Open Access Open Access  Restricted Access Subscription Access

Group Security of V2Vusing Cloud Computing Processing and 4G Wireless Services

Biswajit Panja, DAVID MORRISON, PRIYANKA MEHARIA, BHARAT BHARAT, ATUL PRAKASH

Abstract


Vehicle to Vehicle (V2V) interfaces will provide the future of safe driving. Implemented along V2I (Vehicle toInterface) setups, a driver will be more aware of their surroundings and traffic will be less of a hazard. Companiessuch as Google are trying to make cars that drive themselves through external sensors and internal maps. Thesecurity issues in V2V communication are vast and still being solved. Telecommunication companies have beenworking in turn to implement cloud computing to improve what they can offer their data users. They have beenconsistent with their improvements of coverage and data transfer speed. The creation of 4G LTE has shown greatpromise for what can be done with data transfers and minimizing tower loads.This research paper takes a look at how the system can be protected against outside intrusions. It uses a Cloudto do computations, making it more difficult to steal data from the cars themselves. The system is designed tobe in constant communication with the cloud to prevent any data theft, and presents methods for encrypting thedata sent between the cloud and the cars. It also addresses the issue of tower load, by creating car groups to lowerthe difficulty of communicating in high traffic situations. These car groups communicate with one car, the leadcar which is the only car that is communicating directly with the cloud. It sends and receives messages whichare then distributed amongst the group, including but not limited to car locations, media and security keys. Carsthat are separated from a group are treated as the lead car of a single car group, and cars that are completelyseparated from the system must first validate themselves through the cloud.

Full Text:

PDF


DOI: http://dx.doi.org/10.47164/ijngc.v5i3.272