A statistical approach for enhancing security in VANETs with efficient rogue node detection using fog computing

نویسندگان

چکیده

Rogue nodes broadcasting false information in beacon messages may lead to catastrophic consequences Vehicular Ad Hoc Networks (VANETs). Previous researchers used cryptography, trust scores, or past vehicle data detect rogue nodes; however, these methods suffer from high processing delay, overhead, and False–Positive Rate (FPR). We propose herein Greenshield's traffic model–based fog computing scheme called Fog–based Node Detection (F–RouND), which dynamically utilizes the On–Board Units (OBUs) of all vehicles region for node detection. aim reduce delays FPR detecting at densities. The performance F–RouND framework was evaluated via simulations. Results show that ensures 45% lower delays, 12% 36% urban scenario than existing detection schemes even when number increases by up 40% region.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Challenges in Fog Computing in Healthcare

Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems. In such systems, a large amount of data is acquired from a multitude of bio and environmental sensors. On the other hand, its distribution and...

متن کامل

Task Scheduling in Fog Computing: A Survey

Recently, fog computing has been introducedto solve the challenges of cloud computing regarding Internet objects. One of the challenges in the field of fog computing is the scheduling of tasks requested by Internet objects. In this study, a review of articles related to task scheduling in fog computing has been done. At first, the research questions and goals will be introduced, an...

متن کامل

Fog Data: Enhancing Telehealth Big Data Through Fog Computing

The size of multi-modal, heterogeneous data collected through various sensors is growing exponentially. It demands intelligent data reduction, data mining and analytics at edge devices. Data compression can reduce the network bandwidth and transmission power consumed by edge devices. This paper proposes, validates and evaluates Fog Data, a service-oriented architecture for Fog computing. The ce...

متن کامل

Fog Computing: Comprehensive Approach for Security Data Theft Attack Using Elliptic Curve Cryptography and Decoy Technology

Fog computing extends cloud computing, provides the services like data, compute, storage and application to end user. It improves the quality of service and also reduces latency. According to Cisco, due to its wide geographical distribution, the Fog computing is well suited for real time analytics and big data. This article, by exploitation advantages of Fog computing Paradigm, analyzes its app...

متن کامل

A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications

Fog computing extends cloud computing to the edge of a network enabling new Internet of Things (IoT) applications and services, which may involve critical data that require privacy and security. In an IoT fog computing system, three elements can be distinguished: IoT nodes that collect data, the cloud, and interconnected IoT gateways that exchange messages with the IoT nodes and with the cloud....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Digital Communications and Networks

سال: 2022

ISSN: ['2468-5925', '2352-8648']

DOI: https://doi.org/10.1016/j.dcan.2021.09.010