Security Scheme and Its Application towards Vehicular Computing

Authors

  • Baby M
  • Bhuvaneshwari P
  • S. Uma

Keywords:

Road-side infrastructure;, Vehicular computing;, short-range communication;

Abstract

Cloud computing is a colloquial expression used to describe a variety of different types of computing that involves a large number of computers that are connected through real time communication network. Cloud computing is a ability to run a program on many connected computers at the same time. Another technology VANET uses moving car as nodes in a network to create a mobile network, allowing a car approximately 100 to 300 meters each other to connectand in turn, create a network with a wide range. Vehicular Computing is a similar toVANET, which have 2 types: infrastructure based VCand autonomous VC. This work is using infrastructure based VC; drivers will be able to access services by network communications involving the roadside infrastructure. Security challenges, which provides the most extensive analysis of the document in the public arena. Although security issues have received attention in cloud computing and vehicular network and identify security challenges that are specific to VCs. E.g.: challenges interface, tangled identifies and locations and the complexity of establishing trust relationships among multiple players caused by intermittent short- range communications. We provide a privacy and security in cloud computing in this paper for vehicular computing.

References

“Data centre at the airport: Reasoning about time-dependent parking lot occupancy,”IEEE Tans. ParallelDistrib. Sys., 2012.

G. Yan, S. Olariu, and M. C.Weigle, “Providing VANET security through active position detection,” Comput.Commun., vol. 31, no. 12, pp. 2883–2897, Jul. 2008, Special Issue on Mobility Protocols for ITS/VANET.

G. Yan and S. Olariu, “A probabilistic analysis of link duration in vehicular ad hoc networks,”IEEE Trans. Intell. Transp. Syst., vol. 12, no. 4,pp. 1227–1236, Dec. 2011.

G. Yan and S. Olariu, “An efficient geographic location-based security mechanism for vehicular ad hoc networks,” in Proc. IEEE Int. Symp. TSP, Macau SAR, China, Oct. 2009, pp. 804–809.

F.-Y. Wang, “Parallel control and management for intelligent transportation system: Concept architectures, and applications,” IEEE Trans.Intell . Transp. Syst., vol. 11, no. 3, pp. 630–638, Sep. 2010.

D. Huang, S. Misra, G. Xue, and M. Verma, “PACP: An efficient pseudonymous authentication based conditional privacy protocol for vanets,” IEEE Trans. Intell. Transp. Syst., vol. 12, no. 3, pp. 736–746, Sep. 2011.

Downloads

Published

2025-01-26

How to Cite

Baby, M., Bhuvaneshwari, P., & S. , U. (2025). Security Scheme and Its Application towards Vehicular Computing. COMPUSOFT: An International Journal of Advanced Computer Technology, 3(04), 743–745. Retrieved from https://ijact.in/index.php/j/article/view/640

Issue

Section

Original Research Article

Similar Articles

<< < 12 13 14 15 16 17 18 19 > >> 

You may also start an advanced similarity search for this article.