ZTE Communications ›› 2017, Vol. 15 ›› Issue (S2): 47-51.DOI: 10.3969/j.issn.1673-5188.2017.S2.008

• Review • Previous Articles     Next Articles

Security Enhanced Internet of Vehicles with Cloud-Fog-Dew Computing

MENG Ziqian1, GUAN Zhi2,3, WU Zhengang4, LI Anran1, CHEN Zhong1   

  1. 1. School of Electronics Engineering and Computer Science, Peking University, Beijing 100871, China
    2. National Engineering Research Center for Software Engineering, Peking University, Beijing 100871, China
    3. Laboratory of High Confidence Software Technologies, Peking University, Beijing 100871, China
    4. The Third Research Institute of China Electronics Technology Group Corporation, Beijing 100015, China
  • Received:2017-06-17 Online:2017-12-25 Published:2020-04-16
  • About author:MENG Ziqian (markmzq@pku.edu.cn) is a Ph.D. candidate of Ministry of Education (MoE) Key Laboratory of Network and Software Security Assurance of Peking University, China. He received his bachelor degree in computer science from Peking University in 2013. He visited Carnegie Mellon University, USA as a visiting scholar for one year in 2016. His current research interests include future Internet architecture, network security, mobility, congestion control and the IoV.|GUAN Zhi (guan@pku.edu.cn) received his Ph.D. degree in computer science from Peking University, China in 2009. He is a faculty member of MoE Key Laboratory of Network and Software Security Assurance of Peking University since 2009. He is an associate professor and his current research interests include cryptography engineering, crypto-currency and cloud security. He gives lectures “Introduction to Information Security” and “Recent Advances in Information Technology” to undergraduates and “Network and Information Security” to master students. He will give the lecture “Practical Applications of Cryptography” to master students of Mannheim University.|WU Zhengang (markzgwu@163.com) received his Bachelor’s degree in engineering from Beijing Institute of Technology, China in 2003. He received his Master’s degree in software engineering and Ph.D. in computer software and theory from Peking University, China in 2015 and 2006 respectively. He is a research engineer at The Third Research Institute of China Electronics Technology Group Corporation (CETC), focusing on computer science and technology. His research interests include mobile Internet security, software engineering and enterprise information system. He has published 7 academic papers as the first author, on security and privacy protection of the mobile Internet.|LI Anran (lianran@pku.edu.cn) obtained B.S. from Beijing Normal University, China and is a graduate student of Information Security Lab., Peking University, China in the third year. His research interests include information security and blockchain. Over the first two years in Information Security Lab., his research focused on cryptology and blockchain technology, and have applied a patent on managing bitcoin address efficient.|CHEN Zhong (zhongchen@pku.edu.cn) received the B.S., M.S. and Ph.D. degrees in computer science from Peking University, China. He is the director of MoE Key Laboratory of Network and Software Security Assurance of Peking University. His research interests include software engineering, information security and future Internet architecture. He is also a member of the IEEE, senior member of China Institute of Electronics, deputy director of China Software Industry Association, fellow and co-chair of professional committee of Information Security and Privacy of China Computer Federation.
  • Supported by:
    This research work is supported by National Natural Science Foundation of China under Grant(61672060)

Abstract:

The Internet of Vehicles (IoV) is becoming an essential factor in the development of smart transportation and smart city projects. The IoV technology consists of the concepts of fog computing and dew computing, which involve on-board units and road side units in the edge network, as well as the concept of cloud computing, which involves the data center that provides service. The security issues are always an important concern in the design of IoV architecture. To achieve a secure IoV architecture, some security measures are necessary for the cloud computing and fog computing associated with the vehicular network. In this paper, we summarize some research works on the security schemes in the vehicular network and cloud-fog-dew computing platforms which the IoV depends on.

Key words: cloud computing, dew computing, IoV, privacy, security