2019 IEEE 30th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC Workshops) 2019
DOI: 10.1109/pimrcw.2019.8880849
|View full text |Cite
|
Sign up to set email alerts
|

An Overview on Security and Privacy Challenges and Their Solutions in Fog-Based Vehicular Application

Abstract: Fog computing is an emerging computing paradigm that extends cloud services to the edge of the network by moving computation tasks from cloud to network edges to reduce response latency in a wireless network. Fog computing inherits the principle of peerto-peer networking, decentralization, and geographical distribution from clouds. Hence, fog computing becomes an ideal platform for readily supporting vehicular applications due to its dynamic support for mobility of clientdevices and low latent heterogeneous co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(16 citation statements)
references
References 30 publications
0
16
0
Order By: Relevance
“…Table 4 summarizes threats belonging to the spoofing attack category. In case attackers successfully impersonate an edge device, a fog node's authentication mechanism cannot distinguish the attacker's fake credentials from proper credentials so that the system is vulnerable to malicious commands [53]. Evil and selfish attackers can also pretend to be authenticated as a fog node and to report data honestly with the aim to get benefits and/or to spread false information [32], [37], [49].…”
Section: ) Spoofingmentioning
confidence: 99%
See 1 more Smart Citation
“…Table 4 summarizes threats belonging to the spoofing attack category. In case attackers successfully impersonate an edge device, a fog node's authentication mechanism cannot distinguish the attacker's fake credentials from proper credentials so that the system is vulnerable to malicious commands [53]. Evil and selfish attackers can also pretend to be authenticated as a fog node and to report data honestly with the aim to get benefits and/or to spread false information [32], [37], [49].…”
Section: ) Spoofingmentioning
confidence: 99%
“…In a message alteration attack, information that passes through an RSU is modified [56]. This weakness arises from a weak or not encrypted communication channel and can cause malfunctions that endanger the drivers' or pedestrians' safety [18], [37], [53]. Message alteration can be performed by MITM attackers that insert themselves between sender and receiver.…”
Section: ) Tamperingmentioning
confidence: 99%
“…The common advantage is the alleviation of the burden of computational tasks; in traditional implementations, it is performed at the level of the infrastructure, while vehicles have to collaborate with each others in the vehicular version. The integration of these networking paradigms within the vehicular environment may present some risks for routing [232][233][234][235] :…”
Section: • Computational Intelligence: As Presented Inmentioning
confidence: 99%
“…234 ⚬ The data stored in cloud and fog servers are accessible by many parties: service providers, authorities, drivers, and passengers. 235 Therefore, the data used for routing process could be compromised by ineligible changes or repositories, thus causing routing problems.…”
Section: • Computational Intelligence: As Presented Inmentioning
confidence: 99%
See 1 more Smart Citation