2020
DOI: 10.1109/comst.2020.3012961
|View full text |Cite
|
Sign up to set email alerts
|

Security and Privacy Challenges in Connected Vehicular Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 62 publications
(31 citation statements)
references
References 150 publications
0
31
0
Order By: Relevance
“…To obtain the data volume as well as the data interactions of the data transfer mechanisms in one information cycle, we can plot the variation curve of the data volume with the length of the cache window. As can be seen from Figure 4, the mechanism proposed in this section significantly outperforms the other two mechanisms in the metric of video data download volume [21]. Specifically, when M < 50, the video requesting vehicle enters the communication range of the roadside unit and starts downloading video streams, and when driving away from the communication range, the video requesting vehicle will rely on the relay node to continue establishing communication links with the roadside unit, so the QDAVS mechanism and our proposed mechanism obtain significantly better data volume than the TAVS mechanism; in addition, we use the TOPSIS-based; we use the TOPSIS-based multicriteria decision method to select the optimal relay node to establish a communication link with higher download and transmission rates and thus obtain higher data download.…”
Section: Experimental Verification and Conclusionmentioning
confidence: 83%
“…To obtain the data volume as well as the data interactions of the data transfer mechanisms in one information cycle, we can plot the variation curve of the data volume with the length of the cache window. As can be seen from Figure 4, the mechanism proposed in this section significantly outperforms the other two mechanisms in the metric of video data download volume [21]. Specifically, when M < 50, the video requesting vehicle enters the communication range of the roadside unit and starts downloading video streams, and when driving away from the communication range, the video requesting vehicle will rely on the relay node to continue establishing communication links with the roadside unit, so the QDAVS mechanism and our proposed mechanism obtain significantly better data volume than the TAVS mechanism; in addition, we use the TOPSIS-based; we use the TOPSIS-based multicriteria decision method to select the optimal relay node to establish a communication link with higher download and transmission rates and thus obtain higher data download.…”
Section: Experimental Verification and Conclusionmentioning
confidence: 83%
“…Masood et al [49] gave a state-of-the-art review of Vehicular Cloud Computing (VCC) including its architecture, features, and services. They presented the attacker model in VCC and discussed the security and privacy issues in VCC in a layered approach: physical resource layer, V2X network layer, and vehicular cloud layer, and a complete system level.…”
Section: Related Workmentioning
confidence: 99%
“…5GVN is faced with cyber attacks [37], [46], [49] due to its open architecture. Since 5GVNs are built upon VNs of the previous communication generations, they still inherit various privacy threats.…”
Section: Privacy Threats To 5g-supported Vehicular Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…Today, automakers are also integrating connectivity and autonomous driving components in their vehicles to reduce travel time and improve the safety of drivers, passengers, vehicles, and the entire transportation system. However, from the perspective of the technological development path, smart cars are divided into three developments connected vehicles (CVs) [ 8 ], autonomous vehicles (AVs) [ 9 ], and electric vehicles (EVs) [ 10 ]. However, in this article, we are focus on connected vehicles.…”
Section: Introductionmentioning
confidence: 99%