Browse > Article
http://dx.doi.org/10.3745/KTCCS.2014.3.12.449

Supplements an Initial Creation and User Addition in VANET Cloud Architecture  

Kim, Taehyeong (연세대학교 컴퓨터과학과)
Song, JooSeok (연세대학교 컴퓨터과학과)
Publication Information
KIPS Transactions on Computer and Communication Systems / v.3, no.12, 2014 , pp. 449-454 More about this Journal
Abstract
While the era of driverless car has come, Vehicular Ad hoc NETwork(VANET) is getting important. Original VANET has a limit that cannot use computation power, storage space of On Board Unit(OBU) installed in a vehicle efficiently. VANET cloud computing(VCC) solves the limit to focus on using abilities of each vehicle. This article proposes VCC architecture for supplementing user addition and initial cloud creation that have been researched insufficiently.
Keywords
Vehicular ad Hoc Network; Vehicular ad Hoc Network Cloud Computing; Road Side Unit; Driverless Car;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Qiao, Yan, et al., "Anomaly intrusion detection method based on HMM," Electronics Letters, Vol.38, No.13, pp.663-664, 2002.   DOI
2 Chaum, David, and Eugene Van Heyst, "Group signatures," Advances in Cryptology-EUROCRYPT'91. Springer Berlin Heidelberg, 1991.
3 Guo, Jinhua, John P. Baugh, and Shengquan Wang, "A group signature based secure and privacy-preserving vehicular communication framework," Mobile Networking for Vehicular Environments 2007, pp.103-108, 2007.
4 Olariu, Stephan, Ismail Khalil, and Mahmoud Abuelela, "Taking VANET to the clouds," International Journal of Pervasive Computing and Communications, Vol.7, No.1, pp.7-21, 2011.   DOI
5 El Zarki, Magda, et al., "Security issues in a future vehicular network," European Wireless, Vol.2, 2002.
6 Rivest, Ronald L., Adi Shamir, and Len Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, Vol.21, No.2, pp.120-126, 1978.   DOI   ScienceOn
7 Armbrust, Michael, et al., "A view of cloud computing," Communications of the ACM, Vol.53, No.4, pp.50-58, 2010.
8 Olariu, Stephan, Tihomir Hristov, and Gongjun Yan, "The next paradigm shift: from vehicular networks to vehicular clouds," Basagni, S., Conti, M., and Giordano, S. Stojmenovic, I) (Eds), "Mobile Ad hoc networking: the cutting edge directions," Wiley and Sons, New York, 2012.
9 Hussain, Rasheed, et al., "Rethinking vehicular communications: merging VANET with cloud computing," Cloud Computing Technology and Science (CloudCom), 2012 IEEE 4th International Conference on. IEEE, 2012.
10 Popek, Gerald J., Robert P. Goldberg, "Formal requirements for virtualizable third generation architectures," Communications of the ACM, Vol.17, No.7, pp.412-421, 1974.   DOI   ScienceOn
11 Su, William, Sung-Ju Lee, and Mario Gerla, "Mobility prediction and routing in ad hoc wireless networks," International Journal of Network Management, Vol.11, No.1, pp.3-30, 2001.   DOI   ScienceOn
12 Noureddine, Hadi, et al., "A New Link Lifetime Prediction Method for Greedy and Contention-based Routing in Mobile Ad Hoc Networks," Computer and Information Technology (CIT), 2010 IEEE 10th International Conference on. IEEE, 2010.
13 Rowland, Craig H., "Intrusion detection system," U.S. Patent, No.6, 405,318., 11 Jun., 2002.
14 Modi, Chirag, et al., "A survey of intrusion detection techniques in cloud," Journal of Network and Computer Applications, Vol.36, No.1, pp.42-57, 2013.   DOI