Group Security of V2Vusing Cloud Computing Processing and 4G Wireless Services

##plugins.themes.academic_pro.article.main##

Biswajit Panja
DAVID MORRISON
PRIYANKA MEHARIA
BHARAT BHARAT
ATUL PRAKASH

Abstract

Vehicle to Vehicle (V2V) interfaces will provide the future of safe driving. Implemented along V2I (Vehicle to Interface) setups, a driver will be more aware of their surroundings and traffic will be less of a hazard. Companies such as Google are trying to make cars that drive themselves through external sensors and internal maps. The security issues in V2V communication are vast and still being solved. Telecommunication companies have been working in turn to implement cloud computing to improve what they can offer their data users. They have been consistent with their improvements of coverage and data transfer speed. The creation of 4G LTE has shown great promise for what can be done with data transfers and minimizing tower loads. This research paper takes a look at how the system can be protected against outside intrusions. It uses a Cloud to do computations, making it more difficult to steal data from the cars themselves. The system is designed to be in constant communication with the cloud to prevent any data theft, and presents methods for encrypting the data sent between the cloud and the cars. It also addresses the issue of tower load, by creating car groups to lower the difficulty of communicating in high traffic situations. These car groups communicate with one car, the lead car which is the only car that is communicating directly with the cloud. It sends and receives messages which are then distributed amongst the group, including but not limited to car locations, media and security keys. Cars that are separated from a group are treated as the lead car of a single car group, and cars that are completely separated from the system must first validate themselves through the cloud.

##plugins.themes.academic_pro.article.details##

How to Cite
Biswajit Panja, DAVID MORRISON, PRIYANKA MEHARIA, BHARAT BHARAT, & ATUL PRAKASH. (2014). Group Security of V2Vusing Cloud Computing Processing and 4G Wireless Services. International Journal of Next-Generation Computing, 5(3), 218–232. https://doi.org/10.47164/ijngc.v5i3.71

References

  1. Alexiou, N., Gisdakis, S., Lagana, M. ` , and Papadimitratos, P. 2013. Towards a secure and privacy-preserving multi-service vehicular architecture. In 14th International Symposium and Workshops on a World of Wireless, Mobile and Multimedia Networks (WoWMoM). IEEE, Madrid, pp.1–6.
  2. Alexiou, N., Lagana, M. ` , Gisdakis, S., Khodaei, M., and Papadimitratos, P. 2013. Vespa: Vehicular security and privacy-preserving architecture. In 2nd ACM workshop on Hot topics on wireless network security and privacy. ACM, pp.19–24.
  3. Baldini, G., Mahieu, V., Fovino, I. N., Trombetta, A., and Taddeo, M. 2013. Identity-based security systems for vehicular ad-hoc networks. In International Conference on Connected Vehicles and Expo (ICCVE). IEEE, pp. 672–678.
  4. Crosby, G. V. and Vafa, F. 2013. Wireless sensor networks and lte-a network convergence. In 38th Conference on Local Computer Networks (LCN). IEEE, Sydney, NSW, pp. 731–734.
  5. Leinmuuller, T. ¨ , Buttyan, L., Hubaux, J. P., Kargl, F., Kroh, R., Papadimitratos, P., Raya, M., and Schoch, E. 2006. Sevecom - secure vehicle communication. In IST Mobile Summit.
  6. Liao, C., Chang, J., Lee, I., and Venkatasubramanian, K. K. 2013. A trust model for vehicular network-based incident reports. In 5th International Symposium on Wireless Vehicular Communications (WiVeC). IEEE, Dresden, pp. 1–5.
  7. Mangel, T. and Hartenstein, H. 2011. An analysis of data traffic in cellular networks caused by inter-vehicle communication at intersections. In Intelligent Vehicles Symposium (IV). pp. 473–478.
  8. Panja, B., Morrison, D., Turner, S., and Meharia, P. 2014. Integration of v2v with cloud computing to provide group security through the use of 4g lte. In 9th International Conference on Cyber Warfare & Security. Academic Conferences Limited, pp.167.
  9. Rangarajan, S., Verma, M., Kannan, A., Sharma, A., and Schoen, I. 2012. V2c: a secure vehicle to cloud framework for virtualized and on demand service provisioning. In International Conference on Advances in Computing, Communications and Informatics.
  10. Sagstetter, F., Lukasiewycz, M., Steinhorst, S., Wolf, M., Bouard, A., Harris, W. R., Jha, S., Peyrin, T., Poschmann, A., and Chakraborty, S. 2013. Security challenges in automotive hardware/software architecture design. In Conference on Design, Automation and Test in Europe. EDA Consortium, pp. 458–463.
  11. Seong-Woo, K. and Seung-Woo, S. 2012. Cooperative unmanned autonomous vehicle control for spatially secure group communications. Selected Areas in Communications, IEEE Journal 30, 5 (June), pp.870 – 882.
  12. Tsuboi, Tsutomu, and Sekiguchi, T. 2014. Optimization for wireless vehicular network system in urban area. In Communication Technologies for Vehicles. Springer International Publishing, pp. 126–142.
  13. Wang, E. K., Ye, Y., and Xu, X. 2014. Location-based distributed group key agreement scheme for vehicular ad hoc network. International Journal of Distributed Sensor Networks.
  14. Zhu, M. and Martinez, S. 2012. On resilient consensus against replay attacks in operator-vehicle networks. In American Control Conference (ACC). pp.3553–3558.