Introducing a fog-based and secured approach for Vehicular Area Networks

Publish Year: 1396
نوع سند: مقاله کنفرانسی
زبان: English
View: 434

This Paper With 7 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

COMCONF05_435

تاریخ نمایه سازی: 21 اردیبهشت 1397

Abstract:

Authentication, privacy, non-repudiation and data integrity services are very important in vehicular ad hoc network. Due to its dynamic technology, creation secure communication in the network is the most important issues studied. Using the unique ID that hashed with secure hash function for identification is highly effective and make the fraud attacks impossible. Fog architecture is applied to store IDs and detect malicious nodes. Interruption, if any malicious node transmitted insecure messages, is this unit s task. All messages that are sent in these networks should be encrypted. Encryption and decryption operations are performed under supervision of the Fog system. A Fog layer is placed between the two cloud layers and the end user. Using Fog solves the delay problem and resource constraints. It also increases security in our system. In this system, an algorithm based on the RSA algorithm with short text length and high power system is applied to encrypt and decode. This context solves the low speed problem of the RSA algorithm and due to the speed of Android processors offers optimal performance.

Keywords:

Authentication , privacy , vehicular ad hoc network , Fog Computing , RSA , Android

Authors

Entesar Hosseini

Department of Computer Engineering and Information Technology university of Qom, Qom, Iran

Mohsen Nickray

Department of Computer Engineering and Information Technology university of Qom, Qom, Iran