2017 International Conference on Soft Computing and Its Engineering Applications (icSoftComp) 2017
DOI: 10.1109/icsoftcomp.2017.8280084
|View full text |Cite
|
Sign up to set email alerts
|

Security against malicious node in the vehicular cloud computing using a software-defined networking architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(15 citation statements)
references
References 9 publications
0
8
0
Order By: Relevance
“…With the advent of SDN technology, some research areas including VANETs have realized the convenience and advantages of this new network architecture. SDN has been introduced to address some inherent problems in [10,13,21,[29][30][31][32][33]. Shao et al [34] proposed an anonymous authentication protocol for VANETs by using a new group signature scheme, which achieved threshold authentication and group signature in VANETs.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…With the advent of SDN technology, some research areas including VANETs have realized the convenience and advantages of this new network architecture. SDN has been introduced to address some inherent problems in [10,13,21,[29][30][31][32][33]. Shao et al [34] proposed an anonymous authentication protocol for VANETs by using a new group signature scheme, which achieved threshold authentication and group signature in VANETs.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, the new architecture also brings new opportunities and approaches to cope with some inherent problems in traditional networks, especially regarding security [20]. There have been some studies dedicated to solving security problems in the control plane [21], such as distributed denial-of-service and malware attacks. However, the security and privacy problems existing in the data plane have not received focus.…”
Section: Introductionmentioning
confidence: 99%
“…The proposed solution is to install a security wall between cloud servers and the Internet in order to eliminate privacy and security issues. Bousselham et al [Bousselham, Abdellaoui and Chaoui (2017)] ensure security and privacy, a new security approach is designed using software-defined network (SDN) technology, using pseudonyms, key management, and revocation lists to provide authentication, confidentiality, integrity, and availability. Chen et al [Chen, Lin, Castiglione et al (2016)] protect the anonymity of passengers and ensure the robustness of payment systems, a new smart card-based MoD payment solution is proposed for mobile cloud authorized public transport systems, which not only ensures the anonymity of passengers, but also uses personal trust devices to protect passengers.…”
Section: The Security Of Integration Of Cloud and Fogmentioning
confidence: 99%
“…A timing attack is very important in accidents and important notifications, because in this type of attack, the attacker will not forward the important message immediately and will instead waste some time and then it will forward the message later. 21,22,25,26,30,40,47,48,54,55 All these problems need a solution, but before we implement any solution, we must know that we have some constraints in place to make sure that the system will keep running perfectly without any problems. The constraints are as follows:…”
Section: Attacks On Availabilitymentioning
confidence: 99%
“…Finally, the security mechanism protects the vehicles, clients, and infrastructures from malicious nodes using revocation mechanism. 55 24. A software-defined vehicular cloud controller (SDVC) maintains a global view of vehicles based on the information collected from vehicles.…”
Section: Use Of Firewalls or Intrusion Detection System (Idsmentioning
confidence: 99%