ArticlePDF Available

SECURITY CHALLENGES OF VEHICULAR CLOUD COMPUTING

Authors:

Abstract

Transportation technology has gained improvement drastically by leveraging the benefits of information technology. Vehicles are more intelligent than ever with the help of their connected capability and wireless networks. Modern vehicles can be connected to other vehicles, pedestrians, and roadside units to make a network. A novel concept of vehicular cloud computing came on the board to leverage computational facilities available on each vehicle and passenger. Vehicular cloud computing attempts to make a cloud of vehicles and roadside units. Vehicular cloud computing suffers from many challenges; security and privacy are some of these challenges. This research will reveal the core concepts of vehicular cloud computing and the security challenges it faces.
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology
and
Science
Volume:01/Issue:01/ January-2022 Impact Factor- 6.752 www.irjmets.com
m@International Research Journal of Modernization in Engineering, Technology
and Science
[1]
SECURITY CHALLENGES OF VEHICULAR CLOUD COMPUTING
Mr. Gopala Krishna Sriram*1
*1Software Architect, EdgeSoft Corp, McKinney, TX USA
ABSTRACT
Transportation technology has gained improvement drastically by leveraging the benefits of information
technology. Vehicles are more intelligent than ever with the help of their connected capability and wireless
networks. Modern vehicles can be connected to other vehicles, pedestrians, and roadside units to make a network.
A novel concept of vehicular cloud computing came on the board to leverage computational facilities available on
each vehicle and passenger. Vehicular cloud computing attempts to make a cloud of vehicles and roadside units.
Vehicular cloud computing suffers from many challenges; security and privacy are some of these challenges. This
research will reveal the core concepts of vehicular cloud computing and the security challenges it faces.
Keywords: Security, Cloud Computing, Authentication, Authorization, Availability, Data Confidentiality, Data
Integrity, Etc.
I. Introduction
The massive increase in the human population brings a proportional rise in vehicles. Statistics claim that one
billion vehicles travel on roads while increasing to twice by 2050[1]. Along with travel facilities, this rush of
vehicles brings many challenges like road jamming, roadside accident, pollution and many more. Intelligent
Transport System (ITS) is a fruitful effort to overcome these issues. These connected vehicles are equipped with
embedded systems like onboard unit (OBU), electronic control unit, application unit, head unit to achieve a target
of intelligent driving. In ITS, vehicles can communicate and share helpful information in the communication
models as Vehicle to Vehicle (V2V) communication for communication among vehicles. Vehicle to
Infrastructure (V2I) communication, vehicles can communicate with Road Side Unit (RSU) connected devices
along the road. It is also sometimes referred to as (Vehicle to Network) V2N. Vehicle to Pedestrian (V2P)
communication, vehicles communicate with pedestrian's on-road using computing devices such as mobile phones
or laptops.
Fig 1: vehicle to the everything (V2X) communication model[2]
A vehicular Ad-hoc Network (VANET) is formed to achieve the aforementioned connections. VANET is a wireless
networking model for providing safety and other not safety services to vehicles. In VANET, vehicles and other
connected devices can communicate using Dedicated Short Range Communication (DSRC), the most widely used
communication technology in V2X communication. Furthermore, Long Term Evolution (LTE), also described as
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology
and
Science
Volume:01/Issue:01/ January-2022 Impact Factor- 6.752 www.irjmets.com
www.irjmets.co
m
@International Research Journal of Modernization in Engineering, Technology
and Science
[2]
V2X-LTE, has gained massive interest in the V2X communication glob. 5G technologies are also making their room
in the V2X communication paradigm[2]
Vehicular Cloud Computing (VCC) is a new hybrid technology that attempts to leverage computing resources in
VANET devices and provide users with some valuable service for pay as you use fashion. VCC collaborates with
VANET entities like RSU or vehicles in a specific range (almost 300 meters) to make a cloud of shared resources
with ample computing facilities[3]. VCC aims to manage onboard computing, storage resources, sensing devices
and communication facilities to overcome resource limitations and overwhelmed service requirements. VCC
provides various applications; the most significant is traffic management, data outsourcing, outsource
computation, access control, sharing data and other value-added services such as infotainments, road safety, traffic
management and autonomous driving. Security of VCC is the biggest challenge in the VCC story because of its
specific characteristics like the multi-tenancy nature of the cloud, rapid resources, high vehicle mobility, and short-
range of shared devices. In the next section, we will provide security requirements and potential attacks.
II. Security analysis of VCC:
This section will present security requirements and a potential attack on VCC. Along with inhered cloud computing
security requirements, VCC has other security challenges. The leading characteristic of VCC that makes it
distinguish from cloud computing is dynamically changing the number of computing resources. Furthermore, VCC
vehicles are not trustworthy because they come in a share resource pool for a short period and then leave that
resource pool. No neighbor of one vehicle stays for an extended period, and each vehicle has a continuously
changing neighbor that causes trust issues[4].
Moreover, VCC can allow potential malicious vehicles to use the resources that provide computing services to
other resources. These features bring novel challenges added to cloud computing security challenges. We
taxonomy types of attack as below mentioned attack model.
Fig2: Attack model of VCC
In the rest of this section, we will explain each type of attack.
Internal vs External attack:
Internal attackers have authorized VCC members to enter and use VCC resources with legal access. While external
attackers are not authorized to enter VCC, they attack by maliciously entering the network. For example, they can
cause physical damage to RSU or other static infrastructure.
Active vs passive attack:
An active attack can instantly attack messages, signals, and other sources, such as injecting a false message. Active
attacker tempers the integrity of stored information on the cloud. This information can be important documents,
stored data, more sensitive information, and executable code. In contrast to active attackers, passive attackers do
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology
and
Science
Volume:01/Issue:01/ January-2022 Impact Factor- 6.752 www.irjmets.com
www.irjmets.co
m
@International Research Journal of Modernization in Engineering, Technology
and Science
[3]
not actively alter data while using information for future use. They can work as an eavesdropper in a wireless
network.
Malicious attacker vs non-malicious attacker:
The malicious attacker has malicious intentions despite his benefit. This type of attacker can spread malware in the
system and disrupt or even collapse the system. A non-malicious attacker can also be called a greedy attacker who
has a personal intention to attack the system. For example, they can spread a message about the emergency system
and slow down the traffic.
Local vs global attacker:
Local and global attackers have a difference in their scope. The local attacker has effects on limited vehicles. For
example, they can deploy eavesdropping stations for a limited number of VCC entities or nearby vehicles. In
contrast, the global attacker has a broader domain and can control numerous VCC entities; hence can get a broader
range of information in the vehicular cloud network.
Based on the model mentioned above, either internal or external, Global Passive Attacker (GPA) can be most
harmful by eavesdropping on the global broadcast information and breaking location privacy for their desired
range of vehicles. GPA can create their eavesdropping station by use of existing infrastructures like RSU
III. Security requirements and potential attacks
This section will present basic security requirements and list potential attacks on those security requirements.
Authentication:
Authentication is an essential requirement of VCC that distinguishes malicious entities from legitimate entities.
VCC system should be able to recognize legitimate VCC entities. Authentication requirements can be further sub-
divided into message authentication and user authentication.
Authorization:
It should be ensured that legitimated VCC entities have access to only the exemplary VCC service based on a pre-
defined set of rules. There should be some Service Level Agreement (SLA) to define which VCC entity can access
specific VCC services.
Availability:
Availability requirement deals with the process of messages between entities of VCC on time to avoid disruption of
service. A low-cost cryptographic algorithm can achieve availability to ensure that messages reach at destination
within the desired time without tempering.
Data confidentiality:
In its origin, data confidentiality is a requirement of reaching data to the destination entity confidentially. Data
confidentiality is not a top priority since most messages are public in the VCC environment. It is mainly needed for
some confidential messages between two entities.
Data Integrity:
Data transfer between two entities should be verified to detect manipulation, deletion, or modification of original
data.
No Attack Compromised security
requirement
1 Denial of Service Availability
2 Man in Middle attack Integrity
3 Masquerading Authentication
4 Impersonation Authentication
5 Jamming Availability
6 Location spoofing Confidentiality
7 Location tracking Privacy
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology
and
Science
Volume:01/Issue:01/ January-2022 Impact Factor- 6.752 www.irjmets.com
www.irjmets.co
m
@International Research Journal of Modernization in Engineering, Technology
and Science
[4]
8 Replay Authentication
Integrity
Confidentiality
9 Information forgery Confidentiality
Integrity
10 Deletion Integrity
11 Sybil Authentication
Table 1: potential attacks on vehicular cloud computing
IV. Conclusion and future work:
This paper presents a broad overview of vehicular cloud computing networks, their essential concepts and
security issue. Vehicular cloud computing is an emerging hybrid technology that merges cloud computing with an
intelligent transport system. Vehicular cloud computing needs intensive care in its security domain. In the future,
we will expand our work by discussing the layered approach of vehicular cloud computing and security challenges
on each layer.
Reference:
[1] P. Kohli, S. Sharma, and P. Maa, "Security of Cloud-Based Vehicular Ad-Hoc Communica#on Networks,
Challenges and Solu#ons," in 2021 Sixth Internaonal Conference on Wireless Communicaons, Signal
Processing and Networking (WiSPNET), 2021: IEEE, pp. 283-287.
[2] M. Muhammad and G. A. Safdar, "Survey on exis#ng authen#ca#on issues for cellular-assisted V2X
communica#on," Vehicular Communicaons, vol. 12, pp. 50-65, 2018.
[3] A. Masood, D. S. Lakew, and S. Cho, "Security and Privacy Challenges in Connected Vehicular Cloud Compu#ng,"
IEEE Communicaons Surveys & Tutorials, vol. 22, no. 4, pp. 2725-2764, 2020.
[4] B. Ahmed, A. W. Malik, T. Hafeez, and N. Ahmed, "Services and simula#on frameworks for vehicular cloud
compu#ng: a contemporary survey," EURASIP Journal on Wireless Communicaons and Networking, vol. 2019,
no. 1, pp. 1-21, 2019.
... Moreover, Xiao et al. [42] enhanced the scheme [40] and proposed chaotic maps based untraditional key agreement scheme. Since then, a huge number of key agreement schemes [43][44][45][46][47][48][49][50][51][52][53][54][55][56][57] have been presented for various scenarios of applications. ...
Article
Vehicular Cloud Computing (VCC) is a contemporary paradigm that includes the Internet of Things (IoT), cloud computing, and vehicular networking technologies. VCC offers vehicle-to-device, vehicle-to-infrastructure, and vehicle-to-vehicle communication in which the vehicles can communicate using sensing abilities. VCC is exploiting the IoT environment, cloud architecture, and vehicle resources. However, the energy-efficient privacy of communicators and security of communication are assertive problems in VCC. To accomplish this goal, we present an identity-based authentication scheme for VCC which also uses radio frequency identification (RFID). The security and robustness of the devised scheme are evaluated using informal and formal analysis. The informal analysis shows that our scheme is vigorous to resist various attacks. The formal analysis is done through Random Oracle Model (ROM) which shows that the scheme is secure and efficient. The performance of our scheme is also determined and compared with various related schemes which clearly illustrate the efficiency of the proposed scheme. Thus, our scheme is very efficient for employment in the VCC environment.
... Hise contribute in definition of cognitive computing as it is an emerging area that pulls the concepts of behavioral, cognitive and other related sciences [4]. Wang defines cognitive computing as cognitive informatics, a multidisciplinary field that investigate and work as how human brain process information and turn these information into decision [5]. Modha et al contribute in definition of cognitive computing as, cognitive computing is a universal, comprehensible, and unified mechanism stimulated by human brain capabilities [6]. ...
Article
Full-text available
Cognitive computing presents a computational model on the base of the human brain particularly it's neurobiological functioning. The cognitive computing model aims to provide computers with ability of thinking, know and feel abilities. This research will reveal different aspects of cognitive computing from its definition to its applications in different fields. Furthermore, this research will classify cognitive computing by current research areas.
Conference Paper
Waste control is a primary problem that the sector faces, irrespective of whether or not a rustic is advanced or developing. The essential trouble with trash control is that garbage boxes in public locations overflow nicely earlier than the following cleansing operation begins. It then reasons distinct risks to that location, which includes unsightly odour and ugliness, which can be the basis motive of the unfold of many diseases. This attempt is primarily based totally on a clever waste machine to keep away from any doubtlessly risky eventualities and to make certain public cleanliness and health. This system is facilitated via way of means of an ultrasonic sensor this is related to an Arduino UNO and assessments the extent of waste withinside the dustbin earlier than sending an alert to the municipal internet server. With the usage of an RFID Tag, the motive force recognizes the paintings of discarding the garbage after cleansing the dustbin. RFID is a computing generation this is used for verification and, in addition, it improves the clever rubbish alert machine via way of means of routinely figuring out garbage stuffed withinside the dustbin and sending the popularity of clean-as much as the server, confirming that the paintings has been completed. An embedded module with RFID and IoT facilitation underpins the whole operation. An Android utility is advanced and connected to an internet server to ship warnings from the microcontroller to the town workplace and to carry out far flung tracking of the cleansing system done via way of means of the workers, putting off the guide tracking and verification procedure. The concept got here to us while we observed that the rubbish truck used to run across the metropolis two times an afternoon gathering strong waste. Although this method changed into comprehensive, it changed into inefficient. Let's say road A is a hectic road, and we note that the garbage bin fills up quickly, while road B's bin isn't always even 1/2 of complete after days. This instance is primarily based totally on real-existence events, which brought about the "Eureka" moment!
Conference Paper
Waste control is a primary problem that the sector faces, irrespective of whether or not a rustic is advanced or developing. The essential trouble with trash control is that garbage boxes in public locations overflow nicely earlier than the following cleansing operation begins. It then reasons distinct risks to that location, which includes unsightly odour and ugliness, which can be the basis motive of the unfold of many diseases. This attempt is primarily based totally on a clever waste machine to keep away from any doubtlessly risky eventualities and to make certain public cleanliness and health. This system is facilitated via way of means of an ultrasonic sensor this is related to an Arduino UNO and assessments the extent of waste withinside the dustbin earlier than sending an alert to the municipal internet server. With the usage of an RFID Tag, the motive force recognizes the paintings of discarding the garbage after cleansing the dustbin. RFID is a computing generation this is used for verification and, in addition, it improves the clever rubbish alert machine via way of means of routinely figuring out garbage stuffed withinside the dustbin and sending the popularity of clean-as much as the server, confirming that the paintings has been completed. An embedded module with RFID and IoT facilitation underpins the whole operation. An Android utility is advanced and connected to an internet server to ship warnings from the microcontroller to the town workplace and to carry out far flung tracking of the cleansing system done via way of means of the workers, putting off the guide tracking and verification procedure. The concept got here to us while we observed that the rubbish truck used to run across the metropolis two times an afternoon gathering strong waste. Although this method changed into comprehensive, it changed into inefficient. Let's say road A is a hectic road, and we note that the garbage bin fills up quickly, while road B's bin isn't always even 1/2 of complete after days. This instance is primarily based totally on real-existence events, which brought about the "Eureka" moment!
Conference Paper
Waste control is a primary problem that the sector faces, irrespective of whether or not a rustic is advanced or developing. The essential trouble with trash control is that garbage boxes in public locations overflow nicely earlier than the following cleansing operation begins. It then reasons distinct risks to that location, which includes unsightly odour and ugliness, which can be the basis motive of the unfold of many diseases. This attempt is primarily based totally on a clever waste machine to keep away from any doubtlessly risky eventualities and to make certain public cleanliness and health. This system is facilitated via way of means of an ultrasonic sensor this is related to an Arduino UNO and assessments the extent of waste withinside the dustbin earlier than sending an alert to the municipal internet server. With the usage of an RFID Tag, the motive force recognizes the paintings of discarding the garbage after cleansing the dustbin. RFID is a computing generation this is used for verification and, in addition, it improves the clever rubbish alert machine via way of means of routinely figuring out garbage stuffed withinside the dustbin and sending the popularity of clean-as much as the server, confirming that the paintings has been completed. An embedded module with RFID and IoT facilitation underpins the whole operation. An Android utility is advanced and connected to an internet server to ship warnings from the microcontroller to the town workplace and to carry out far flung tracking of the cleansing system done via way of means of the workers, putting off the guide tracking and verification procedure. The concept got here to us while we observed that the rubbish truck used to run across the metropolis two times an afternoon gathering strong waste. Although this method changed into comprehensive, it changed into inefficient. Let's say road A is a hectic road, and we note that the garbage bin fills up quickly, while road B's bin isn't always even 1/2 of complete after days. This instance is primarily based totally on real-existence events, which brought about the "Eureka" moment!
Conference Paper
Waste control is a primary problem that the sector faces, irrespective of whether or not a rustic is advanced or developing. The essential trouble with trash control is that garbage boxes in public locations overflow nicely earlier than the following cleansing operation begins. It then reasons distinct risks to that location, which includes unsightly odour and ugliness, which can be the basis motive of the unfold of many diseases. This attempt is primarily based totally on a clever waste machine to keep away from any doubtlessly risky eventualities and to make certain public cleanliness and health. This system is facilitated via way of means of an ultrasonic sensor this is related to an Arduino UNO and assessments the extent of waste withinside the dustbin earlier than sending an alert to the municipal internet server. With the usage of an RFID Tag, the motive force recognizes the paintings of discarding the garbage after cleansing the dustbin. RFID is a computing generation this is used for verification and, in addition, it improves the clever rubbish alert machine via way of means of routinely figuring out garbage stuffed withinside the dustbin and sending the popularity of clean-as much as the server, confirming that the paintings has been completed. An embedded module with RFID and IoT facilitation underpins the whole operation. An Android utility is advanced and connected to an internet server to ship warnings from the microcontroller to the town workplace and to carry out far flung tracking of the cleansing system done via way of means of the workers, putting off the guide tracking and verification procedure. The concept got here to us while we observed that the rubbish truck used to run across the metropolis two times an afternoon gathering strong waste. Although this method changed into comprehensive, it changed into inefficient. Let's say road A is a hectic road, and we note that the garbage bin fills up quickly, while road B's bin isn't always even 1/2 of complete after days. This instance is primarily based totally on real-existence events, which brought about the "Eureka" moment!
Conference Paper
Waste control is a primary problem that the sector faces, irrespective of whether or not a rustic is advanced or developing. The essential trouble with trash control is that garbage boxes in public locations overflow nicely earlier than the following cleansing operation begins. It then reasons distinct risks to that location, which includes unsightly odour and ugliness, which can be the basis motive of the unfold of many diseases. This attempt is primarily based totally on a clever waste machine to keep away from any doubtlessly risky eventualities and to make certain public cleanliness and health. This system is facilitated via way of means of an ultrasonic sensor this is related to an Arduino UNO and assessments the extent of waste withinside the dustbin earlier than sending an alert to the municipal internet server. With the usage of an RFID Tag, the motive force recognizes the paintings of discarding the garbage after cleansing the dustbin. RFID is a computing generation this is used for verification and, in addition, it improves the clever rubbish alert machine via way of means of routinely figuring out garbage stuffed withinside the dustbin and sending the popularity of clean-as much as the server, confirming that the paintings has been completed. An embedded module with RFID and IoT facilitation underpins the whole operation. An Android utility is advanced and connected to an internet server to ship warnings from the microcontroller to the town workplace and to carry out far flung tracking of the cleansing system done via way of means of the workers, putting off the guide tracking and verification procedure. The concept got here to us while we observed that the rubbish truck used to run across the metropolis two times an afternoon gathering strong waste. Although this method changed into comprehensive, it changed into inefficient. Let's say road A is a hectic road, and we note that the garbage bin fills up quickly, while road B's bin isn't always even 1/2 of complete after days. This instance is primarily based totally on real-existence events, which brought about the "Eureka" moment!
Conference Paper
Waste control is a primary problem that the sector faces, irrespective of whether or not a rustic is advanced or developing. The essential trouble with trash control is that garbage boxes in public locations overflow nicely earlier than the following cleansing operation begins. It then reasons distinct risks to that location, which includes unsightly odour and ugliness, which can be the basis motive of the unfold of many diseases. This attempt is primarily based totally on a clever waste machine to keep away from any doubtlessly risky eventualities and to make certain public cleanliness and health. This system is facilitated via way of means of an ultrasonic sensor this is related to an Arduino UNO and assessments the extent of waste withinside the dustbin earlier than sending an alert to the municipal internet server. With the usage of an RFID Tag, the motive force recognizes the paintings of discarding the garbage after cleansing the dustbin. RFID is a computing generation this is used for verification and, in addition, it improves the clever rubbish alert machine via way of means of routinely figuring out garbage stuffed withinside the dustbin and sending the popularity of clean-as much as the server, confirming that the paintings has been completed. An embedded module with RFID and IoT facilitation underpins the whole operation. An Android utility is advanced and connected to an internet server to ship warnings from the microcontroller to the town workplace and to carry out far flung tracking of the cleansing system done via way of means of the workers, putting off the guide tracking and verification procedure. The concept got here to us while we observed that the rubbish truck used to run across the metropolis two times an afternoon gathering strong waste. Although this method changed into comprehensive, it changed into inefficient. Let's say road A is a hectic road, and we note that the garbage bin fills up quickly, while road B's bin isn't always even 1/2 of complete after days. This instance is primarily based totally on real-existence events, which brought about the "Eureka" moment!
Conference Paper
Waste control is a primary problem that the sector faces, irrespective of whether or not a rustic is advanced or developing. The essential trouble with trash control is that garbage boxes in public locations overflow nicely earlier than the following cleansing operation begins. It then reasons distinct risks to that location, which includes unsightly odour and ugliness, which can be the basis motive of the unfold of many diseases. This attempt is primarily based totally on a clever waste machine to keep away from any doubtlessly risky eventualities and to make certain public cleanliness and health. This system is facilitated via way of means of an ultrasonic sensor this is related to an Arduino UNO and assessments the extent of waste withinside the dustbin earlier than sending an alert to the municipal internet server. With the usage of an RFID Tag, the motive force recognizes the paintings of discarding the garbage after cleansing the dustbin. RFID is a computing generation this is used for verification and, in addition, it improves the clever rubbish alert machine via way of means of routinely figuring out garbage stuffed withinside the dustbin and sending the popularity of clean-as much as the server, confirming that the paintings has been completed. An embedded module with RFID and IoT facilitation underpins the whole operation. An Android utility is advanced and connected to an internet server to ship warnings from the microcontroller to the town workplace and to carry out far flung tracking of the cleansing system done via way of means of the workers, putting off the guide tracking and verification procedure. The concept got here to us while we observed that the rubbish truck used to run across the metropolis two times an afternoon gathering strong waste. Although this method changed into comprehensive, it changed into inefficient. Let's say road A is a hectic road, and we note that the garbage bin fills up quickly, while road B's bin isn't always even 1/2 of complete after days. This instance is primarily based totally on real-existence events, which brought about the "Eureka" moment!
Conference Paper
Waste control is a primary problem that the sector faces, irrespective of whether or not a rustic is advanced or developing. The essential trouble with trash control is that garbage boxes in public locations overflow nicely earlier than the following cleansing operation begins. It then reasons distinct risks to that location, which includes unsightly odour and ugliness, which can be the basis motive of the unfold of many diseases. This attempt is primarily based totally on a clever waste machine to keep away from any doubtlessly risky eventualities and to make certain public cleanliness and health. This system is facilitated via way of means of an ultrasonic sensor this is related to an Arduino UNO and assessments the extent of waste withinside the dustbin earlier than sending an alert to the municipal internet server. With the usage of an RFID Tag, the motive force recognizes the paintings of discarding the garbage after cleansing the dustbin. RFID is a computing generation this is used for verification and, in addition, it improves the clever rubbish alert machine via way of means of routinely figuring out garbage stuffed withinside the dustbin and sending the popularity of clean-as much as the server, confirming that the paintings has been completed. An embedded module with RFID and IoT facilitation underpins the whole operation. An Android utility is advanced and connected to an internet server to ship warnings from the microcontroller to the town workplace and to carry out far flung tracking of the cleansing system done via way of means of the workers, putting off the guide tracking and verification procedure. The concept got here to us while we observed that the rubbish truck used to run across the metropolis two times an afternoon gathering strong waste. Although this method changed into comprehensive, it changed into inefficient. Let's say road A is a hectic road, and we note that the garbage bin fills up quickly, while road B's bin isn't always even 1/2 of complete after days. This instance is primarily based totally on real-existence events, which brought about the "Eureka" moment!
ResearchGate has not been able to resolve any references for this publication.