Skip to main content

2022 | OriginalPaper | Buchkapitel

Cooperative Agent-Based Location Validation for Vehicular Clouds

verfasst von : Shailaja S. Mudengudi, Mahabaleshwar S. Kakkasageri

Erschienen in: IoT and Analytics for Sensor Networks

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The evolution of Intelligent Technology Systems (ITS) has made possible the designing of vehicles with more sophisticated computing, communicating, and sensing capabilities. Vehicular Cloud (VC) magnifies these capabilities by cost-effectively sharing their resources. Location information about a node plays a prime role in many VC services which are based on the location of the user node. In this paper, we present a cooperative agent-based location verification framework for VC. Central Authority (CA), a trusted entity that coordinates the activities in VC, takes care of the location verification process with the help of special nodes known as verifier nodes. Verifier nodes are distributed in the network randomly and secretly. The presence of such nodes is known only to the CA, which makes it stronger in terms of security.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Kopylova, Y., Farkas, C., & Wenyuan, Xu. (2011). Accurate accident reconstruction in VANET. In IFIP Annual Conference on Data and Applications Security and Privacy (vol. 26, pp. 271–279). Berlin: Springer. Kopylova, Y., Farkas, C., & Wenyuan, Xu. (2011). Accurate accident reconstruction in VANET. In IFIP Annual Conference on Data and Applications Security and Privacy (vol. 26, pp. 271–279). Berlin: Springer.
2.
Zurück zum Zitat Huang, B., Cheng, X., & Cheng, W. (2018). Enhancing negative messages broadcasting with meet-table and TTL in VANET. Procedia Computer Science, 129, 185–187.CrossRef Huang, B., Cheng, X., & Cheng, W. (2018). Enhancing negative messages broadcasting with meet-table and TTL in VANET. Procedia Computer Science, 129, 185–187.CrossRef
3.
Zurück zum Zitat VinothChakkaravarthy, G., Lavanya, R., & Alli, P. (2012). Communication efficient distributed decentralized key management framework for message authentication in vanet. In International Conference on Advances in Communication, Network, and Computing (vol. 3, pp. 405–408). VinothChakkaravarthy, G., Lavanya, R., & Alli, P. (2012). Communication efficient distributed decentralized key management framework for message authentication in vanet. In International Conference on Advances in Communication, Network, and Computing (vol. 3, pp. 405–408).
4.
Zurück zum Zitat Soyturk, M., Muhammad, K. N., Avcil, M. N., Kantarci, B., & Matthews, J. (2016). From vehicular networks to vehicular clouds in smart cities. SmartCities and Homes, 12, 149–171. Soyturk, M., Muhammad, K. N., Avcil, M. N., Kantarci, B., & Matthews, J. (2016). From vehicular networks to vehicular clouds in smart cities. SmartCities and Homes, 12, 149–171.
5.
Zurück zum Zitat Lee, E., Lee, E., Gerla, M., & Oh, S. Y. (2014). Vehicular cloud networking: Architecture and design principles. IEEE Communications Magazine, 52, 148–155.CrossRef Lee, E., Lee, E., Gerla, M., & Oh, S. Y. (2014). Vehicular cloud networking: Architecture and design principles. IEEE Communications Magazine, 52, 148–155.CrossRef
6.
Zurück zum Zitat Boukerche, A., & Robson, E. (2018). Vehicular cloud computing: Architectures, applications, and mobility. Computer Networks, 135, 171–189. Boukerche, A., & Robson, E. (2018). Vehicular cloud computing: Architectures, applications, and mobility. Computer Networks, 135, 171–189.
7.
Zurück zum Zitat Xue, X., Lin, N., Ding, J., & Ji, Y. (2010) A trusted neighbor table based location verificationfor VANET Routing. In IET 3rd International Conference on Wireless, Mobile and Multimedia Networks (ICWMNN 2010), Beijing (pp. 1–5). Xue, X., Lin, N., Ding, J., & Ji, Y. (2010) A trusted neighbor table based location verificationfor VANET Routing. In IET 3rd International Conference on Wireless, Mobile and Multimedia Networks (ICWMNN 2010), Beijing (pp. 1–5).
8.
Zurück zum Zitat Ahmad, F., Kazim, M., Adnane, A., & Awad, A. (2015). Vehicular cloud networks: Architecture, applications and security issues. In 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC) (vol. 5, pp. 571–576). Ahmad, F., Kazim, M., Adnane, A., & Awad, A. (2015). Vehicular cloud networks: Architecture, applications and security issues. In 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC) (vol. 5, pp. 571–576).
9.
Zurück zum Zitat Wu, H.-T., & Homg, G.-J. (2016). Vehicular cloud network and information security mechanisms. International Conference on Advanced Materials for Science and Engineering (ICAMSE), 7, 196–199.CrossRef Wu, H.-T., & Homg, G.-J. (2016). Vehicular cloud network and information security mechanisms. International Conference on Advanced Materials for Science and Engineering (ICAMSE), 7, 196–199.CrossRef
10.
Zurück zum Zitat Qin, Bo., Qianhong, Wu., Domingo-Ferrer, J., & Zhang, L. (2011). Preserving security and privacy in large-scale VANETs. International Conference on Information andCommunications Security, 8, 121–135. Qin, Bo., Qianhong, Wu., Domingo-Ferrer, J., & Zhang, L. (2011). Preserving security and privacy in large-scale VANETs. International Conference on Information andCommunications Security, 8, 121–135.
11.
Zurück zum Zitat Nosouhi, M. R., Yu, S., Zhou, W., Grobler, M., & Keshtiar, H. (2020). Blockchain for secure location verification. Journal of Parallel and Distributed Computing, 136, 40–51. Nosouhi, M. R., Yu, S., Zhou, W., Grobler, M., & Keshtiar, H. (2020). Blockchain for secure location verification. Journal of Parallel and Distributed Computing, 136, 40–51.
12.
Zurück zum Zitat Foresti, S., & Jajodia, S. (2010). Data and applications security and privacy XXIV. In 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21–23, 2010, Proceedings (vol. 6166, pp. 112–126). Foresti, S., & Jajodia, S. (2010). Data and applications security and privacy XXIV. In 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21–23, 2010, Proceedings (vol. 6166, pp. 112–126).
13.
Zurück zum Zitat Miao, C., et al. (2015). Collaborative localization and location verification in WSNs. Sensors (Basel, Switzerland), 15, 10631–49. Miao, C., et al. (2015). Collaborative localization and location verification in WSNs. Sensors (Basel, Switzerland), 15, 10631–49.
14.
Zurück zum Zitat Sheet, D. K., Kaiwartya, O., Abdullah, A. H., & Hassan, A. N. (2015). Location information verification cum security using TBM in geocast routing. Procedia Computer Science, 70, 219–225. Sheet, D. K., Kaiwartya, O., Abdullah, A. H., & Hassan, A. N. (2015). Location information verification cum security using TBM in geocast routing. Procedia Computer Science, 70, 219–225.
15.
Zurück zum Zitat Irain, M., Jorda, J., & Mammeri, Z. (2017). Landmark-based data location veryfication in the cloud: Review of approaches and challenges. Journal of Cloud Computing, 1, 31–34.CrossRef Irain, M., Jorda, J., & Mammeri, Z. (2017). Landmark-based data location veryfication in the cloud: Review of approaches and challenges. Journal of Cloud Computing, 1, 31–34.CrossRef
16.
Zurück zum Zitat Lim, J., Kim, S., & Heekuck, Oh. (2007). A secure location service for ad hoc position-based routing using self-signed locations. International Conference on Cryptologyand Network Security, 2, 121–132.CrossRef Lim, J., Kim, S., & Heekuck, Oh. (2007). A secure location service for ad hoc position-based routing using self-signed locations. International Conference on Cryptologyand Network Security, 2, 121–132.CrossRef
17.
Zurück zum Zitat Ni, X., Luo, J., Zhang, B., Teng, J., & Bai, X. (2012). Mpsl: A mobile phone-based physical-social location verification system. In International Conference on Wireless Algorithms, Systems, and Applications (vol. 5, pp. 488–499). Berlin: Springer. Ni, X., Luo, J., Zhang, B., Teng, J., & Bai, X. (2012). Mpsl: A mobile phone-based physical-social location verification system. In International Conference on Wireless Algorithms, Systems, and Applications (vol. 5, pp. 488–499). Berlin: Springer.
18.
Zurück zum Zitat Odun-Ayo, I., Ananya, M., Agono, F., & Goddy-Worlu, R. (2018). Cloud computing architecture: A critical analysis. In 2018 18th International Conference on Computational Science and Applications (ICCSA) (vol. 9, pp. 1–7). Odun-Ayo, I., Ananya, M., Agono, F., & Goddy-Worlu, R. (2018). Cloud computing architecture: A critical analysis. In 2018 18th International Conference on Computational Science and Applications (ICCSA) (vol. 9, pp. 1–7).
19.
Zurück zum Zitat Ries, T., Fusenig, V., Vilbois, C., & Engel, T. (2011). Verification of data location in cloud networking. In 2011 Fourth IEEE International Conference on Utility and Cloud Computing (pp. 439–444). Ries, T., Fusenig, V., Vilbois, C., & Engel, T. (2011). Verification of data location in cloud networking. In 2011 Fourth IEEE International Conference on Utility and Cloud Computing (pp. 439–444).
20.
Zurück zum Zitat Abar, S., Theodoropoulos, G. K., Lemarinier, P., & O’Hare, G. M. (2017). Agent based modelling and simulation tools: A review of the state-of-art software. Computer Science Review, 24, 13–33. Abar, S., Theodoropoulos, G. K., Lemarinier, P., & O’Hare, G. M. (2017). Agent based modelling and simulation tools: A review of the state-of-art software. Computer Science Review, 24, 13–33.
21.
Zurück zum Zitat Haidar, A. N., & Abdallah, A. E. (2009). Formal modelling of pki based authentication. Electronic Notes in Theoretical Computer Science, 235, 55–70. Haidar, A. N., & Abdallah, A. E. (2009). Formal modelling of pki based authentication. Electronic Notes in Theoretical Computer Science, 235, 55–70.
Metadaten
Titel
Cooperative Agent-Based Location Validation for Vehicular Clouds
verfasst von
Shailaja S. Mudengudi
Mahabaleshwar S. Kakkasageri
Copyright-Jahr
2022
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-16-2919-8_16

Neuer Inhalt