Group Security of V2V using Cloud Computing Processing and 4G Wireless Services

被引:0
|
作者
Panja, Biswajit [1 ]
Morrison, David [2 ]
Meharia, Priyanka [3 ]
Bhargava, Bharat [4 ]
Prakash, Atul [5 ]
机构
[1] Univ Michigan, Comp Sci, Flint, MI 48503 USA
[2] Univ Michigan, Flint, MI 48503 USA
[3] Eastern Michigan Univ, Accounting Informat Syst, Ypsilanti, MI 48197 USA
[4] Purdue Univ, Comp Sci, W Lafayette, IN 47907 USA
[5] Univ Michigan, Ann Arbor, MI 48109 USA
关键词
V2V; Cloud Computing; 4G; Security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Vehicle to Vehicle (V2V) interfaces will provide the future of safe driving. Implemented along V2I (Vehicle to Interface) setups, a driver will be more aware of their surroundings and traffic will be less of a hazard. Companies such as Google are trying to make cars that drive themselves through external sensors and internal maps. The security issues in V2V communication are vast and still being solved. Telecommunication companies have been working in turn to implement cloud computing to improve what they can offer their data users. They have been consistent with their improvements of coverage and data transfer speed. The creation of 4G LTE has shown great promise for what can be done with data transfers and minimizing tower loads. This research paper takes a look at how the system can be protected against outside intrusions. It uses a Cloud to do computations, making it more difficult to steal data from the cars themselves. The system is designed to be in constant communication with the cloud to prevent any data theft, and presents methods for encrypting the data sent between the cloud and the cars. It also addresses the issue of tower load, by creating car groups to lower the difficulty of communicating in high traffic situations. These car groups communicate with one car, the lead car which is the only car that is communicating directly with the cloud. It sends and receives messages which are then distributed amongst the group, including but not limited to car locations, media and security keys. Cars that are separated from a group are treated as the lead car of a single car group, and cars that are completely separated from the system must first validate themselves through the cloud.
引用
收藏
页码:218 / 232
页数:15
相关论文
共 50 条
  • [41] A deep learning based steganography integration framework for ad-hoc cloud computing data security augmentation using the V-BOINC system
    Mawgoud, Ahmed A. A.
    Taha, Mohamed Hamed N.
    Abu-Talleb, Amr
    Kotb, Amira
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2022, 11 (01):
  • [42] Road Accidents Detection, Data Collection and Data Analysis Using V2X Communication and Edge/Cloud Computing
    Khaliq, Kishwer Abdul
    Chughtai, Omer
    Shahwani, Abdullah
    Qayyum, Amir
    Pannek, Juergen
    ELECTRONICS, 2019, 8 (08)
  • [43] Minimizing Latency for 5G Multimedia and V2X Applications using Mobile Edge Computing
    Srinivasa, R. K.
    Naidu, Naveen Kumar Srinivasa
    Maheshwari, Sumit
    Bharathi, C.
    Kumar, Hemanth A. R.
    2019 2ND INTERNATIONAL CONFERENCE ON INTELLIGENT COMMUNICATION AND COMPUTATIONAL TECHNIQUES (ICCT), 2019, : 213 - 217
  • [44] Analysis of wireless communications for V2G applications using WPT technology in energy transfer to mobile objects
    Krivchenkov, Aleksandr
    Saltanovs, Rodions
    2015 56TH INTERNATIONAL SCIENTIFIC CONFERENCE ON POWER AND ELECTRICAL ENGINEERING OF RIGA TECHNICAL UNIVERSITY (RTUCON), 2015,
  • [45] Predictive Active Power-Flow Control of Two-way Wireless Power Transfer System in V2G Services
    Mohamed, A. A. S.
    Berzoy, Alberto
    Mohammed, Osama
    2016 IEEE 2ND ANNUAL SOUTHERN POWER ELECTRONICS CONFERENCE (SPEC), 2016,
  • [46] Vehicle-to-Everything (V2X) Evolution From 4G to 5G in 3GPP: Focusing on Resource Allocation Aspects
    Shin, Cheolkyu
    Farag, Emad
    Ryu, Hyunseok
    Zhou, Miao
    Kim, Younsun
    IEEE ACCESS, 2023, 11 : 18689 - 18703
  • [47] Benchmarking 4G and 5G-Based Cellular-V2X for Vehicle-to-Infrastructure Communication and Urban Scenarios in Cooperative Intelligent Transportation Systems
    Petrov, Tibor
    Pocta, Peter
    Kovacikova, Tatiana
    APPLIED SCIENCES-BASEL, 2022, 12 (19):
  • [48] The k-hop V2V data offloading using the predicted utility-centric path switching (PUPS) method based on the SDN-controller inside the multi-access edge computing (MEC) architecture
    Huang, Chung-Ming
    Lin, Jun-Jie
    VEHICULAR COMMUNICATIONS, 2022, 36
  • [49] A secure IoT and edge computing based EV selection model in V2G systems using ant colony optimization algorithm
    Anjinappa, Gopinath
    Prabhakar, Divakar Bangalore
    INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2024, 20 (05) : 579 - 592
  • [50] Physical layer security analysis using radio frequency-fingerprinting in cellular-V2X for 6G communication
    Ayaz, Hina
    Abbas, Ghulam
    Waqas, Muhammad
    Abbas, Ziaul Haq
    Bilal, Muhammad
    Nauman, Ali
    Jamshed, Muhammad Ali
    IET SIGNAL PROCESSING, 2023, 17 (05)