Secure intelligent traffic light control using fog computing

https://doi.org/10.1016/j.future.2017.02.017Get rights and content

Highlights

  • Our schemes may resist the attacks from malicious vehicles.

  • Our schemes can avoid the problem of single-point failure.

  • Our improved scheme is fog device friendly.

Abstract

As the number of vehicles grows, traffic efficiency is becoming a worldwide problem. Intelligent transportation system aims to improve the traffic efficiency, where intelligent traffic light control is an important component. Existing intelligent traffic light control systems face some challenges, e.g., avoiding heavy roadside sensors, resisting malicious vehicles and avoiding single-point failure. To cope with those challenges, we propose two secure intelligent traffic light control schemes using fog computing whose security are based on the hardness of the computational Diffie–Hellman puzzle and the hash collision puzzle respectively. The two schemes assume the traffic lights are fog devices. The first scheme is a simple extension of a recent scheme for defending denial-of-service attacks. We show this simple extension is not efficient when the vehicle density is high. The second scheme is much more efficient and is fog device friendly. Even the vehicle density is high, the traffic light may verify the validity of the vehicles efficiently.

Introduction

As the number of vehicles is increasing throughout the world, particularly in large urban areas, traffic efficiency is becoming a worldwide problem. Traffic lights (or traffic signals)  [1], [2] are signaling devices which are used to optimize traffic efficiency by alternating the signal phase for traffic flow control at road intersections, pedestrian crossings, and other places. Traditional traffic lights usually have fixed-cycles, i.e., the lights change at regular intervals. This is inefficient, since traffic situation is constantly changing. Intelligent transportation system (ITS) has been designed to control the traffic flow adaptively according to the realtime traffic situation, in which traffic lights also become intelligent. An intelligent traffic light may alternate the signal phase with an efficient traffic schedule algorithm (such as fuzzy logic, evolutionary algorithms and reinforcement learning) to minimize the waiting times of road users based on the position, speed and direction of the road users.

Existing methods for intelligent traffic light control use two strategies: fixed-time one and traffic-responsive one. In fixed-time strategy, several signal plans corresponding to different divisions of time (e.g., 7:00 am to 9:00 am) are predetermined based on the historical traffic flow data. A traffic light is periodically changed according to the predetermined signal plans. For instances, the urban traffic control system  [3] and TRANSYT  [4] etc., are the intelligent traffic light control systems in this catalog. We note that such systems are not real time and only applicable when the demand is fairly stable within each division of time. They are inefficient to respond to sudden changes in traffic flow caused by accidents or emergency cases. Traffic-responsive strategy overcomes above limitation by making use of current traffic information to optimize the settings of the traffic lights. The key problem of this strategy is how to forecast the incoming vehicles. Generally, we have following methods.

The first one is to use pavement loop detectors. The systems in this category include Sydney coordinated adaptive traffic system (SCATS)  [5] and split, cycle, and offset optimization techniques (SCOOT)  [6]. In such systems, the loop detectors are able to detect the vehicles when they pass through the loop detectors. Then the loop detectors may send the traffic situation detected to the traffic signal controller through wired links. The traffic signal controller then adjusts the traffic light based on the data received. Such systems are able to adjust the traffic light according to the real time traffic situation. However, pavement loop detectors are usually heavy to use. A road needs to be torn up during installation. Hence, the traffic is usually disrupted during installation. Inductive loop is also prone to breakage as a result of other construction. Therefore, it is inconvenient for large scale deployment.

The second one is to employ video-based traffic detection systems. For example, Reno, NV, USA is a city which is using video-based traffic detection systems. In such system, human operators sitting in a control room collect traffic data through video cameras, and adjust the duration of red lights based on current traffic flow. But this system requires a high degree of human intervention. To deal with this problem, automated vision-based approaches  [7], [8] were proposed. In such systems, video image processing technique is used to detect the traffic conditions. The controller then adjusts the light based on the traffic conditions detected. Compared with the loop detectors, the video cameras can provide more information of the vehicles. However, video image recognition is still a challenging task. Moreover, some environmental factors (such as shadow and reflection of light) may also influence the detection accuracy.

The third one is to use wireless sensor networks (WSNs)  [9], [10], [11], [12]. In a WSN based traffic light control system  [13], [14], [15], detecting nodes are distributed on both sides of the road. When vehicles enter the monitored region where the detecting nodes are deployed, the detecting nodes send the status information of the vehicles to the control nodes. Finally, based on the received information, the control nodes control the alternating of the signal phase. But there are some restrictions in this method. One of the problems is due to the fact that large number of detecting nodes may exist in the system which implies high maintenance cost. Further, the security of the WSN system is difficult to guarantee. The detecting nodes can be corrupted, and interfering signals can be generated by attackers to mislead the control nodes.

Recently, vehicular ad hoc network (VANET)  [16], [17], [18], [19] has attracted more and more attention from both industry and academic community. In VANET, a vehicle can communicate with nearby vehicles and roadside units (RSUs) using the DSRC protocol. Several intelligent traffic light control systems are already designed in VANET environment. In  [20], [21], [22], VANETs are used to help a traffic light controller to collect traffic data. However, security issues are not studied in existing schemes. In fact, malicious vehicles may exist in VANETs. A malicious vehicle may send fake information to the traffic light controller for its own profit. For instance, a malicious vehicle may pretend to be multiple vehicles, such that the vehicle may get a higher priority to pass through an intersection. Further, these schemes (as well as the schemes using pavement loop detectors, videos or WSNs) assume the traffic lights are maintained by a remote central controller (e.g., a server or a cloud). However, since all the traffic lights have to communicate with the controller frequently for decision, these schemes may result in large latency. In the worst case, if the communication channel between a traffic light and the controller is interrupted, the system fails.

Fog computing  [23] is a new technique which was put forward by Cisco. In fog computing, users utilize a collaborative multitude of end-user clients or near-user edge devices to carry out the operation of computation and storage. In traffic light control schemes using fog computing  [24], a traffic light may act as a fog device who may interact with neighboring traffic lights and nearby vehicles. Based on the received information, the traffic light may run a traffic schedule algorithm to adjust the traffic light. Since the traffic schedule algorithm is run by the traffic light, compared with the previous methods, this method has the property of low-latency. This paper studies intelligent traffic light control in VANET using fog computing.

Existing traffic light control schemes in VANET assume the vehicles are honest, i.e., the vehicles report their status information honestly, and, have the problem of single-point failure. To deal with these problems, we propose two secure traffic light control schemes in VANET using fog computing.

Firstly, we propose a basic scheme for traffic light control in VANET using fog computing. The basic scheme is a simple extension of the scheme in  [25] which is initially used to defend denial-of-service (DOS) attacks. Similar to the schemes in  [25], the security of our scheme is based on the computational Diffie–Hellman (CDH) puzzle (a type of cryptographic puzzle) which states that, in a cyclic group G with prime order q, given g,ga,gbG for unknown a,b, it is time-consuming to compute gab. In our scheme, a pool of CDH puzzles with designated hardness are generated by a traffic light. The puzzles are then encrypted using a location based encryption (LBE) scheme (see Section  2.3) and broadcasted to the nearby vehicles. Only the vehicles within the specified area are able to get the puzzles. A vehicle has to solve a puzzle in a negotiated time period. Once the puzzle is solved, a proof is generated and sent back to the traffic light by the vehicle. The traffic light has to verify the validity of the proof. Based on the proofs, the traffic light may run a traffic schedule algorithm to adjust the traffic light plans. Our scheme is secure, privacy preserving and costly sensor free. We note that, in our basic scheme, a traffic light needs to generate and verify one proof for each vehicle in a time slot. Considering that the fog devices are not those with strong computation and storage capabilities, the computation and storage overheads of a traffic light might be too high to afford if the number of vehicles is very large. We then propose an improved scheme.

In our improved scheme, a traffic light only needs to broadcast a single puzzle encrypted using an LBE scheme to nearby vehicles. Further, the traffic light just needs to perform very light computations to verify the validity of the proofs. The improved scheme is based on the hash collision puzzle. That is, given a hash function H, find (x,x) with xx such that H(x)=H(x). We note that, finding a collision is usually hard for a secure cryptographic hash function with long output. However, if the output is short enough, the collision problem is easy to solve. Our improved scheme is designed using such a cryptographic puzzle, i.e., a cryptographic hash function with short output. Benefit from the newly designed puzzle, a traffic light only needs to generate one puzzle for all the vehicles in each time slot. In this way, the computation and communication overheads of the traffic light are greatly reduced. Similar to our basic scheme, the improved scheme is secure, privacy preserving and costly sensor free. Moreover, the improved scheme also achieves fog device friendliness (see Section  2.2). Several experiments are also proposed to show the practicality of our scheme.

The rest of the paper is organized as follows. Section  2 is the background. The basic scheme and the improved scheme are proposed in Section  3 and Section  4 respectively. Section  5 presents the experiment results. Section  6 concludes the paper.

Section snippets

VANET and system architecture

With the advancement and wide deployment of wireless communication technologies, car manufactures and telecommunication industries recently gear up to equip each vehicle with on-board units (OBUs) that allow vehicles to communicate with each other as well as the roadside units (RSUs) through wireless communications. Such vehicular communication networks are known as VANETs which aim to enhance driving safety and improve drivers’ driving experiences. A VANET mainly consists of three kinds of

The basic scheme

The basic scheme is based on the CDH puzzle. To achieve the security requirements, the traffic lights generate one puzzle with hardness γ for each vehicle in each time slot. Only a vehicle who can solve the puzzle and generate a valid proof in a negotiated time period will be viewed as a valid vehicle. The scheme consists of six phases: System Setup, Registration, Puzzle Distribution, Proof Generation, Proof Verification and Decision. Fig. 3 illustrates the basic ideas.

[System Setup]

In this

Improvement

In the basic scheme, the number of the puzzles grows linearly as the number of the vehicles grows. If the number of the vehicles is huge, the computation and communication overheads ofRπ might be too heavy to afford. Besides, the basic scheme assumes that Rπ knows which vehicles are close to it. This requires those vehicles to broadcast their pseudonyms constantly which will bring extra communication overhead. Moreover, in the basic scheme, Rπ can only have the knowledge of the number of

Experimental analysis

In this section, we perform several experiments to show the practicality of our scheme. Since our improved scheme is much more efficient than the basic one, we only evaluate the hash collision puzzle based one here. The simulation was run on a Linux machine using an Intel Core i7-4790 at a frequency of 3.6 GHz. The cryptographic algorithms were implemented using MIRACL library. In our simulation, SHA-1 was chosen to construct a hash function with short output.

Fig. 8 shows the relation between

Conclusion

Fog computing provides a new method for intelligent traffic light control. In this paper, based on LBE and cryptographic puzzle, we propose two schemes for intelligent traffic light control using fog computing. In our basic scheme, a traffic light, i.e., a fog device, needs to generate and verify one puzzle for each vehicle in a time slot. To reduce the computation and communication overhead of the traffic light, we propose an improved scheme, in which a traffic light only needs to broadcast a

Acknowledgments

This work was supported in part by the NSF of China under Grants 61572198, 61632012; the PAPD; the CICAEET; the China Scholarship Council.

Jian Liu is a third year master student at School of Computer Science and Software Engineering, East China Normal University, China. He received his B.S. degree in computer science and technology from Nanjing Aeronautics and Astronautics University, China. His research interests include information security, cloud security and VANET security.

References (32)

  • P. Kumar et al.

    Framework for real-time behavior interpretation from traffic video

    IEEE Trans. Intell. Transp. Syst.

    (2005)
  • K.K.R. Choo, A domain-based multi-cluster SIP solution for mobile ad hoc network, in: Int. Conf. Security Privacy...
  • J. Li et al.

    Privacy-preserving public auditing protocol for low performance end devices in cloud

    IEEE Trans. Inf. Forensics Secur.

    (2016)
  • J. Nam et al.

    Efficient and anonymous two-factor user authentication in wireless sensor networks: Achieving user anonymity with lightweight sensor computation

    PLoS One

    (2015)
  • W.J. Seo, R. Islam, M.K. Khan, K.K.R. Choo, A secure cross-domain SIP solution for mobile ad hoc network using dynamic...
  • W. Chen, L. Chen, Z. Chen, T. Shiliang, A realtime dynamic traffic control system based on wireless sensor network, in:...
  • Cited by (136)

    View all citing articles on Scopus

    Jian Liu is a third year master student at School of Computer Science and Software Engineering, East China Normal University, China. He received his B.S. degree in computer science and technology from Nanjing Aeronautics and Astronautics University, China. His research interests include information security, cloud security and VANET security.

    Jiangtao Li is a Ph.D. candidate at School of Computer Science and Software Engineering, East China Normal University, China. He received his B.S. degree (awarded outstanding graduates) in mathematics and applied mathematics from Henan Normal University, China. His research interests include information security, public key cryptography and network security. He is currently a visiting student at ENS Lyon, France.

    Lei Zhang received his Ph.D. degree in computer engineering from Universitat Rovira i Virgili, Tarragona, Spain, in 2010. Since then, he has been with Universitat Rovira i Virgili, Tarragona, Spain, as a Postdoctoral Researcher. He is a full Professor with the School of Computer Science and Software Engineering, East China Normal University, Shanghai, China. He has been a holder/co-holder of more than 10 China/Spain funded (key) projects. His fields of activity are information security, cryptography, VANET security, cloud security, and data privacy. He has authored over 60 publications. He is the editors of several international journals, and, was the Guest Editor of Future Generation Computer Systems. He has served in the program committee of more than 20 international conferences in information security and privacy. He is a member of IEEE.

    Feifei Dai is now working for the master’s degree with School of Computer Science and Software Engineering, East China Normal University, China. Her research interests include security and efficiency in mobile cloud computing.

    Yuanfei Zhang is a master student at School of Computer Science and Software Engineering, East China Normal University, China. His research interests include cryptography, cloud security and VANET security.

    Xinyu Meng is a Ph.D. candidate at School of Computer Science and Software Engineering, East China Normal University, China. Her research interests include cryptography, cloud security and VANET security.

    Jian Shen received his B.E. degree from Nanjing University of Information Science and Technology, Nanjing, China, in 2007 and the M.E. degree in Computer Science from Chosun University, Gwangju, Korea, in 2009. Since 2009, he is working toward the Ph.D. degree in Computer Science from Chosun University, Gwangju, Korea. Currently, he is a professor at Nanjing University of Information Science and Technology. His research interests include network security, security systems, mobile computing and networking, ad hoc networks and systems, and ubiquitous sensor networks.

    View full text