2017
DOI: 10.1109/mcom.2017.1700322
|View full text |Cite
|
Sign up to set email alerts
|

Vehicular Fog Computing: Architecture, Use Case, and Security and Forensic Challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
123
0
2

Year Published

2018
2018
2020
2020

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 284 publications
(126 citation statements)
references
References 10 publications
1
123
0
2
Order By: Relevance
“…Vehicles serve as the infrastructure for vehicular communication . Huang et al proposed an architecture consisting of three layers for vehicular fog networks. Content distribution networks Content distribution/delivery networks (CDN) consist of geographically distributed servers that are capable of delivering the web pages as information. CDN uses edge caching approaches for speeding up the delivery of the web contents.…”
Section: Fog Computing Aspectsmentioning
confidence: 99%
“…Vehicles serve as the infrastructure for vehicular communication . Huang et al proposed an architecture consisting of three layers for vehicular fog networks. Content distribution networks Content distribution/delivery networks (CDN) consist of geographically distributed servers that are capable of delivering the web pages as information. CDN uses edge caching approaches for speeding up the delivery of the web contents.…”
Section: Fog Computing Aspectsmentioning
confidence: 99%
“…23,24 Roadside units (RSUs), 25 cellular network, 26,27 mobile cloud computing, 28 and fog vehicular computing 29 are examples of solutions that have been presented recently. In many of these studies, information security breaches and privacy violation have been mentioned as one of the main concerns that originates from resource-constraint.…”
Section: Case Studymentioning
confidence: 99%
“…29 Real-time decision-making is vital in this system. These data have been estimated to be about 25 GB per day.…”
Section: Fog Vehicle Computing Architecturementioning
confidence: 99%
“…As fog nodes are deployed at the roadside and due to its location awareness nature fog nodes can typically face physical attacks which are not possible in the cloud. Due to public accesses of fog nodes attackers can attack many types of attacks like data injection attack, black/grey hole attack etc., [12] by gaining administrative accesses or by altering the function. Some techniques are summarized below to overcome these challenges are…”
Section: Security Issues In Vfcmentioning
confidence: 99%
“…For example, if vehicle reports traffic jam to fog node, due to the location awareness nature of fog node it is easy to locate the vehicle based on the accessing fog node [12]. This creates a privacy issue one of the promising methods to protect vehicle privacy is to use anonymity techniques [12] such as pseudonyms, group signatures, and k-anonymity. The anonymity techniques help in hiding the user identity by fulfilling the tasks given to vehicle with the high-quality output.…”
Section: Privacymentioning
confidence: 99%