scholarly journals A Review on Cybersecurity of Cloud Computing for Supporting Connected Vehicle Applications

Author(s):  
M Sabbir Salek ◽  
Sakib Mahmud Khan ◽  
Mizanur rahman ◽  
Hsien-wen Deng ◽  
Mhafuzul islam ◽  
...  

In an internet-of-things (IoT) environment, cloud computing is emerging as a technologically feasible and economically viable solution for supporting real-time and non-real-time connected vehicle (CV) applications due to its unlimited storage, enormous computing capabilities, and cost advantage, i.e., cloud computing costs less than owning such systems. However, maintaining cybersecurity is a major challenge in cloud-supported CV applications as it requires CVs and various transportation or non-transportation services to exchange data with the cloud via multiple wired and wireless communication networks, such as long-term evolution (LTE) and Wi-Fi. In this paper, we review the cybersecurity requirements of cloud-supported CV applications, such as confidentiality, integrity, availability, authentication, accountability, and privacy. Our review also identifies the associated cybersecurity challenges that might impact cloud-supported CV applications and corresponding solutions to these challenges. In addition, we present future research opportunities to prevent and mitigate cybersecurity issues in cloud computing for CV-related applications.

2021 ◽  
Author(s):  
M Sabbir Salek ◽  
Sakib Mahmud Khan ◽  
Mizanur rahman ◽  
Hsien-wen Deng ◽  
Mhafuzul islam ◽  
...  

In an internet-of-things (IoT) environment, cloud computing is emerging as a technologically feasible and economically viable solution for supporting real-time and non-real-time connected vehicle (CV) applications due to its unlimited storage, enormous computing capabilities, and cost advantage, i.e., cloud computing costs less than owning such systems. However, maintaining cybersecurity is a major challenge in cloud-supported CV applications as it requires CVs and various transportation or non-transportation services to exchange data with the cloud via multiple wired and wireless communication networks, such as long-term evolution (LTE) and Wi-Fi. In this paper, we review the cybersecurity requirements of cloud-supported CV applications, such as confidentiality, integrity, availability, authentication, accountability, and privacy. Our review also identifies the associated cybersecurity challenges that might impact cloud-supported CV applications and corresponding solutions to these challenges. In addition, we present future research opportunities to prevent and mitigate cybersecurity issues in cloud computing for CV-related applications.


Author(s):  
Konstantinos B. Baltzis

A significant part of worldwide energy is consumed by the ICT infrastructure with wireless sector to be among the main contributors to this consumption. As a result, the rising energy costs and increasing carbon footprint of operating wireless communication networks have generated a keen interest in the design and development of “green” networks, that is, networks characterized by energy efficiency, reduced CO2 emissions, and low cost deployment. In this article, we discuss current issues and trends in green wireless networking. We explain the motivation behind it, discuss basic principles, review current trends in the field, and highlight upcoming challenges and future research directions. The aforementioned issues have been treated in detail in the scientific literature. However, the present study overviews current and future trends in green wireless networking with focus on providing an insight into the field that will be useful not only for experts but for non-specialists also.


Author(s):  
Yuhua Xu ◽  
Jinlong Wang ◽  
Qihui Wu

New decision-making paradigms addressing the requirements of flexibility, adaptability and intelligence are needed for future wireless networks. Moreover, mutual interactions should be captured when all the devices are autonomous and smart. Game theory is a powerful tool to study such interactions. However, since it is a branch of applied mathematic and mainly studied in economic, some featured challenges should be addressed when applied in wireless networks. This chapter bridges game theory and practical wireless applications, by focusing on the incomplete, dynamic and uncertain information constraints. Four kinds of distributed learning algorithms including stochastic learning automata, payoff-based log-linear learning, learning by trial and error, and no-regret learning are discussed. The learning procedures and basic theoretical results are presented, and their applications in wireless networks are reviewed. Contrastive analysis on environment dynamics, solution concepts, synchrony, convergence, and convergent results is discussed, and some future research directions are given.


Sensors ◽  
2021 ◽  
Vol 21 (16) ◽  
pp. 5266
Author(s):  
Zhongjun Ni ◽  
Yu Liu ◽  
Magnus Karlsson ◽  
Shaofang Gong

Monitoring the indoor environment of historic buildings helps to identify potential risks, provide guidelines for improving regular maintenance, and preserve cultural artifacts. However, most of the existing monitoring systems proposed for historic buildings are not for general digitization purposes that provide data for smart services employing, e.g., artificial intelligence with machine learning. In addition, considering that preserving historic buildings is a long-term process that demands preventive maintenance, a monitoring system requires stable and scalable storage and computing resources. In this paper, a digitalization framework is proposed for smart preservation of historic buildings. A sensing system following the architecture of this framework is implemented by integrating various advanced digitalization techniques, such as Internet of Things, Edge computing, and Cloud computing. The sensing system realizes remote data collection, enables viewing real-time and historical data, and provides the capability for performing real-time analysis to achieve preventive maintenance of historic buildings in future research. Field testing results show that the implemented sensing system has a 2% end-to-end loss rate for collecting data samples and the loss rate can be decreased to 0.3%. The low loss rate indicates that the proposed sensing system has high stability and meets the requirements for long-term monitoring of historic buildings.


Author(s):  
Pinar Kirci

Recently, great developments in computing and telecommunication technologies caused big amounts of data flow over Internet, especially due to increasing smart device users. Within the last few years, ubiquitous communication has improved with new telecommunication and transmission infrastructures and also enriched with new services. The focus of ubiquitous computing is presenting environments including computing and communication abilities that are integrated with users. Mobile and pervasive computing present many opportunities about exploring various factors all over the world with searching large habitats and species. The services and applications are presented via a heterogeneous environment over many different devices by the ubiquitous system. Accordingly, ubiquitous computing is becoming more popular because of the new research developments and great technological advances in wireless communication networks, cloud computing, Internet technologies, mobile and distributed computing.


Author(s):  
M. Khaleel Ullah Khan ◽  

This paper propose a method to design an “Intelligent Transportation System” for forecasting wireless communication network issues with cyber attacks. Wireless communication networks(WCN) is a broadly classified and critical gateway for any communication devices because the wireless communication networks is operated at various frequency ranges in different locations. In order to maintain its performance and also to prevent any attacks due to its high data handling, we need an Intelligent transportation system (ITS) to analyse and detect the cyber-attacks before going to implement it in real time transportation. In general wireless communication networks is an IEEE 802.11 standard which can be operated at physical Transfer control protocol/Internet protocol(TCP/IP) layer as well OSI model. In this paper a novel approach to design, analyse and detect cyber-attacks is proposed for wireless communication networks transport system, called Intelligent transportation system (ITS) based cyber-attack detection. Stacked firewall system is used for reducing fake attacks and detecting real time attacks in transportation system. Hence any fake attacks or real time attacks captured by the ITS will be informed to the system controller to make decision to whether it is a false-positive or real attack. ITS is the main process of the stacked firewall system which in turn take responsible to control, maintain, and prevent any cyber-attack.


Sign in / Sign up

Export Citation Format

Share Document