Group Security of V2V using Cloud Computing Processing and 4G Wireless Services

被引:0
|
作者
Panja, Biswajit [1 ]
Morrison, David [2 ]
Meharia, Priyanka [3 ]
Bhargava, Bharat [4 ]
Prakash, Atul [5 ]
机构
[1] Univ Michigan, Comp Sci, Flint, MI 48503 USA
[2] Univ Michigan, Flint, MI 48503 USA
[3] Eastern Michigan Univ, Accounting Informat Syst, Ypsilanti, MI 48197 USA
[4] Purdue Univ, Comp Sci, W Lafayette, IN 47907 USA
[5] Univ Michigan, Ann Arbor, MI 48109 USA
关键词
V2V; Cloud Computing; 4G; Security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Vehicle to Vehicle (V2V) interfaces will provide the future of safe driving. Implemented along V2I (Vehicle to Interface) setups, a driver will be more aware of their surroundings and traffic will be less of a hazard. Companies such as Google are trying to make cars that drive themselves through external sensors and internal maps. The security issues in V2V communication are vast and still being solved. Telecommunication companies have been working in turn to implement cloud computing to improve what they can offer their data users. They have been consistent with their improvements of coverage and data transfer speed. The creation of 4G LTE has shown great promise for what can be done with data transfers and minimizing tower loads. This research paper takes a look at how the system can be protected against outside intrusions. It uses a Cloud to do computations, making it more difficult to steal data from the cars themselves. The system is designed to be in constant communication with the cloud to prevent any data theft, and presents methods for encrypting the data sent between the cloud and the cars. It also addresses the issue of tower load, by creating car groups to lower the difficulty of communicating in high traffic situations. These car groups communicate with one car, the lead car which is the only car that is communicating directly with the cloud. It sends and receives messages which are then distributed amongst the group, including but not limited to car locations, media and security keys. Cars that are separated from a group are treated as the lead car of a single car group, and cars that are completely separated from the system must first validate themselves through the cloud.
引用
收藏
页码:218 / 232
页数:15
相关论文
共 50 条
  • [31] V2X Support in 3GPP Specifications: From 4G to 5G and Beyond
    Garcia-Roger, David
    Gonzalez, Edgar E.
    Martin-Sacristan, David
    Monserrat, Jose F.
    IEEE ACCESS, 2020, 8 : 190946 - 190963
  • [32] An Analytical Latency Model and Evaluation of the Capacity of 5G NR to Support V2X Services Using V2N2V Communications
    Lucas-Estan, M. Carmen
    Coll-Perales, Baldomero
    Shimizu, Takayuki
    Gozalvez, Javier
    Higuchi, Takamasa
    Avedisov, Sergei
    Altintas, Onur
    Sepulcre, Miguel
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (02) : 2293 - 2306
  • [33] Improving Isolation Between UWB and 4G/V2X Antennas for Compact UE Applications
    Lie, Kuayue
    Peng, Hongli
    Chen, Chen
    Mao, Junfa
    2024 INTERNATIONAL CONFERENCE ON MICROWAVE AND MILLIMETER WAVE TECHNOLOGY, ICMMT, 2024,
  • [34] Latency Analysis for Real-Time Sensor Sharing Using 4G/5G C-V2X Uu Interfaces
    Choi, Sinuk
    Kwon, Dongyoon
    Choi, Ji-Woong
    IEEE ACCESS, 2023, 11 : 35197 - 35206
  • [36] A Survey on Simulation Efforts of 4G/LTE-based Cellular and Hybrid V2X Communications
    Hejazi, Hamdan
    Bokor, Laszlo
    2021 44TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2021, : 333 - 339
  • [37] Ancillary Services Bidding for Uncertain Bidirectional V2G Using Fuzzy Linear Programming
    Faddel, Samy
    Aldeek, A.
    Al-Awami, Ali T.
    Sortomme, Eric
    Al-Hamouz, Zakariya
    ENERGY, 2018, 160 : 986 - 995
  • [38] WAVE 4 V2G: Wireless access in vehicular environments for Vehicle-to-Grid applications
    Al-Anbagi, Irfan
    Mouftah, Hussein T.
    VEHICULAR COMMUNICATIONS, 2016, 3 : 31 - 42
  • [39] Performance Analysis of Wireless Communications for V2G Applications Using WPT Technology in Energy Transfer
    Krainyukov, Alexander
    Krivchenkov, Aleksandr
    Saltanovs, Rodion
    PROCEEDINGS OF THE 16TH INTERNATIONAL SCIENTIFIC CONFERENCE RELIABILITY AND STATISTICS IN TRANSPORTATION AND COMMUNICATION (RELSTAT-2016), 2017, 178 : 172 - 181
  • [40] A deep learning based steganography integration framework for ad-hoc cloud computing data security augmentation using the V-BOINC system
    Ahmed A. Mawgoud
    Mohamed Hamed N. Taha
    Amr Abu-Talleb
    Amira Kotb
    Journal of Cloud Computing, 11