Cloud Computing Model for Vehicular Ad hoc Networks

Author(s):  
Kashif Naseer Qureshi ◽  
Faisal Bashir ◽  
Saleem Iqbal
2015 ◽  
Vol 22 (1) ◽  
pp. 96-102 ◽  
Author(s):  
Salim Bitam ◽  
Abdelhamid Mellouk ◽  
Sherali Zeadally

2019 ◽  
pp. 592-620
Author(s):  
Poonam Saini ◽  
Awadhesh Kumar Singh

Resource sharing is the most attractive feature of distributed computing. Information is also a kind of resource. The portable computing devices and wireless networks are playing a dominant role in enhancing the information sharing and thus in the advent of many new variants of distributed computing viz. ubiquitous, grid, cloud, pervasive and mobile. However, the open and distributed nature of Mobile Ad Hoc Networks (MANETs), Vehicular Ad Hoc Networks (VANETs) and cloud computing systems, pose a threat to information that may be coupled from one user (or program) to another. The chapter illustrates the general characteristics of ad hoc networks and computing models that make obligatory to design secure protocols in such environments. Further, we present a generic classification of various threats and attacks. In the end, we describe the security in MANETs, VANETs and cloud computing. The chapter concludes with a description of tools that are popularly used to analyze and access the performance of various security protocols.


Author(s):  
Poonam Saini ◽  
Awadhesh Kumar Singh

Resource sharing is the most attractive feature of distributed computing. Information is also a kind of resource. The portable computing devices and wireless networks are playing a dominant role in enhancing the information sharing and thus in the advent of many new variants of distributed computing viz. ubiquitous, grid, cloud, pervasive and mobile. However, the open and distributed nature of Mobile Ad Hoc Networks (MANETs), Vehicular Ad Hoc Networks (VANETs) and cloud computing systems, pose a threat to information that may be coupled from one user (or program) to another. The chapter illustrates the general characteristics of ad hoc networks and computing models that make obligatory to design secure protocols in such environments. Further, we present a generic classification of various threats and attacks. In the end, we describe the security in MANETs, VANETs and cloud computing. The chapter concludes with a description of tools that are popularly used to analyze and access the performance of various security protocols.


Author(s):  
T. Kavitha

Cloud computing provides a way to avail hardware and software to provide services over the networks to users, whereas in mobile cloud computing, mobile devices are a part of cloud users and service providers. Vehicular ad hoc networks (VANETs) are developed with the help of mobile ad hoc networks (MANET) with the difference that the data are exchanged among mobile vehicles to enhance the road safety and traffic efficiency. VANETs safety applications includes traffic signal violation, curve speed warning, emergency brake lights, pre-crash sensing, collision warning, left turn assist, lane change warning, and stop sign assist. But due to the requirement of smaller size, one of the significant challenges of the vehicular network is the limited resource with respect to memory, computation power, and bandwidth. It leads to slow data processing capability. However, the demanding requirement of emerging application is complex computation with high storage capacity. This necessity can be fulfilled by sharing the available resource among all the vehicles which are in near proximity. It can be achieved by integrating the vehicular network with cloud computing which is called as vehicular cloud computing (VCC). VCC is a new technological shift that can take the advantages of cloud computing to afford the services to drivers of VANET. But VCC is still in early stage and due to its unique features and applications it has become a significant emerging research area which needs to be explored further.


Sign in / Sign up

Export Citation Format

Share Document