Show simple item record

dc.contributor.authorAhmad, Farhan
dc.contributor.authorKazim, Muhammah
dc.contributor.authorAdnane, Asma
dc.contributor.authorAwad, Abir
dc.date.accessioned2020-05-28T08:52:22Z
dc.date.available2020-05-28T08:52:22Z
dc.date.copyright2016
dc.date.issued2016-03-14
dc.identifier.citationAhmad, F., Kazim, M., Adnane, A., Awad, A. (2016) Vehicular cloud networks: architecture, applications and security issues. In of these threats and their effects on various components of VCN are also explained in detail. Published in: 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC). 7-10 December, 2015. Limassol, Cyprus. doi: 10.1109/UCC.2015.101en_US
dc.identifier.isbn9780769556970
dc.identifier.otherOther - Software Research Institute AITen_US
dc.identifier.urihttp://research.thea.ie/handle/20.500.12065/3250
dc.description.abstractVehicular Ad Hoc Networks (VANET) are the largest real life application of ad-hoc networks where nodes are represented via fast moving vehicles. This paper introduces the future emerging technology, i.e., Vehicular Cloud Networking (VCN) where vehicles and adjacent infrastructure merge with traditional internet clouds to offer different applications ranging from low sized applications to very complex applications. VCN is composed of three types of clouds: Vehicular cloud, Infrastructure cloud and traditional Back-End (IT) cloud. We introduced these clouds via a three tier architecture along with their operations and characteristics. We have proposed use cases of each cloud tier that explain how it is practically created and utilised while taking the vehicular mobility in consideration. Moreover, it is critical to ensure security, privacy and trust of VCN network and its assets. Therefore, to describe the security of VCN, we have provided an in-depth analysis of different threats related to each tier of VCN. The threats related to vehicular cloud and infrastructure cloud are categorized according to their assets, i.e., vehicles, adjacent infrastructure, wireless communication, vehicular messages, and vehicular cloud threats. Similarly, the Back-End cloud threats are categorized into data and network threats. The possible implications of these threats and their effects on various components of VCN are also explained in detail.en_US
dc.formatPDFen_US
dc.language.isoenen_US
dc.publisherIEEEen_US
dc.relation.ispartof2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC).en_US
dc.rightsAttribution-NonCommercial-NoDerivs 3.0 Ireland*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/ie/*
dc.subjectVehicular networksen_US
dc.subjectVehicular cloud networksen_US
dc.subjectSecurityen_US
dc.subjectThreatsen_US
dc.subjectCloudsen_US
dc.subjectAssetsen_US
dc.titleVehicular cloud networks: architecture, applications and security issues.en_US
dc.typeOtheren_US
dc.description.peerreviewyesen_US
dc.identifier.conference2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC). 7-10 December, 2015. Limassol, Cyprus.
dc.identifier.doidoi: 10.1109/UCC.2015.101
dc.identifier.orcidhttps://orcid.org/0000-0001-8048-3310
dc.rights.accessOpen Accessen_US
dc.subject.departmentSoftware Research Institute AITen_US


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record

Attribution-NonCommercial-NoDerivs 3.0 Ireland
Except where otherwise noted, this item's license is described as Attribution-NonCommercial-NoDerivs 3.0 Ireland