Rasheed Hussain | University of Bristol (original) (raw)
Papers by Rasheed Hussain
Throughout the last century, the automobile industry achieved remarkable milestones in manufactur... more Throughout the last century, the automobile industry
achieved remarkable milestones in manufacturing reliable,
safe, and affordable vehicles. Because of significant recent
advances in computation and communication technologies,
autonomous cars are becoming a reality. Already autonomous
car prototype models have covered millions of miles in test
driving. Leading technical companies and car manufacturers
have invested a staggering amount of resources in autonomous
car technology, as they prepare for autonomous cars’ full
commercialization in the coming years. However, to achieve this
goal, several technical and non-technical issues remain: software
complexity, real-time data analytics, and testing and verification
are among the greater technical challenges; and consumer stimulation,
insurance management, and ethical/moral concerns rank
high among the non-technical issues. Tackling these challenges
requires thoughtful solutions that satisfy consumers, industry,
and governmental requirements, regulations, and policies. Thus,
here we present a comprehensive review of state-of-the-art results
for autonomous car technology. We discuss current issues that
hinder autonomous cars’ development and deployment on a
large scale. We also highlight autonomous car applications that
will benefit consumers and many other sectors. Finally, to
enable cost-effective, safe, and efficient autonomous cars, we
discuss several challenges that must be addressed (and provide
helpful suggestions for adoption) by designers, implementers,
policymakers, regulatory organizations, and car manufacturers.
The success of vehicular ad hoc network (VANET) among vehicle consumers is subject to the quality... more The success of vehicular ad hoc network (VANET)
among vehicle consumers is subject to the quality of comfort
and realism of safety promised by this technology. Recently
VANET evolved to a rather more application and servicesrich
paradigm referred to as VANET-based clouds. However,
the initial deployment stage of VANET and its successor
VANET-based cloud is going to be a daunting challenge due
to less market penetration rate of the technology-enabled
vehicles, and the deployment and cost of road-side infrastructure.
To fill the gaps, in this paper, after arguing on the
predictability of spatiotemporal characteristics of the public
transport buses in urban areas, we propose a mechanism
where these buses are used asmobile gateways (MGs) among
vehicles on the road, VANET authorities, and the cloud
infrastructure. MGs work as functional entities of the mobile
intermediary infrastructure (MII) in VANET-based clouds.
Our proposed scheme can serve as a feasible, cost-effective, and pre-established MII for standaloneVANET andVANETbased
clouds. We furthermore, carry out feasibility analysis
through a communication scheme in VANET-based clouds.
More precisely we consider the traffic information aggregation
and dissemination in VANET-based clouds. In order to
argue on the feasibility of buses as MGs, we consider realtime
road network dynamics in Seoul, South Korea where
the public buses provide perfect connectivity to other vehicular
nodes in the neighborhood. In VANET-based clouds
application, vehicles share coarse-grained information with
clouds through MGs and receive fine-grained traffic information
from cloud infrastructure through MGs in real-time.
Our simulation results show that MGs provide almost 100%
coverage in average traffic scenarios and about 98% coverage
in worst traffic scenarios. These MGs also provide the
vehicles with about 84% traffic information in worst case
and over 90% traffic information in average traffic scenarios.
Our proposed infrastructure can be a strong rationale for the
initial deployment of these technologies and can possibly be
a reasonable partial or full replacement for static RSUs in the
urban scenarios.
Recently an online electric vehicle (OLEV) concept has been introduced, where vehicles are propel... more Recently an online electric vehicle (OLEV) concept has been introduced, where vehicles are propelled through the wirelessly transmitted electrical power from the infrastructure installed under the road while moving. The absence of secure-and-fair billing is one main hurdle to widely adopt this promising technology. This paper introduces a secure and privacy-aware fair billing framework for OLEV on the move through the charging plates installed under the road. We first propose two extreme lightweight mutual authentication mechanisms, a direct authentication and a hash chain-based authentication between vehicles and the charging plates that can be used for different vehicular speeds on the road. Second we propose a secure and privacy-aware wireless power transfer on move for the vehicles with bidirectional auditability guarantee by leveraging game-theoretic approach. Each charging plate transfers a fixed amount of energy to the vehicle and bills the vehicle in a privacy-aware way acco...
IEEE Transactions on Consumer Electronics, 2014
ABSTRACT Typical digital video recorders (DVRs) have limited storage capacity, and it is not easy... more ABSTRACT Typical digital video recorders (DVRs) have limited storage capacity, and it is not easy for them to share content among user devices. However, if DVRs are extended to the cloud-based infrastructure, conversion of content and sharing it among multiple devices can be made possible through the cloud's computing power. To provide secure cloud computing service, appropriate measures are necessary to protect the computing processes performed on the content from inside and outside attackers. A content encryption scheme is a simple and effective way to protect content from attackers; however, if an encryption scheme is used, the user cannot use computing resources that can be used for media computation. This paper proposes a secure cloud DVR framework based on personal virtualization to securely provide various functions through cloud resources. The proposed scheme uses an input/output management unit (IOMMU), which serves as direct memory access (DMA) remapping for constructing secure personal virtualization. Using IOMMU, it is difficult for inside attackers to know which memory area is the actual memory of the target user. Therefore, secure computation in the cloud computing is possible through IOMMU. The proposed scheme uses an IOMMU based cloud computing to hide media computation from inside attacker, and a public cloud to increase efficiency.
2014 IEEE International Conference on Consumer Electronics (ICCE), 2014
ABSTRACT Typical DVRs (Digital Video Recorder) have forms of limited storage areas and it is not ... more ABSTRACT Typical DVRs (Digital Video Recorder) have forms of limited storage areas and it is not easy for them to share contents. If they are extended to Cloud areas, conversion of contents and sharing among multiple devices can come to be made possible through provided computing power. However, appropriate measures are necessary to protect computing processes of contents from inner attackers. This paper proposes a virtualized framework to securely and efficiently transmit DVR contents to users' mobile devices and convert them through Cloud. The proposed scheme can prevent attacks on conversion and transmission processes of contents through isolated personal virtualization, and provide various functions through Cloud Computing Resources.
2014 IEEE International Conference on Consumer Electronics (ICCE), 2014
ABSTRACT The development of cloud computing has caused the emergence of various services combinin... more ABSTRACT The development of cloud computing has caused the emergence of various services combining with it. Media Cloud is also one of the convergence services, and content protection from cloud service providers and service quality assurance are essential functions. This paper proposes a virtualization framework in order to provide media services securely and efficiently through the cloud. The proposed framework has the advantage of being able to prevent internal attacks and use cloud resources efficiently.
2013 IEEE 5th International Conference on Cloud Computing Technology and Science, 2013
2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing, 2013
Today’s high-end vehicles are technologically more sophisticated and smarter than the ‘old machin... more Today’s high-end vehicles are technologically more sophisticated and smarter than the ‘old machines with engine and wheels’. These vehicles are anticipated to provide consumers with safe, reliable, and infotainment-rich driving experience through intelligent transportation system, realized through a technology referred to as vehicular ad hoc network (VANET). VANET offers a plethora of applications to the consumers ranging from safety to infotainment. Among other messages defined by the dedicated short range communication standard, cooperative awareness messages (CAMs) are of paramount importance for the VANET applications. In VANET, vehicles share their frequent mobility information in the form of CAMs with neighbors for cooperative awareness, traffic view construction, maneuver, and cruise control. In this work we target the CAM-based traffic information dissemination. VANET applications construct short-range local and long-range extend traffic views with the information contained in scheduled CAMs (also known as beacons). To construct aforementioned traffic views, naïve approach is multi-hop communication; however, historically multi-hop communication does not scale efficiently in dynamic VANET due to computational and communication overhead. Therefore another alternative approach is essential to address the problems of the multi-hop communication in highly ephemeral VANET and to achieve maximum degree of the information dissemination in VANET. To fill the gap, in this paper we propose a geocast-based abstract piggybacking mechanism for traffic information dissemination in VANET through single-hop CAMs. In the proposed scheme, vehicles compress their local traffic view constructed through single-hop CAMs. The compressed local traffic view is referred to as traffic data unit (TDU). Every vehicle broadcasts its own TDU along with a number of TDUs received from other vehicles in the next scheduled CAM, in order to construct a long-range extended traffic view, also known as compressed data word (CDW). In other words, CDW is encapsulated into normal CAM in order to share it with the neighbors in the vicinity. The receivers of CDW use the received TDUs to construct the desired length of the long-range extended traffic view. The proposed scheme leverages only single-hop beacons data to construct both local and extended traffic views. Our simulation results show that the extended traffic view up to 1 km can be constructed with only single-hop beacons at the expense of 10 % of extra information with the regular CAM. The results also show that the effect of the extra overhead is not phenomenal from overhead standpoint. The proposed virtual multi-hop communication paradigm with single-hop CAM will reduce the overall communication thereby saving the bandwidth for other important safety related communications.
The multitude of applications and services in Vehicular Ad hoc NETwork (VANET) and cloud computin... more The multitude of applications and services in Vehicular Ad hoc NETwork (VANET) and cloud computing technology that are dreamed of in the near future, are visible today. VANET applications are set to explode in the next couple of years as a result of the advancements in the wireless communication technologies and automobile industry. Nevertheless, it is speculated that future high-end vehicles will potentially under-utilize their on-board storage, computation, and communication resources. This phenomenon sets the ground for the evolution of traditional VANET to a rather more applications-rich paradigm referred to as VANET-based clouds. In this paper, we aim at a framework of VANET-based clouds namely VANET using Clouds (VuC) and propose a novel secure and privacy-aware service referred to as Traffic Information as a Service (TIaaS) atop the cloud computing services stack. TIaaS provides vehicles (more precisely subscribers) with fine-grained traffic information from the cloud as a result of subscribers’ cooperation with the cloud in a privacy-preserving way. Legitimate VANET users share their frequent whereabouts information referred to as Mobility Vectors (MV) with the cloud infrastructure through gateways (static Road Side Units—RSUs and mobile vehicles with 3/4 G Internet). The gateways forward coarse-grained traffic information (MVs) from vehicles to the cloud whereas after processing, cloud modules construct and re-forward the fine-grained traffic information along with location-based warnings to the subscribers based on their physical locations and moving directions. The communication among vehicles, gateways, and the cloud infrastructure is carried out in a privacy-preserving way. More precisely vehicles share their MVs with cloud infrastructure anonymously. The MVs are hard to link to the sender, until and unless necessary, otherwise. Similarly every vehicle receives fine-grained traffic information in a privacy-preserving manner. The proposed TIaaS keeps the adversaries at bay from abusing users’ privacy and/or constructing profiles against targeted users. Moreover for location confidentiality and privacy, we also propose a novel location-based encryption technique that keeps the insider and outsider adversaries at bay from manipulating the contents of the message. Furthermore, the proposed TIaaS preserves conditional privacy and with the help of an efficient revocation mechanism, revocation authorities can revoke any node in case of a dispute. The proposed TIaaS also introduces the thin-client concept for vehicles where most of the time-consuming processing is offloaded to the cloud and the processing resources of the vehicles can be used elsewhere, for instance for the critical safety related applications. More precisely the cloud processes the big traffic data (BTD) and produces timely, decisive, and meaningful results.
Vehicular ad hoc network (VANET) is expected to improve our driving experience through enhanced s... more Vehicular ad hoc network (VANET) is expected to improve our driving experience through enhanced safety, security, robustness, and infotainment. Nevertheless, despite considerable amount of research, VANET did not make it, at least not on a full scale, to the deployment stage because of many issues including security and privacy. However it is speculated that in the future high-end vehicles, on-board computation, communication, and storage resources will be under-utilized. Therefore, recently a new paradigm shift from conventional VANET to vehicular cloud computing was envisioned. This paradigm shift was realized through merging VANET with revolutionary cloud computing. Clearly cloud computing is one of today’s tempting technology areas due, at least partially, to its virtualization and cost-effectiveness. However, to date the potential architectural framework for VANET-based cloud computing has not been defined so far. To fill this gap, in this paper, first we put forth the taxonomy of VANET based cloud computing and then define a communication paradigm stack for VANET clouds. Additionally we divide VANET clouds into three architectural frameworks namely vehicular clouds (VC), vehicles using clouds (VuC), and hybrid vehicular clouds (HVC). Each proposed framework provides particular set of services depending upon the underlying communication paradigm. To understand our proposed framework well, we also propose a novel use-case service of the VANET-based cloud namely traffic information dissemination through clouds. In the proposed scheme, vehicles moving on the road are provided with fine-grained traffic information by the cloud as a result of their cooperation with the cloud infrastructure. Vehicles share their frequent mobility dynamics with the cloud and cloud in turn provides them with long range traffic information based on their current and near-future locations. Our simulation results show that the traffic information dissemination through cloud is feasible and the vehicles receive above 83 % of the traffic information from clouds through gateways in worst-case scenarios (i.e. extensive dense traffic) and above 90 % traffic information in average case scenarios. Finally we also outline the unique security and privacy issues and research challenges in VANET clouds.
Many Vehicular Ad Hoc NETwork (VANET) applications achieve a decent packet delivery ratio using m... more Many Vehicular Ad Hoc NETwork (VANET) applications achieve a decent packet delivery ratio using mobility information in the beacon messages broadcasted to the single-hop neighbors. Recently it has been found that if two VANET nodes are not within a line of sight (LoS), the performance of the employed VANET applications can be significantly degraded. Most of the existing VANET researches assume the ideal effective transmission range which does not consider Non-LoS (NLoS) scenario. To fill this gap, this paper provides a new mechanism: (a) to keep the track of the LoS status of individual vehicles on the road (b) to make sure that even in case of NLoS, vehicles maintain their communication with neighbors, and (c) to preserve the location confidentiality and privacy of the users conditionally at all times during communication. We propose a beacons-assisted plausibility-based technique to figure out NLoS status and a cooperative mechanism to guarantee a smooth communication between vehicles in case of NLoS. In case of NLoS, the affected vehicles raise alarms through their beacons and the neighbors with clear LoS to the target vehicles provide the affected vehicle with desired information. Moreover we maintain privacy-aware neighbor lists and location-based encryption for the aforementioned purpose and take the security of privacy of the whole system into account.
The foreseen dream of Vehicular Ad Hoc NETwork (VANET) deployment is obstructed by long-chased se... more The foreseen dream of Vehicular Ad Hoc NETwork (VANET) deployment is obstructed by long-chased security and privacy nightmares. Despite of the increasing demand for perfect privacy, it conflicts with rather more serious security threat called ‘Sybil Attack’ which refers to, impersonation of one physical entity for many, namely Sybil nodes. In such circumstances, data received from malicious Sybil attacker may seem as if it was received from many distinct physical nodes. Sybil nodes may deliberately mislead other neighbors, resulting in catastrophic situations like traffic jams or even deadly accidents. Preventing such attacks in a privacy-enabled environment is not a trivial task. In this paper, we aim at two conflicting goals, i.e. privacy and Sybil attack in VANET. We leverage pseudonymless beaconing in order to preserve privacy. To cope with Sybil attack, we put forth a twofold strategy. In order to avoid Sybil attack through scheduled beacons, we employ tamper resistant module (TRM) to carry out a pre-assembly data analysis on data that is used to assemble beacons whereas for event reporting message (ERM), we employ road side units (RSUs) to localize Sybil nodes in VANET and report them to the revocation authority(s). RSUs distribute authorized tokens among the benign vehicular nodes which in turn are consumed to report ERMs. RSUs collect ERMs for certain event and figures out if more than one ERM for the same event includes identical token or, if an ERM is sent more than once by the same source. Our proposed scheme preserves privacy in both beacons and ERMs, and provides conditional anonymity where in case of a dispute; malicious attackers are subject to revocation. We also show that our proposed scheme outperforms the previously proposed scheme from security and computational complexity standpoint.
Throughout the last century, the automobile industry achieved remarkable milestones in manufactur... more Throughout the last century, the automobile industry
achieved remarkable milestones in manufacturing reliable,
safe, and affordable vehicles. Because of significant recent
advances in computation and communication technologies,
autonomous cars are becoming a reality. Already autonomous
car prototype models have covered millions of miles in test
driving. Leading technical companies and car manufacturers
have invested a staggering amount of resources in autonomous
car technology, as they prepare for autonomous cars’ full
commercialization in the coming years. However, to achieve this
goal, several technical and non-technical issues remain: software
complexity, real-time data analytics, and testing and verification
are among the greater technical challenges; and consumer stimulation,
insurance management, and ethical/moral concerns rank
high among the non-technical issues. Tackling these challenges
requires thoughtful solutions that satisfy consumers, industry,
and governmental requirements, regulations, and policies. Thus,
here we present a comprehensive review of state-of-the-art results
for autonomous car technology. We discuss current issues that
hinder autonomous cars’ development and deployment on a
large scale. We also highlight autonomous car applications that
will benefit consumers and many other sectors. Finally, to
enable cost-effective, safe, and efficient autonomous cars, we
discuss several challenges that must be addressed (and provide
helpful suggestions for adoption) by designers, implementers,
policymakers, regulatory organizations, and car manufacturers.
The success of vehicular ad hoc network (VANET) among vehicle consumers is subject to the quality... more The success of vehicular ad hoc network (VANET)
among vehicle consumers is subject to the quality of comfort
and realism of safety promised by this technology. Recently
VANET evolved to a rather more application and servicesrich
paradigm referred to as VANET-based clouds. However,
the initial deployment stage of VANET and its successor
VANET-based cloud is going to be a daunting challenge due
to less market penetration rate of the technology-enabled
vehicles, and the deployment and cost of road-side infrastructure.
To fill the gaps, in this paper, after arguing on the
predictability of spatiotemporal characteristics of the public
transport buses in urban areas, we propose a mechanism
where these buses are used asmobile gateways (MGs) among
vehicles on the road, VANET authorities, and the cloud
infrastructure. MGs work as functional entities of the mobile
intermediary infrastructure (MII) in VANET-based clouds.
Our proposed scheme can serve as a feasible, cost-effective, and pre-established MII for standaloneVANET andVANETbased
clouds. We furthermore, carry out feasibility analysis
through a communication scheme in VANET-based clouds.
More precisely we consider the traffic information aggregation
and dissemination in VANET-based clouds. In order to
argue on the feasibility of buses as MGs, we consider realtime
road network dynamics in Seoul, South Korea where
the public buses provide perfect connectivity to other vehicular
nodes in the neighborhood. In VANET-based clouds
application, vehicles share coarse-grained information with
clouds through MGs and receive fine-grained traffic information
from cloud infrastructure through MGs in real-time.
Our simulation results show that MGs provide almost 100%
coverage in average traffic scenarios and about 98% coverage
in worst traffic scenarios. These MGs also provide the
vehicles with about 84% traffic information in worst case
and over 90% traffic information in average traffic scenarios.
Our proposed infrastructure can be a strong rationale for the
initial deployment of these technologies and can possibly be
a reasonable partial or full replacement for static RSUs in the
urban scenarios.
Recently an online electric vehicle (OLEV) concept has been introduced, where vehicles are propel... more Recently an online electric vehicle (OLEV) concept has been introduced, where vehicles are propelled through the wirelessly transmitted electrical power from the infrastructure installed under the road while moving. The absence of secure-and-fair billing is one main hurdle to widely adopt this promising technology. This paper introduces a secure and privacy-aware fair billing framework for OLEV on the move through the charging plates installed under the road. We first propose two extreme lightweight mutual authentication mechanisms, a direct authentication and a hash chain-based authentication between vehicles and the charging plates that can be used for different vehicular speeds on the road. Second we propose a secure and privacy-aware wireless power transfer on move for the vehicles with bidirectional auditability guarantee by leveraging game-theoretic approach. Each charging plate transfers a fixed amount of energy to the vehicle and bills the vehicle in a privacy-aware way acco...
IEEE Transactions on Consumer Electronics, 2014
ABSTRACT Typical digital video recorders (DVRs) have limited storage capacity, and it is not easy... more ABSTRACT Typical digital video recorders (DVRs) have limited storage capacity, and it is not easy for them to share content among user devices. However, if DVRs are extended to the cloud-based infrastructure, conversion of content and sharing it among multiple devices can be made possible through the cloud's computing power. To provide secure cloud computing service, appropriate measures are necessary to protect the computing processes performed on the content from inside and outside attackers. A content encryption scheme is a simple and effective way to protect content from attackers; however, if an encryption scheme is used, the user cannot use computing resources that can be used for media computation. This paper proposes a secure cloud DVR framework based on personal virtualization to securely provide various functions through cloud resources. The proposed scheme uses an input/output management unit (IOMMU), which serves as direct memory access (DMA) remapping for constructing secure personal virtualization. Using IOMMU, it is difficult for inside attackers to know which memory area is the actual memory of the target user. Therefore, secure computation in the cloud computing is possible through IOMMU. The proposed scheme uses an IOMMU based cloud computing to hide media computation from inside attacker, and a public cloud to increase efficiency.
2014 IEEE International Conference on Consumer Electronics (ICCE), 2014
ABSTRACT Typical DVRs (Digital Video Recorder) have forms of limited storage areas and it is not ... more ABSTRACT Typical DVRs (Digital Video Recorder) have forms of limited storage areas and it is not easy for them to share contents. If they are extended to Cloud areas, conversion of contents and sharing among multiple devices can come to be made possible through provided computing power. However, appropriate measures are necessary to protect computing processes of contents from inner attackers. This paper proposes a virtualized framework to securely and efficiently transmit DVR contents to users' mobile devices and convert them through Cloud. The proposed scheme can prevent attacks on conversion and transmission processes of contents through isolated personal virtualization, and provide various functions through Cloud Computing Resources.
2014 IEEE International Conference on Consumer Electronics (ICCE), 2014
ABSTRACT The development of cloud computing has caused the emergence of various services combinin... more ABSTRACT The development of cloud computing has caused the emergence of various services combining with it. Media Cloud is also one of the convergence services, and content protection from cloud service providers and service quality assurance are essential functions. This paper proposes a virtualization framework in order to provide media services securely and efficiently through the cloud. The proposed framework has the advantage of being able to prevent internal attacks and use cloud resources efficiently.
2013 IEEE 5th International Conference on Cloud Computing Technology and Science, 2013
2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing, 2013
Today’s high-end vehicles are technologically more sophisticated and smarter than the ‘old machin... more Today’s high-end vehicles are technologically more sophisticated and smarter than the ‘old machines with engine and wheels’. These vehicles are anticipated to provide consumers with safe, reliable, and infotainment-rich driving experience through intelligent transportation system, realized through a technology referred to as vehicular ad hoc network (VANET). VANET offers a plethora of applications to the consumers ranging from safety to infotainment. Among other messages defined by the dedicated short range communication standard, cooperative awareness messages (CAMs) are of paramount importance for the VANET applications. In VANET, vehicles share their frequent mobility information in the form of CAMs with neighbors for cooperative awareness, traffic view construction, maneuver, and cruise control. In this work we target the CAM-based traffic information dissemination. VANET applications construct short-range local and long-range extend traffic views with the information contained in scheduled CAMs (also known as beacons). To construct aforementioned traffic views, naïve approach is multi-hop communication; however, historically multi-hop communication does not scale efficiently in dynamic VANET due to computational and communication overhead. Therefore another alternative approach is essential to address the problems of the multi-hop communication in highly ephemeral VANET and to achieve maximum degree of the information dissemination in VANET. To fill the gap, in this paper we propose a geocast-based abstract piggybacking mechanism for traffic information dissemination in VANET through single-hop CAMs. In the proposed scheme, vehicles compress their local traffic view constructed through single-hop CAMs. The compressed local traffic view is referred to as traffic data unit (TDU). Every vehicle broadcasts its own TDU along with a number of TDUs received from other vehicles in the next scheduled CAM, in order to construct a long-range extended traffic view, also known as compressed data word (CDW). In other words, CDW is encapsulated into normal CAM in order to share it with the neighbors in the vicinity. The receivers of CDW use the received TDUs to construct the desired length of the long-range extended traffic view. The proposed scheme leverages only single-hop beacons data to construct both local and extended traffic views. Our simulation results show that the extended traffic view up to 1 km can be constructed with only single-hop beacons at the expense of 10 % of extra information with the regular CAM. The results also show that the effect of the extra overhead is not phenomenal from overhead standpoint. The proposed virtual multi-hop communication paradigm with single-hop CAM will reduce the overall communication thereby saving the bandwidth for other important safety related communications.
The multitude of applications and services in Vehicular Ad hoc NETwork (VANET) and cloud computin... more The multitude of applications and services in Vehicular Ad hoc NETwork (VANET) and cloud computing technology that are dreamed of in the near future, are visible today. VANET applications are set to explode in the next couple of years as a result of the advancements in the wireless communication technologies and automobile industry. Nevertheless, it is speculated that future high-end vehicles will potentially under-utilize their on-board storage, computation, and communication resources. This phenomenon sets the ground for the evolution of traditional VANET to a rather more applications-rich paradigm referred to as VANET-based clouds. In this paper, we aim at a framework of VANET-based clouds namely VANET using Clouds (VuC) and propose a novel secure and privacy-aware service referred to as Traffic Information as a Service (TIaaS) atop the cloud computing services stack. TIaaS provides vehicles (more precisely subscribers) with fine-grained traffic information from the cloud as a result of subscribers’ cooperation with the cloud in a privacy-preserving way. Legitimate VANET users share their frequent whereabouts information referred to as Mobility Vectors (MV) with the cloud infrastructure through gateways (static Road Side Units—RSUs and mobile vehicles with 3/4 G Internet). The gateways forward coarse-grained traffic information (MVs) from vehicles to the cloud whereas after processing, cloud modules construct and re-forward the fine-grained traffic information along with location-based warnings to the subscribers based on their physical locations and moving directions. The communication among vehicles, gateways, and the cloud infrastructure is carried out in a privacy-preserving way. More precisely vehicles share their MVs with cloud infrastructure anonymously. The MVs are hard to link to the sender, until and unless necessary, otherwise. Similarly every vehicle receives fine-grained traffic information in a privacy-preserving manner. The proposed TIaaS keeps the adversaries at bay from abusing users’ privacy and/or constructing profiles against targeted users. Moreover for location confidentiality and privacy, we also propose a novel location-based encryption technique that keeps the insider and outsider adversaries at bay from manipulating the contents of the message. Furthermore, the proposed TIaaS preserves conditional privacy and with the help of an efficient revocation mechanism, revocation authorities can revoke any node in case of a dispute. The proposed TIaaS also introduces the thin-client concept for vehicles where most of the time-consuming processing is offloaded to the cloud and the processing resources of the vehicles can be used elsewhere, for instance for the critical safety related applications. More precisely the cloud processes the big traffic data (BTD) and produces timely, decisive, and meaningful results.
Vehicular ad hoc network (VANET) is expected to improve our driving experience through enhanced s... more Vehicular ad hoc network (VANET) is expected to improve our driving experience through enhanced safety, security, robustness, and infotainment. Nevertheless, despite considerable amount of research, VANET did not make it, at least not on a full scale, to the deployment stage because of many issues including security and privacy. However it is speculated that in the future high-end vehicles, on-board computation, communication, and storage resources will be under-utilized. Therefore, recently a new paradigm shift from conventional VANET to vehicular cloud computing was envisioned. This paradigm shift was realized through merging VANET with revolutionary cloud computing. Clearly cloud computing is one of today’s tempting technology areas due, at least partially, to its virtualization and cost-effectiveness. However, to date the potential architectural framework for VANET-based cloud computing has not been defined so far. To fill this gap, in this paper, first we put forth the taxonomy of VANET based cloud computing and then define a communication paradigm stack for VANET clouds. Additionally we divide VANET clouds into three architectural frameworks namely vehicular clouds (VC), vehicles using clouds (VuC), and hybrid vehicular clouds (HVC). Each proposed framework provides particular set of services depending upon the underlying communication paradigm. To understand our proposed framework well, we also propose a novel use-case service of the VANET-based cloud namely traffic information dissemination through clouds. In the proposed scheme, vehicles moving on the road are provided with fine-grained traffic information by the cloud as a result of their cooperation with the cloud infrastructure. Vehicles share their frequent mobility dynamics with the cloud and cloud in turn provides them with long range traffic information based on their current and near-future locations. Our simulation results show that the traffic information dissemination through cloud is feasible and the vehicles receive above 83 % of the traffic information from clouds through gateways in worst-case scenarios (i.e. extensive dense traffic) and above 90 % traffic information in average case scenarios. Finally we also outline the unique security and privacy issues and research challenges in VANET clouds.
Many Vehicular Ad Hoc NETwork (VANET) applications achieve a decent packet delivery ratio using m... more Many Vehicular Ad Hoc NETwork (VANET) applications achieve a decent packet delivery ratio using mobility information in the beacon messages broadcasted to the single-hop neighbors. Recently it has been found that if two VANET nodes are not within a line of sight (LoS), the performance of the employed VANET applications can be significantly degraded. Most of the existing VANET researches assume the ideal effective transmission range which does not consider Non-LoS (NLoS) scenario. To fill this gap, this paper provides a new mechanism: (a) to keep the track of the LoS status of individual vehicles on the road (b) to make sure that even in case of NLoS, vehicles maintain their communication with neighbors, and (c) to preserve the location confidentiality and privacy of the users conditionally at all times during communication. We propose a beacons-assisted plausibility-based technique to figure out NLoS status and a cooperative mechanism to guarantee a smooth communication between vehicles in case of NLoS. In case of NLoS, the affected vehicles raise alarms through their beacons and the neighbors with clear LoS to the target vehicles provide the affected vehicle with desired information. Moreover we maintain privacy-aware neighbor lists and location-based encryption for the aforementioned purpose and take the security of privacy of the whole system into account.
The foreseen dream of Vehicular Ad Hoc NETwork (VANET) deployment is obstructed by long-chased se... more The foreseen dream of Vehicular Ad Hoc NETwork (VANET) deployment is obstructed by long-chased security and privacy nightmares. Despite of the increasing demand for perfect privacy, it conflicts with rather more serious security threat called ‘Sybil Attack’ which refers to, impersonation of one physical entity for many, namely Sybil nodes. In such circumstances, data received from malicious Sybil attacker may seem as if it was received from many distinct physical nodes. Sybil nodes may deliberately mislead other neighbors, resulting in catastrophic situations like traffic jams or even deadly accidents. Preventing such attacks in a privacy-enabled environment is not a trivial task. In this paper, we aim at two conflicting goals, i.e. privacy and Sybil attack in VANET. We leverage pseudonymless beaconing in order to preserve privacy. To cope with Sybil attack, we put forth a twofold strategy. In order to avoid Sybil attack through scheduled beacons, we employ tamper resistant module (TRM) to carry out a pre-assembly data analysis on data that is used to assemble beacons whereas for event reporting message (ERM), we employ road side units (RSUs) to localize Sybil nodes in VANET and report them to the revocation authority(s). RSUs distribute authorized tokens among the benign vehicular nodes which in turn are consumed to report ERMs. RSUs collect ERMs for certain event and figures out if more than one ERM for the same event includes identical token or, if an ERM is sent more than once by the same source. Our proposed scheme preserves privacy in both beacons and ERMs, and provides conditional anonymity where in case of a dispute; malicious attackers are subject to revocation. We also show that our proposed scheme outperforms the previously proposed scheme from security and computational complexity standpoint.