Abstract

AbstractVehicular ad-hoc networks (VANETs), a type of intelligent transportation system (ITS), can improve road traffic efficiency by increasing safety and facilitating services for passengers, drivers, and law enforcement authorities. Fog computing could be relocated nearer to automobile drivers to fulfill their requirements with minimum network infrastructure assistance. Fog computing (FC) offers latency-sensitive and position-aware solutions that may be able to suit the needs of message dissemination scenarios in VANETs. Fog nodes in different fog clusters can collaborate to provide video streams of catastrophes or crises and provide accurate visual data about the surveillance area. The goal of fog clusters is to provide less frequent service data handovers between RSUs and vehicles. A framework based on software-defined networking (SDN) provides better versatility, extendibility, fully programmable, and global knowledge. Due to its unique characteristics, integrating the SDN with the vehicular FC network (SDVF) may result in significant security and privacy difficulties for the vehicular FC network topology system. This study will look at the overall advantages of SDVF networks, with a focus on latency consumption for video streaming between the accident scene and the hospital. The privacy risks and remedies connected with the vehicular FC network topology are discussed. Illegal vehicles, also known as rogue nodes, might launch a Sybil attack by transmitting false videos to redirect other honest nodes in the network, trapping them or causing disastrous effects such as automobile collisions. This article demonstrates the effect of the Sybil attack on the software-defined vehicular fog computing (SDVF) network using the scenario of a speedy traffic accident rescue with ambulances (EV). The practical usage of fog clusters with the global and local controllers (SDNC and RSUC) is analyzed, and the effect of the Sybil attack is also assessed using the OMNET++ and VEINS simulators.KeywordsVehicular networkSoftware-defined networksFog computingEmergency message disseminationSpeedy rescue accident scenarioSybil attack

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.