Introducing a fog-based and secured approach for Vehicular Area Networks
Publish place: Fifth International Conference on Electrical and Computer Engineering with Emphasis on Indigenous Knowledge
Publish Year: 1396
نوع سند: مقاله کنفرانسی
زبان: English
View: 475
This Paper With 7 Page And PDF Format Ready To Download
- Certificate
- من نویسنده این مقاله هستم
استخراج به نرم افزارهای پژوهشی:
شناسه ملی سند علمی:
COMCONF05_435
تاریخ نمایه سازی: 21 اردیبهشت 1397
Abstract:
Authentication, privacy, non-repudiation and data integrity services are very important in vehicular ad hoc network. Due to its dynamic technology, creation secure communication in the network is the most important issues studied. Using the unique ID that hashed with secure hash function for identification is highly effective and make the fraud attacks impossible. Fog architecture is applied to store IDs and detect malicious nodes. Interruption, if any malicious node transmitted insecure messages, is this unit s task. All messages that are sent in these networks should be encrypted. Encryption and decryption operations are performed under supervision of the Fog system. A Fog layer is placed between the two cloud layers and the end user. Using Fog solves the delay problem and resource constraints. It also increases security in our system. In this system, an algorithm based on the RSA algorithm with short text length and high power system is applied to encrypt and decode. This context solves the low speed problem of the RSA algorithm and due to the speed of Android processors offers optimal performance.
Keywords:
Authors
Entesar Hosseini
Department of Computer Engineering and Information Technology university of Qom, Qom, Iran
Mohsen Nickray
Department of Computer Engineering and Information Technology university of Qom, Qom, Iran