Security Scheme and Its Application towards Vehicular Computing
Keywords:
Road-side infrastructure;, Vehicular computing;, short-range communication;Abstract
Cloud computing is a colloquial expression used to describe a variety of different types of computing that involves a large number of computers that are connected through real time communication network. Cloud computing is a ability to run a program on many connected computers at the same time. Another technology VANET uses moving car as nodes in a network to create a mobile network, allowing a car approximately 100 to 300 meters each other to connectand in turn, create a network with a wide range. Vehicular Computing is a similar toVANET, which have 2 types: infrastructure based VCand autonomous VC. This work is using infrastructure based VC; drivers will be able to access services by network communications involving the roadside infrastructure. Security challenges, which provides the most extensive analysis of the document in the public arena. Although security issues have received attention in cloud computing and vehicular network and identify security challenges that are specific to VCs. E.g.: challenges interface, tangled identifies and locations and the complexity of establishing trust relationships among multiple players caused by intermittent short- range communications. We provide a privacy and security in cloud computing in this paper for vehicular computing.
References
“Data centre at the airport: Reasoning about time-dependent parking lot occupancy,”IEEE Tans. ParallelDistrib. Sys., 2012.
G. Yan, S. Olariu, and M. C.Weigle, “Providing VANET security through active position detection,” Comput.Commun., vol. 31, no. 12, pp. 2883–2897, Jul. 2008, Special Issue on Mobility Protocols for ITS/VANET.
G. Yan and S. Olariu, “A probabilistic analysis of link duration in vehicular ad hoc networks,”IEEE Trans. Intell. Transp. Syst., vol. 12, no. 4,pp. 1227–1236, Dec. 2011.
G. Yan and S. Olariu, “An efficient geographic location-based security mechanism for vehicular ad hoc networks,” in Proc. IEEE Int. Symp. TSP, Macau SAR, China, Oct. 2009, pp. 804–809.
F.-Y. Wang, “Parallel control and management for intelligent transportation system: Concept architectures, and applications,” IEEE Trans.Intell . Transp. Syst., vol. 11, no. 3, pp. 630–638, Sep. 2010.
D. Huang, S. Misra, G. Xue, and M. Verma, “PACP: An efficient pseudonymous authentication based conditional privacy protocol for vanets,” IEEE Trans. Intell. Transp. Syst., vol. 12, no. 3, pp. 736–746, Sep. 2011.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2014 COMPUSOFT: An International Journal of Advanced Computer Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.
©2023. COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY by COMPUSOFT PUBLICATION is licensed under a Creative Commons Attribution 4.0 International License. Based on a work at COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY. Permissions beyond the scope of this license may be available at Creative Commons Attribution 4.0 International Public License.