DOI QR코드

DOI QR Code

초기 생성과 사용자 추가를 고려한 VANET 클라우드 아키텍처

Supplements an Initial Creation and User Addition in VANET Cloud Architecture

  • 김태형 (연세대학교 컴퓨터과학과) ;
  • 송주석 (연세대학교 컴퓨터과학과)
  • 투고 : 2014.07.17
  • 심사 : 2014.09.15
  • 발행 : 2014.12.31

초록

무인 자동차의 시대가 도래하면서, 차량 간 통신 네트워크인 Vehicular Ad hoc NETwork(VANET)의 중요성이 점점 더해지고 있다. 지금까지 VANET의 연구가 많이 진행되었으나, 기존의 연구는 각 자동차의 통신적인 측면만 연구하고, 차량에 설치된 On Board Unit(OBU)의 계산 능력, 저장 공간 등을 효율적으로 사용하지 못하는 한계점이 있었다. 그러나 최근 나온 VANET cloud computing(VCC) 개념은 높아진 각 자동차의 능력을 효율적으로 이용하여, 유용하게 사용하는 것에 초점을 맞추어 이러한 한계점을 해결하였다. 그러나 지금까지 진행된 연구에서는 VCC의 초기 클라우드 생성 부분과 사용자 추가 부분의 연구가 미흡한 실정이다. 본 논문은 이러한 부분을 보완한, VCC 아키텍처를 제안한다.

While the era of driverless car has come, Vehicular Ad hoc NETwork(VANET) is getting important. Original VANET has a limit that cannot use computation power, storage space of On Board Unit(OBU) installed in a vehicle efficiently. VANET cloud computing(VCC) solves the limit to focus on using abilities of each vehicle. This article proposes VCC architecture for supplementing user addition and initial cloud creation that have been researched insufficiently.

키워드

참고문헌

  1. Olariu, Stephan, Ismail Khalil, and Mahmoud Abuelela, "Taking VANET to the clouds," International Journal of Pervasive Computing and Communications, Vol.7, No.1, pp.7-21, 2011. https://doi.org/10.1108/17427371111123577
  2. El Zarki, Magda, et al., "Security issues in a future vehicular network," European Wireless, Vol.2, 2002.
  3. Armbrust, Michael, et al., "A view of cloud computing," Communications of the ACM, Vol.53, No.4, pp.50-58, 2010.
  4. Olariu, Stephan, Tihomir Hristov, and Gongjun Yan, "The next paradigm shift: from vehicular networks to vehicular clouds," Basagni, S., Conti, M., and Giordano, S. Stojmenovic, I) (Eds), "Mobile Ad hoc networking: the cutting edge directions," Wiley and Sons, New York, 2012.
  5. Hussain, Rasheed, et al., "Rethinking vehicular communications: merging VANET with cloud computing," Cloud Computing Technology and Science (CloudCom), 2012 IEEE 4th International Conference on. IEEE, 2012.
  6. Popek, Gerald J., Robert P. Goldberg, "Formal requirements for virtualizable third generation architectures," Communications of the ACM, Vol.17, No.7, pp.412-421, 1974. https://doi.org/10.1145/361011.361073
  7. Su, William, Sung-Ju Lee, and Mario Gerla, "Mobility prediction and routing in ad hoc wireless networks," International Journal of Network Management, Vol.11, No.1, pp.3-30, 2001. https://doi.org/10.1002/nem.386
  8. Noureddine, Hadi, et al., "A New Link Lifetime Prediction Method for Greedy and Contention-based Routing in Mobile Ad Hoc Networks," Computer and Information Technology (CIT), 2010 IEEE 10th International Conference on. IEEE, 2010.
  9. Rivest, Ronald L., Adi Shamir, and Len Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, Vol.21, No.2, pp.120-126, 1978. https://doi.org/10.1145/359340.359342
  10. Rowland, Craig H., "Intrusion detection system," U.S. Patent, No.6, 405,318., 11 Jun., 2002.
  11. Modi, Chirag, et al., "A survey of intrusion detection techniques in cloud," Journal of Network and Computer Applications, Vol.36, No.1, pp.42-57, 2013. https://doi.org/10.1016/j.jnca.2012.05.003
  12. Qiao, Yan, et al., "Anomaly intrusion detection method based on HMM," Electronics Letters, Vol.38, No.13, pp.663-664, 2002. https://doi.org/10.1049/el:20020467
  13. Chaum, David, and Eugene Van Heyst, "Group signatures," Advances in Cryptology-EUROCRYPT'91. Springer Berlin Heidelberg, 1991.
  14. Guo, Jinhua, John P. Baugh, and Shengquan Wang, "A group signature based secure and privacy-preserving vehicular communication framework," Mobile Networking for Vehicular Environments 2007, pp.103-108, 2007.