Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
VEHICULAR ADHOC NETKWOK
1. Outline
VANET
Cloud computing
Vehicular cloud
Security in Vehicular Cloud
Conclusion
References
Towards Secure Vehicular Clouds
Durgesh Kumar Shukla
2010PTSW24
M.Tech( Software Engineering -Part Time ) - V Sem
November , 2012
Department of Computer Science and Engineering
Motilal Nehru National Institute of Technology Allahabad
Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds
Towards Secure Sem
2. Outline
VANET
Cloud computing
Vehicular cloud
Security in Vehicular Cloud
Conclusion
References
1 VANET
2 Cloud computing
3 Vehicular cloud
4 Security in Vehicular Cloud
5 Conclusion
6 References
Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds
Towards Secure Sem
3. Outline
VANET
Cloud computing
Vehicular cloud
Security in Vehicular Cloud
Conclusion
References
Smart vehicles
Vehicles are becoming more sophisticated
Powerful on-board computing capabilities
Tons of on-board of storage
Significant communication capabilities
No power limitations
Computations capabilities supported by
Hosts of sensors and actuators
On-board radar and GPS
Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds
Towards Secure Sem
4. Outline
VANET
Cloud computing
Vehicular cloud
Security in Vehicular Cloud
Conclusion
References
VANET
Main characteristics
Deliver timely information to drivers in a cost-effective manner
Uses vehicles as network nodes
Vehicles move at will relative to each other but within the
constraints of the road infrastructure
Communications
Vehicle-to-Vehicle (V2V) : zero-infrastructure
Vehicle-to-Infrastructure (V2I): roadside devices
Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds
Towards Secure Sem
5. Outline
VANET
Cloud computing
Vehicular cloud
Security in Vehicular Cloud
Conclusion
References
Cloud computing
A paradigm shift suggested by:
Low cost high-speed Internet
Virtualization
Advances in parallel and distributed databases
Basic idea: Why buy when we can rent?
Exactly what we need
Exactly when we need it
No upfront investment
No maintenance costs
Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds
Towards Secure Sem
6. Outline
VANET
Cloud computing
Vehicular cloud
Security in Vehicular Cloud
Conclusion
References
Cloud computing
Cloud Services
Software as a Service (SaaS)
Customers rent software hosted by the vendor
Platform as a Service (PaaS)
Customers rent infrastructure and programming tools hosted
by the vendor to create their own applications
Infrastructure as a Service (IaaS)
Customers rent processing, storage, networking and other
fundamental computing resources for all purposes
Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds
Towards Secure Sem
7. Outline
VANET
Cloud computing
Vehicular cloud
Security in Vehicular Cloud
Conclusion
References
Vehicular cloud Motivation
Parking lot of a typical enterprise on a typical workday
hundreds/thousands cars go unused for hours on end
Why rent computational/storage resources elsewhere?
Durgesh KumarWe have them in Software Engineering -Part Time ) - VVehicular Clouds
Shukla2010PTSW24M.Tech( our own backyard Secure Sem
Towards
8. Outline
VANET
Cloud computing
Vehicular cloud
Security in Vehicular Cloud
Conclusion
References
Vehicular cloud Motivation
Dedicated Short Range Communications (DSRC)
Allocated by US Federal Communications Commission
75MHz of spectrum (5.850 to 5.925 GHz)
Roadside infrastructures
Inductive loop detectors
Video cameras
Acoustic tracking systems
Microwave radar sensors
Access point
Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds
Towards Secure Sem
9. Outline
VANET
Cloud computing
Vehicular cloud
Security in Vehicular Cloud
Conclusion
References
VC Vehicular Cloud
A group of vehicles whose corporate computing, sensing,
communication and physical resources can be coordinated and
dynamically allocated to authorized users
VCs are different from the classic clouds
Mobility
Autonomy
Agility
Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds
Towards Secure Sem
10. Outline
VANET
Cloud computing
Vehicular cloud
Security in Vehicular Cloud
Conclusion
References
VC Vehicular Cloud
Storage as a Service (SaaS)
Computers in cars will have multiple terabytes of on-board
storage
Data center in mall/airport/parking lot
Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds
Towards Secure Sem
11. Outline
VANET
Cloud computing
Vehicular cloud
Security in Vehicular Cloud
Conclusion
References
VC Vehicular Cloud
Network as a Service (NaaS)
Most cars dont have internet connection
Small relative speed between cars on the same direction:
traditional MANET
Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds
Towards Secure Sem
12. Outline
VANET
Cloud computing
Vehicular cloud
Security in Vehicular Cloud
Conclusion
References
VC Vehicular Cloud
Cooperation as a Service (CaaS)
Drivers behind the wheels: suitable for human interaction
tasks
Weather?
Road condition?
Best restaurant around a specific place?
Publish/subscribe mechanism
Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds
Towards Secure Sem
13. Outline
VANET
Cloud computing
Vehicular cloud
Security in Vehicular Cloud
Conclusion
References
Application Of VC
Application
Traffic management
Road condition sharing
Accident alerts at intersections
Intelligent parking management
Safety critical applications
Managed disaster evacuation
Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds
Towards Secure Sem
14. Outline
VANET
Cloud computing
Vehicular cloud
Security in Vehicular Cloud
Conclusion
References
Security in Vehicular Cloud
Security Attack and Threats
Both Users and Attackers are equal
Attack targets: Confidentiality, Integrity, Availability
Examples:
Narrow down the possible areas where the target users
services are executing by mapping the topology of VC
Launch multiple experimental accesses
Request the services on the same VM where the target user is
on
Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds
Towards Secure Sem
15. Outline
VANET
Cloud computing
Vehicular cloud
Security in Vehicular Cloud
Conclusion
References
Security in Vehicular Cloud
Possible Solutions
Safety Messages
Confidential Messages
Digital signatures
Data Isolation and Sanitization
Location validation
Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds
Towards Secure Sem
16. Outline
VANET
Cloud computing
Vehicular cloud
Security in Vehicular Cloud
Conclusion
References
Security in Vehicular Cloud
Security and functional challenges
Key management
Trust management
Location security
DoS prevention
Message aggregation and validation
Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds
Towards Secure Sem
17. Outline
VANET
Cloud computing
Vehicular cloud
Security in Vehicular Cloud
Conclusion
References
Conclusion
The tradeoffs between security and performance will need to
be explored
Time delay management
With joint efforts and close cooperation among different
organizations such as law enforcement, government,
auto-industry and academic can provide solid and feasible
security and privacy solutions for the vehicular cloud
computing.
Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds
Towards Secure Sem
18. Outline
VANET
Cloud computing
Vehicular cloud
Security in Vehicular Cloud
Conclusion
References
References
[1]Gongjun Yan, Ding Wen, Stephan Olariu, and Michele C. Weigle
”Security Challenges in Vehicular Cloud Computing,” 2012 IEEE
Transactions On Intelligent Transportation Systems
[2] Gongjun Yan Indiana Univ., Kokomo, IN, USA Rawat, D.B. ;
Bista, B.B. ” Towards Secure Vehicular Clouds,” 2012 Sixth
International Conference on Complex, Intelligent and Software
Intensive Systems (CISIS).
[3] M. Abuelela and S. Olariu, ”Taking vanet to the clouds,”
Proceedings of The 8th Interna- tional Conference on Advances in
Mobile Computing and Multimedia MoMM 2010, pp. 810, 2010.
[4] M. Eltoweissy, S. Olariu, and M. Younis, ” Towards
autonomous vehicular clouds,” in Pro- ceedings of
AdHocNets2010, Victoria, BC, Canada, August 2010.
Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds
Towards Secure Sem
19. Outline
VANET
Cloud computing
Vehicular cloud
Security in Vehicular Cloud
Conclusion
References
References
[5] M. Eltoweissy, S. Olariu and M. Younis, ”Towards Vehicular
Clouds”, Proc. AdHocNets, 2010, Victoria, BC, August 2010.
[6] Fay Hui: A survey on the characterization of Vehicular Ad Hoc
Networks routing solu- tions ECS 257 Winter 2005
[7]T. ElGamal, ”A public key cryptosystem and a signature scheme
based on discrete loga- rithms,” IEEE Transactions on Information
Theory, vol. 31, no. 4, pp. 469472, 1985.
Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds
Towards Secure Sem
20. Outline
VANET
Cloud computing
Vehicular cloud
Security in Vehicular Cloud
Conclusion
References
THANK YOU
Durgesh Kumar Shukla2010PTSW24M.Tech( Software Engineering -Part Time ) - VVehicular Clouds
Towards Secure Sem