: Open

  • 41
    total views
  • 0
    total downloads
  • 3
    views this month
  • 0
    downloads this month

Export as

Related outputs

NOTRINO: a NOvel hybrid TRust management scheme for INternet-Of-vehicles
Ahmad, F., Kurugollu, Fatih, Kerrache, Chaker Abdelaziz, Sezer, Sakir and Liu, Lu 2021. NOTRINO: a NOvel hybrid TRust management scheme for INternet-Of-vehicles. IEEE Transactions on Vehicular Technology. https://doi.org/10.1109/TVT.2021.3049189
Energy-aware scheduling of streaming applications on edge-devices in IoT based healthcare
Tariq, Umair Ullah, Ali, Haider, Liu, Lu, Hardy, J., Kazim, M. and Ahmed, Waqar 2021. Energy-aware scheduling of streaming applications on edge-devices in IoT based healthcare. IEEE Transactions on Green Communications and Networking. https://doi.org/10.1109/tgcn.2021.3056479
MARINE: Man-in-the-middle attack resistant trust model IN connEcted vehicles
Ahmad, F., Kurugollu, Fatih, Adnane, Asma, Hussain, Rasheed and Hussain, Fatima 2020. MARINE: Man-in-the-middle attack resistant trust model IN connEcted vehicles. IEEE Internet of Things. https://doi.org/10.1109/JIOT.2020.2967568
CRT-BIoV: A cognitive radio technique for blockchain-enabled internet of vehicles
Rathee, Geetanjali, Ahmad, F., Kurugollu, Fatih, Azad, Muhammad, Iqbal, Razi and Imran, Muhammad 2020. CRT-BIoV: A cognitive radio technique for blockchain-enabled internet of vehicles. IEEE Transactions on Intelligent Transportation Systems. https://doi.org/10.1109/TITS.2020.3004718
A first look at privacy analysis of COVID-19 contact tracing mobile applications
Azad, Muhammad Ajmal, Arshad, Junaid, Akmal, Syed Muhammad Ali, Riaz, Farhan, Abdullah, Sidrah, Imran, Muhammad and Ahmad, F. 2020. A first look at privacy analysis of COVID-19 contact tracing mobile applications. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2020.3024180
Vehicular sensor networks: Applications, advances and challenges
Kurugollu, Fatih, Ahmed, Syed Hassan, Hussain, Rasheed, Ahmad, F. and Kerrache, Chaker Abdelaziz 2020. Vehicular sensor networks: Applications, advances and challenges. Sensors. https://doi.org/10.3390/s20133686
Towards a trusted unmanned aerial system using blockchain (BUAS) for the protection of critical infrastructure
Barka, Ezedin, Kerrache, Chaker Abdelaziz, Benkraouda, Hadjer, Shuaib, Khaled, Ahmad, F. and Kurugollu, Fatih 2019. Towards a trusted unmanned aerial system using blockchain (BUAS) for the protection of critical infrastructure. Transactions on Emerging Telecommunications Technologies. https://doi.org/10.1002/ett.3706
A comparative analysis of trust models for safety applications in IoT-enabled vehicular networks
Ahmad, F., Adnane, Asma, Hussain, Rasheed and Kurugollu, Fatih 2019. A comparative analysis of trust models for safety applications in IoT-enabled vehicular networks. IEEE.
Realization of blockchain in named data networking-based internet-of-vehicles
Ahmad, F., Kerrache, Chaker Abdelaziz, Kurugollu, Fatih and Hussain, Rasheed 2019. Realization of blockchain in named data networking-based internet-of-vehicles. IT Professional. https://doi.org/10.1109/MITP.2019.2912142
A framework for orchestrating secure and dynamic access of IoT services in multi-cloud environments.
Kazim, M., Liu, Lu, Zhu, Shao Ying and Zheng, Yongjun 2018. A framework for orchestrating secure and dynamic access of IoT services in multi-cloud environments. IEEE Access. https://doi.org/10.1109/ACCESS.2018.2873812
Man-In-The-Middle attacks in Vehicular Ad-Hoc Networks: Evaluating the impact of attackers’ strategies.
Ahmad, F., Adnane, Asma, Franqueira, Virginia N. L., Kurugollu, Fatih and Liu, Lu 2018. Man-In-The-Middle attacks in Vehicular Ad-Hoc Networks: Evaluating the impact of attackers’ strategies. Sensors. 18 (11), p. 4040. https://doi.org/10.3390/s18114040
A framework for orchestrating secure and dynamic access of IoT services in multi-cloud environments
Liu, Lu, Zhu, Shao Ying and Kazim, M. 2018. A framework for orchestrating secure and dynamic access of IoT services in multi-cloud environments. IEEE Access. https://doi.org/10.1109/ACCESS.2018.2873812
TEAM: A trust evaluation and management framework in context-enabled vehicular ad-hoc networks.
Ahmad, F., Franqueira, Virginia N. L. and Adnane, Asma 2018. TEAM: A trust evaluation and management framework in context-enabled vehicular ad-hoc networks. IEEE Access. https://doi.org/10.1109/ACCESS.2018.2837887
Faith in vehicles: A set of evaluation criteria for trust management in vehicular ad-hoc network
Ahmad, F., Hall, Jordan, Adnane, Asma and Franqueira, Virginia N. L. 2017. Faith in vehicles: A set of evaluation criteria for trust management in vehicular ad-hoc network. IEEE.
Internet-of-Things-based smart cities: Recent advances and challenges.
Mehmood, Yasir, Ahmad, F., Yaqoob, Ibrar, Adnane, Asma, Imran, Muhammad and Guizani, Sghaier 2017. Internet-of-Things-based smart cities: Recent advances and challenges. IEEE Communications Magazine. https://doi.org/10.1109/MCOM.2017.1600514
Privacy and trust in smart camera sensor networks
Adnane, Asma and Loughlin, Michael 2015. Privacy and trust in smart camera sensor networks. ARES. https://doi.org/10.1109/ARES.2015.31
A systematic approach for cyber security in vehicular networks
Ahmad, F., Adnane, Asma and Franqueira, Virginia N. L. 2016. A systematic approach for cyber security in vehicular networks. Journal of Computer and Communications. https://doi.org/10.4236/jcc.2016.416004
A novel context-based risk assessment approach in vehicular networks
Ahmad, F. and Adnane, Asma 2016. A novel context-based risk assessment approach in vehicular networks. IEEE. https://doi.org/10.1109/WAINA.2016.60
Evaluation platform for trust in vehicular ad hoc networks
Ahmad, F. and Adnane, Asma 2016. Evaluation platform for trust in vehicular ad hoc networks.
Evaluation criterias for trust management in Vehicular Ad-hoc Networks (VANETs)
Alriyami, Qasim, Adnane, Asma and Smith, Anthony 2014. Evaluation criterias for trust management in Vehicular Ad-hoc Networks (VANETs). IEEE.
Vehicular cloud networks: Architecture, applications and security issues
Ahmad, F., Kazim, M., Adnane, Asma and Abir, Awad 2015. Vehicular cloud networks: Architecture, applications and security issues. IEEE. https://doi.org/10.1109/UCC.2015.101
A survey on top security threats in cloud computing
Kazim, M. and Zhu, Shao Ying 2015. A survey on top security threats in cloud computing. International Journal of Advanced Computer Science and Applications (IJACSA). https://doi.org/10.14569/IJACSA.2015.060316#sthash.hDOJaK6L.dpuf
Design of trust based context aware routing protocol in vehicular networks
Ahmad, F. and Adnane, Asma 2015. Design of trust based context aware routing protocol in vehicular networks.
Trust-Based countermeasures for securing OLSR protocol
Adnane, Asma, Bidan, Christophe and de Sousa Júnior, Rafael Timóteo 2009. Trust-Based countermeasures for securing OLSR protocol. ," IEEE International Conference on Computational Science and Engineering. https://doi.org/10.1109/CSE.2009.130
Autonomic trust reasoning enables misbehavior detection in OLSR
Adnane, Asma, de Sousa Júnior, Rafael Timóteo, Bidan, Christophe and Mé, Ludovic 2008. Autonomic trust reasoning enables misbehavior detection in OLSR. ”. In Proceedings of the 2008 ACM symposium on Applied computing (SAC '08). ACM. https://doi.org/10.1145/1363686.1364173
Multipath optimized link state routing for mobile ad hoc networks
Yi, Jiazi, Adnane, Asma, David, Sylvain and Parrein, Benoît 2011. Multipath optimized link state routing for mobile ad hoc networks. ad hoc networks. https://doi.org/10.1016/j.adhoc.2010.04.007
Trust-based security for the OLSR routing protocol
Adnane, Asma, Bidan, Christophe and de Sousa Júnior, Rafael Timóteo 2013. Trust-based security for the OLSR routing protocol. Computer Communications. https://doi.org/10.1016/j.comcom.2013.04.003