Skip to main content

Design of Secure Protocol for Session Key Exchange in Vehicular Cloud Computing

  • Conference paper
  • First Online:
  • 1828 Accesses

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 373))

Abstract

Vehicle cloud computing is a technology that converges vehicle networking technology with cloud computing technology. It is expected to contribute to society where vehicles have become mainstream, by combining the vehicle networking technology VANET with existing cloud infrastructure. But on the other hand, issues regarding personal information and privacy have risen. This paper suggests a protocol that ensures the safe transmission of session keys for a safer vehicle cloud environment.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Heo, M., Rhee, K.-H.: Vehicle Cloud Computing Utilization and Security Requirements. Korean Institute of Information Security 24(2), 42–49 (2014)

    Google Scholar 

  2. Cloud Computing Support Center. The Convergence Services Cases on Cloud Computing, August 2014

    Google Scholar 

  3. http://ngconnect.org/service-concepts/connected-service-vehicle/

  4. Blum, J.J., Eskandarian, A., Hoffman, L.J.: Challenges of intervehicle ad hoc networks. IEEE Transactions on Intelligent Transportation Systems 5(4), 347–351 (2004)

    Article  Google Scholar 

  5. Yousefi, S., Mousavi, M.S., Fathy, M.: Vehicular ad hoc networks (VANETs): challenges and perspectives. In: 2006 6th International Conference on ITS Telecommunications Proceedings. IEEE (2006)

    Google Scholar 

  6. Al-Sultan, S., et al.: A comprehensive survey on vehicular Ad Hoc network. Journal of Network and Computer Applications 37, 380–392 (2014)

    Article  Google Scholar 

  7. Chen, Y.-S., Hsu, C.-S., Cheng, C.-H.: Network mobility protocol for vehicular ad hoc networks. International Journal of Communication Systems 27(11), 3042–3063 (2014)

    Google Scholar 

  8. Conti, M., Giordano, S.: Mobile ad hoc networking: milestones, challenges, and new research directions. IEEE Communications Magazine 52(1), 85–96 (2014)

    Article  Google Scholar 

  9. Altayeb, M., Mahgoub, I.: A survey of vehicular ad hoc networks routing protocols. International Journal of Innovation and Applied Studies 3(3), 829–846 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jong Hyuk Park .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer Science+Business Media Singapore

About this paper

Cite this paper

Kang, J., Park, J.H. (2015). Design of Secure Protocol for Session Key Exchange in Vehicular Cloud Computing. In: Park, DS., Chao, HC., Jeong, YS., Park, J. (eds) Advances in Computer Science and Ubiquitous Computing. Lecture Notes in Electrical Engineering, vol 373. Springer, Singapore. https://doi.org/10.1007/978-981-10-0281-6_36

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-0281-6_36

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-0280-9

  • Online ISBN: 978-981-10-0281-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics