Skip to content
2000
Volume 19, Issue 1
  • ISSN: 2666-2558
  • E-ISSN: 2666-2566

Abstract

New possibilities for fog-based vehicle monitoring have emerged with the expansion of fog computing, but present privacy concerns provide a significant barrier that limits the extent to which vehicles can participate. Because of its potential to improve road network security and vehicle productivity, the field of Vehicle-based Ad hoc Networks (VANETs) is gaining prominence. The security problems with VANETs, such as data confidentiality and message access control still need better solutions to provide better Quality of Service (QoS). The effectiveness of VANET networks is diminished due to their instability problem. Vehicles continually add requests to the Road Side Unit (RSU) queue whenever they want specific information. For ever-evolving networks like VANETs, better routing is a continual process. Fundamental problems arise in large-scale systems when centralized procedures are used to assign jobs to the nodes along a route. The present centralized system for computing and safety has many needs, including the protection of data storage, user authentication, access control, system availability across multiple network connections, and the provision of a real-time data flow overview. Distributed problem solving and work sharing between multiple agents can improve the system's scalability. This paper provides a brief survey on the secured outsourcing and privacy preservation-based traffic monitoring model with routing and task scheduling models in Fog-enabled VANETS. This survey presents the limitations of the traditional models that help the researchers design new solutions for secure outsourcing in VANETs.

Loading

Article metrics loading...

/content/journals/rascs/10.2174/0126662558339759241011112321
2024-10-22
2025-12-09
Loading full text...

Full text loading...

References

  1. WeiL. CuiJ. ZhongH. BolodurinaI. LiuL. A lightweight and conditional privacy-preserving authenticated key agreement scheme with multi-TA model for fog-based VANETs.IEEE Transac Depend. Secure Comp.202320142243610.1109/TDSC.2021.3135016
    [Google Scholar]
  2. YangY. ZhangL. ZhaoY. ChooK.K.R. ZhangY. Privacy-Preserving Aggregation-Authentication Scheme for Safety Warning System in Fog-Cloud Based VANET.IEEE Trans. Inf. Forensics Security20221731733110.1109/TIFS.2022.3140657
    [Google Scholar]
  3. ZhongL. Secure and lightweight conditional privacy-preserving authentication for fog-based vehicular Ad Hoc networks.IEEE Int. Things J.20229118485849710.1109/JIOT.2021.3116039
    [Google Scholar]
  4. GuK. WangK. LiX. JiaW. Multi-fogs-based traceable privacy-preserving scheme for vehicular identity in internet of vehicles.IEEE Trans. Intell. Transp. Syst.2022238125441256110.1109/TITS.2021.3115171
    [Google Scholar]
  5. CuiJ. WangY. ZhangJ. XuY. ZhongH. Full session key agreement scheme based on chaotic map in vehicular Ad Hoc networks.IEEE Trans. Vehicular Technol.20206988914892410.1109/TVT.2020.2997694
    [Google Scholar]
  6. CuiM. HanD. WangJ. An efficient and safe road condition monitoring authentication scheme based on fog computing.IEEE Internet Things J.2019659076908410.1109/JIOT.2019.2927497
    [Google Scholar]
  7. UllahA. YaqoobS. ImranM. NingH. Emergency message dissemination schemes based on congestion avoidance in VANET and vehicular FoG computing.IEEE Access201971570158510.1109/ACCESS.2018.2887075
    [Google Scholar]
  8. LiangJ. WuK. An extremely accurate time synchronization mechanism in fog-based vehicular Ad-Hoc network.IEEE Access2020825326810.1109/ACCESS.2019.2958867
    [Google Scholar]
  9. ShenJ. LiuD. ChenX. LiJ. KumarN. VijayakumarP. Secure real-time traffic data aggregation with batch verification for vehicular cloud in VANETs.IEEE Trans. Vehicular Technol.202069180781710.1109/TVT.2019.2946935
    [Google Scholar]
  10. SkordylisA. TrigoniN. Efficient data propagation in traffic-monitoring vehicular networks.IEEE Trans. Intell. Transp. Syst.201112368069410.1109/TITS.2011.2159857
    [Google Scholar]
  11. WangY. DingY. WuQ. WeiY. QinB. WangH. Privacy-preserving cloud-based road condition monitoring with source authentication in VANETs.IEEE Trans. Inf. Forensics Security20191471779179010.1109/TIFS.2018.2885277
    [Google Scholar]
  12. GillaniM. NiazH.A. UllahA. FarooqM.U. RehmanS. Traffic aware data gathering protocol for VANETs.IEEE Access202210234382344910.1109/ACCESS.2022.3154780
    [Google Scholar]
  13. PedrosoC. GomidesT.S. GuidoniD.L. NogueiraM. SantosA.L. A robust traffic information management system against data poisoning in vehicular networks.IEEE Latin America Transac.202220122421242810.1109/TLA.2022.9905610
    [Google Scholar]
  14. SunG. ZhangY. YuH. DuX. GuizaniM. Intersection fog-based distributed routing for V2V communication in urban vehicular Ad Hoc networks.IEEE Trans. Intell. Transp. Syst.20202162409242610.1109/TITS.2019.2918255
    [Google Scholar]
  15. SongL. SunG. YuH. DuX. GuizaniM. FBIA: A fog-based identity authentication scheme for privacy preservation in internet of vehicles.IEEE Trans. Vehicular Technol.20206955403541510.1109/TVT.2020.2977829
    [Google Scholar]
  16. ZhangX. LyuC. ShiZ. LiD. XiongN.N. ChiC.H. Reliable multiservice delivery in fog-enabled VANETs: Integrated misbehavior detection and tolerance.IEEE Access20197957629577810.1109/ACCESS.2019.2928365
    [Google Scholar]
  17. FerozB. MehmoodA. MaryamH. ZeadallyS. MapleC. ShahM.A. Vehicle-life interaction in fog-enabled smart connected and autonomous vehicles.IEEE Access202197402742010.1109/ACCESS.2020.3049110
    [Google Scholar]
  18. HeY. WangD. HuangF. ZhangR. An MEC-enabled framework for task offloading and power allocation in NOMA enhanced ABS-assisted VANETs.IEEE Commun. Lett.20222661353135710.1109/LCOMM.2022.3162603
    [Google Scholar]
  19. NayakB.P. HotaL. KumarA. TurukA.K. ChongP.H.J. Autonomous vehicles: Resource allocation, security, and data privacy.IEEE Trans. Green Commun. Netw.20226111713110.1109/TGCN.2021.3110822
    [Google Scholar]
  20. MaC. ZhuJ. LiuM. ZhaoH. LiuN. ZouX. Parking edge computing: Parked-vehicle-assisted task offloading for urban VANETs.IEEE Int. Things J.20218119344935810.1109/JIOT.2021.3056396
    [Google Scholar]
  21. Al-MekhlafiZ.G. Al-ShareedaM.A. ManickamS. MohammedB.A. QtaishA. Lattice-based lightweight quantum resistant scheme in 5G-enabled vehicular networks.Mathematics202311239910.3390/math11020399
    [Google Scholar]
  22. MohammedB.A. Al-ShareedaM.A. ManickamS. Al-MekhlafiZ.G. AlreshidiA. AlazmiM. AlshudukhiJ.S. AlsaffarM. FC-PA: fog computing-based pseudonym authentication scheme in 5G-enabled vehicular networks.IEEE Access202311185711858110.1109/ACCESS.2023.3247222
    [Google Scholar]
  23. Al-MekhlafiZ.G. Al-ShareedaM.A. ManickamS. MohammedB.A. AlreshidiA. AlazmiM. AlshudukhiJ.S. AlsaffarM. AlsewariA. Chebyshev polynomial-based fog computing scheme supporting pseudonym revocation for 5G-enabled vehicular networks.Electronics (Basel)202312487210.3390/electronics12040872
    [Google Scholar]
  24. Veeranampalayam SivakumarA.N. LiJ. ScottS. PsotaE. JhalaJ. A.; Luck, J.D.; Shi, Y. “Comparison of object detection and patch-based classification deep learning models on mid- to late-season weed detection in UAV imagery”.Remote Sens.202012213610.3390/rs12132136
    [Google Scholar]
  25. BaurJ. SteinbergG. NikulinA. ChiuK. de SmetT.S. Applying deep learning to automate UAV-based detection of scatterable landmines.Remote Sens. (Basel)202012585910.3390/rs12050859
    [Google Scholar]
  26. MukherjeeA. MisraS. ChandraV.S.P. ObaidatM.S. Resource-optimized multiarmed bandit-based offload path selection in edge UAV swarms.IEEE Internet Things J.2019634889489610.1109/JIOT.2018.2879459
    [Google Scholar]
  27. YangM.D. TsengH.H. HsuY.C. TsaiH.P. Semantic segmentation using deep learning with vegetation indices for rice lodging identification in multi-date UAV visible images.Remote Sens. (Basel)202012463310.3390/rs12040633
    [Google Scholar]
  28. MukherjeeA. MisraS. ChandraV.S.P. RaghuwanshiN.S. ECoR: Energy-aware collaborative routing for task offload in sustainable UAV swarms.IEEE Trans. Sustain. Comput.20205451452510.1109/TSUSC.2020.2976453
    [Google Scholar]
  29. MukherjeeA. MisraS. SukruthaA. RaghuwanshiN.S. Distributed aerial processing for IoT-based edge UAV swarms in smart farming.Comp. Netw.202016710703810.1016/j.comnet.2019.107038
    [Google Scholar]
  30. WuY. ZhengJ. Modeling and analysis of the downlink local delay in MEC-based VANETs.IEEE Trans. Vehicular Technol.20206966619663010.1109/TVT.2020.2984835
    [Google Scholar]
  31. LiG. LiX. SunQ. BoukhatemL. WuJ. An Effective MEC sustained charging data transmission algorithm in VANET-based smart grids.IEEE Access2020810194610196210.1109/ACCESS.2020.2998018
    [Google Scholar]
  32. WuY. ZhengJ. Analysis of the uplink local delay in an MEC-based VANET2019 IEEE Global Communications Conference (GLOBECOM) WaikoloaHI, USA, 2019, pp.1-6.10.1109/GLOBECOM38437.2019.9013331
    [Google Scholar]
  33. ZhangD. GeH. ZhangT. CuiY.Y. LiuX. MaoG. New multi-hop clustering algorithm for vehicular Ad Hoc networks.IEEE Trans. Intell. Transp. Syst.20192041517153010.1109/TITS.2018.2853165
    [Google Scholar]
  34. QafzeziE. BylykbashiK. AmpriritP. IkedaM. MatsuoK. BarolliL. A fuzzy-based system for assessment of fog computing resourcesInternational Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.Springer20221910.1007/978‑3‑031‑08819‑3_1
    [Google Scholar]
  35. FarooqiA.M. AlamM.A. HassanS.I. IdreesS.M. A fog computing model for VANET to reduce latency and delay using 5G network in smart city transportation.Appl. Sci. (Basel)2022124208310.3390/app12042083
    [Google Scholar]
  36. HassijaV. SaxenaV. ChamolaV. Scheduling drone charging for multi-drone network based on consensus time-stamp and game theory.Comp. Commun.2020149516110.1016/j.comcom.2019.09.021
    [Google Scholar]
  37. SrivastavaA. PrakashA. TripathiR. Location based routing protocols in VANET: Issues and existing solutions.Vehicul. Commun.20202310023110.1016/j.vehcom.2020.100231
    [Google Scholar]
  38. BadawyM.M. AliZ.H. AliH.A. QoS provisioning framework for service-oriented internet of things (IoT).Cluster Comput.202023257559110.1007/s10586‑019‑02945‑x
    [Google Scholar]
  39. HuangM. LiuY. ZhangN. XiongN.N. LiuA. ZengZ. SongH. A services routing based caching scheme for cloud assisted CRNs.IEEE Access20186157871580510.1109/ACCESS.2018.2815039
    [Google Scholar]
  40. AlzamzamiO. MahgoubI. Geographic routing enhancement for urban VANETs using link dynamic behavior: A cross layer approach.Vehicul. Commun.20213110035410.1016/j.vehcom.2021.100354
    [Google Scholar]
  41. JohnF. Traffic congestion prediction based on Hidden Markov Models and contrast measure.Ain Shams Eng. J.202011353555110.1016/j.asej.2019.10.006
    [Google Scholar]
  42. LuR. ZhangL. NiJ. FangY. 5G vehicle-to-everything services: Gearing up for security and privacy.Proc. IEEE2020108237338910.1109/JPROC.2019.2948302
    [Google Scholar]
  43. SharmaS. KaushikB. A survey on internet of vehicles: Applications, security issues & solutions.Vehicul. Commun.20192010018210.1016/j.vehcom.2019.100182
    [Google Scholar]
  44. KumarV. AhmadM. MishraD. KumariS. KhanM.K. RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing.Vehicul. Commun.20202210021310.1016/j.vehcom.2019.100213
    [Google Scholar]
  45. XiongJ. MaR. ChenL. TianY. LiQ. LiuX. YaoZ. A Personalized privacy protection framework for mobile crowdsensing in IIoT.IEEE Trans. Industr. Inform.20201664231424110.1109/TII.2019.2948068
    [Google Scholar]
  46. HuH. LuR. ZhangZ. ShaoJ. REPLACE: A reliable trust-based platoon service recommendation scheme in VANET.IEEE Trans. Vehicular Technol.20176621786179710.1109/TVT.2016.2565001
    [Google Scholar]
  47. Al-ShareedaM.A. AnbarM. HasbullahI.H. ManickamS. Survey of authentication and privacy schemes in vehicular ad hoc networks.IEEE Sens. J.20212122422243310.1109/JSEN.2020.3021731
    [Google Scholar]
  48. XiongJ. BiR. ZhaoM. GuoJ. YangQ. Edge-assisted privacy-preserving raw data sharing framework for connected autonomous vehicles.IEEE Wirel. Commun.2020273243010.1109/MWC.001.1900463
    [Google Scholar]
  49. HeD. ZeadallyS. XuB. HuangX. An efficient identity-based conditional privacy-preserving authentication scheme for vehicular Ad Hoc networks.IEEE Trans. Inf. Forensics Security201510122681269110.1109/TIFS.2015.2473820
    [Google Scholar]
  50. TzengS.F. HorngS.J. LiT. WangX. HuangP.H. KhanM.K. Enhancing security and privacy for identity-based batch verification scheme in VANETs.IEEE Trans. Vehicular Technol.20176643235324810.1109/TVT.2015.2406877
    [Google Scholar]
  51. KocherP. JaffeJ. JunB. RohatgiP. Introduction to differential power analysis.J. Cryptogr. Eng.20111152710.1007/s13389‑011‑0006‑y
    [Google Scholar]
  52. XiongL. An enhanced privacy-aware authentication scheme for distributed mobile cloud computing services.Trans. Internet Inf. Syst. (Seoul)201711126169618710.3837/tiis.2017.12.026
    [Google Scholar]
  53. WazidM. BaggaP. DasA.K. ShettyS. RodriguesJ.J.P.C. ParkY. AKM-IoV: Authenticated key management protocol in fog computing-based internet of vehicles deployment.IEEE Internet Things J.2019658804881710.1109/JIOT.2019.2923611
    [Google Scholar]
/content/journals/rascs/10.2174/0126662558339759241011112321
Loading
/content/journals/rascs/10.2174/0126662558339759241011112321
Loading

Data & Media loading...

This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error
Please enter a valid_number test