Skip to main content

Advertisement

Log in

SUDV: Malicious fog node management framework for software update dissemination in connected vehicles

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Modern vehicles are developed with increasing levels of automation and connectivity. To improve the driving experience, the software requires frequent alterations adding new functionality and/or fixing software-related issues. In a typical connected vehicle ecosystem, over-the-air (OTA) updates provide a platform for safely distributing new software to connected vehicles. Often the cloud is used for OTA updates but with significant communication overhead. Here, fog computing paradigm involves strategically placed and distributed fog nodes with minimal capabilities near vehicles. It potentially provides a reliable and sustainable approach to push OTA updates for connected vehicles. In this work, we adopt a collaborative framework with congestion control to push OTA updates across the multi-level vehicular network. Moreover, to keep at bay the heightened risk of cyber threats in fog-computing paradigm, we build implicit trust and implement explicit verification across the fog consortium to detect compromised fog nodes. The effectiveness of the framework is evaluated against baseline scheme in terms of update coverage, cost per update, attempt efficiency and update time. The results demonstrate improved update coverage by 4%, reduced cost per update by 5%, which in turn contributes to an improved update attempt efficiency up to 2% across the connected vehicular network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Data Availability

Availability of data and materials—NA.

Code availability

On request.

References

  1. Mahmud R, Ramamohanarao K, Buyya R (2018) Latency-aware application module management for fog computing environments. ACM Trans Internet Technol (TOIT) 19(1):1–21

    Article  Google Scholar 

  2. Charyyev B, Arslan E, Gunes MH (2020) Latency comparison of cloud datacenters and edge servers. In: GLOBECOM 2020-2020 IEEE Global Communications Conference, pp. 1–6. IEEE

  3. Caiza G, Saeteros M, Oñate W, Garcia MV (2020) Fog computing at industrial level, architecture, latency, energy, and security: a review. Heliyon 6(4):03706

    Article  Google Scholar 

  4. Malik AW, Rahman AU, Ahmad A, Santos MM (2022) Over-the-air software-defined vehicle updates using federated fog environment. IEEE Trans Netw Service Manage

  5. Alzoubi YI, Osmanaj VH, Jaradat A, Al-Ahmad A (2021) Fog computing security and privacy for the internet of thing applications: state-of-the-art. Security Privacy 4(2):145

    Article  Google Scholar 

  6. Wang X, Yang LT, Xie X, Jin J, Deen MJ (2017) A cloud-edge computing framework for cyber-physical-social services. IEEE Commun Mag 55(11):80–85

    Article  Google Scholar 

  7. Ni J, Zhang K, Lin X, Shen X (2017) Securing fog computing for internet of things applications: challenges and solutions. IEEE Commun Surv Tutorials 20(1):601–628

    Article  Google Scholar 

  8. Galluccio L, Milardo S, Morabito G, Palazzo S (2015) Sdn-wise: Design, prototyping and experimentation of a stateful sdn solution for wireless sensor networks. In: 2015 IEEE Conference on Computer Communications (INFOCOM), pp. 513–521. IEEE

  9. Wang T, Zhang G, Liu A, Bhuiyan MZA, Jin Q (2018) A secure iot service architecture with an efficient balance dynamics based on cloud and edge computing. IEEE IoT J 6(3):4831–4843

    Google Scholar 

  10. Cho J-H, Swami A, Chen R (2010) A survey on trust management for mobile ad hoc networks. IEEE Commun Surv Tutorials 13(4):562–583

    Article  Google Scholar 

  11. Li Q, Malip A, Martin KM, Ng S-L, Zhang J (2012) A reputation-based announcement scheme for vanets. IEEE Trans Veh Technol 61(9):4095–4108

    Article  Google Scholar 

  12. Hwang K, Kulkareni S, Hu Y (2009) Cloud security with virtualized defense and reputation-based trust mangement. In: 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, pp. 717–722. IEEE

  13. Henze M, Hummen R, Matzutt R, Wehrle K (2014) A trust point-based security architecture for sensor data in the cloud. In: Trusted cloud computing, pp. 77–106. Springer, Berlin

  14. Jiang J, Han G, Wang F, Shu L, Guizani M (2014) An efficient distributed trust model for wireless sensor networks. IEEE Trans Parallel Distrib Syst 26(5):1228–1237

    Article  Google Scholar 

  15. Fan Q, Ansari N (2018) Towards workload balancing in fog computing empowered iot. IEEE Trans Netw Sci Eng 7(1):253–262

    Article  Google Scholar 

  16. Wang T, Zhang G, Bhuiyan MZA, Liu A, Jia W, Xie M (2020) A novel trust mechanism based on fog computing in sensor-cloud system. Future Gener Comp Syst 109:573–582

    Article  Google Scholar 

  17. Elmisery AM, Rho S, Botvich D (2016) A fog based middleware for automated compliance with oecd privacy principles in internet of healthcare things. IEEE Access 4:8418–8441

    Article  Google Scholar 

  18. Soleymani SA, Abdullah AH, Zareei M, Anisi MH, Vargas-Rosales C, Khan MK, Goudarzi S (2017) A secure trust model based on fuzzy logic in vehicular ad hoc networks with fog computing. IEEE Access 5:15619–15629

    Article  Google Scholar 

  19. Wenjuan Zhang GL (2020) An efficient and secure data transmission mechanism for internet of vehicles considering privacy protection in fog computing environment. IEEE Access, pp 64461–64474. IEEE

  20. Mahmud SM, Shanker S, Hossain I (2005) Secure software upload in an intelligent vehicle via wireless communication links. In: IEEE Proceedings Intelligent Vehicles Symposium, 2005., pp. 588–593. IEEE

  21. Nilsson DK, Larson UE (2008) Secure firmware updates over the air in intelligent vehicles. In: ICC Workshops-2008 IEEE International Conference on Communications Workshops, pp. 380–384. IEEE

  22. Steger M, Dorri A, Kanhere SS, Römer K, Jurdak R, Karner M (2018) Secure wireless automotive software updates using blockchains: a proof of concept. Adv Microsyst Auto Appl 2017, pp 137–149. Springer

  23. Sohal AS, Sandhu R, Sood SK, Chang V (2018) A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments. Comput Security 74:340–354

    Article  Google Scholar 

  24. Liu L, Ma Z, Meng W (2019) Detection of multiple-mix-attack malicious nodes using perceptron-based trust in iot networks. Future Gener Comput Syst 101:865–879

    Article  Google Scholar 

  25. Liu L, Yang J, Meng W (2019) Detecting malicious nodes via gradient descent and support vector machine in internet of things. Comput Electr Eng 77:339–353

    Article  Google Scholar 

  26. Hafeez I, Antikainen M, Ding AY, Tarkoma S (2020) Iot-keeper: detecting malicious iot network activity using online traffic analysis at the edge. IEEE Trans Netw Serv Manage 17(1):45–59

    Article  Google Scholar 

  27. Xiao L, Wan X, Dai C, Du X, Chen X, Guizani M (2018) Security in mobile edge caching with reinforcement learning. IEEE Wireless Commun 25(3):116–122

    Article  Google Scholar 

  28. Khan AY, Latif R, Latif S, Tahir S, Batool G, Saba T (2019) Malicious insider attack detection in iots using data analytics. IEEE Access 8:11743–11753

    Article  Google Scholar 

  29. Shafiq M, Tian Z, Bashir AK, Du X, Guizani M (2020) Corrauc: a malicious bot-iot traffic detection method in iot network using machine-learning techniques. IEEE IoT J 8(5):3242–3254

    Google Scholar 

  30. Chen W, Zhang M, Hu G, Tang X, Sangaiah AK (2017) Constrained random routing mechanism for source privacy protection in wsns. IEEE Access 5:23171–23181

    Article  Google Scholar 

Download references

Funding

The authors did not receive support from any organization for the submitted work.

Author information

Authors and Affiliations

Authors

Contributions

Authors [NK, AWM and AUR] contributed to the study conception, design, material preparation and analysis. System model is prepared by MA, AA and AUR. The first draft of the manuscript was written by NK, and AWM, later improved by AUR, and AA. All authors read and approved the final manuscript.

Corresponding author

Correspondence to Asad Waqar Malik.

Ethics declarations

Conflict of interest

The authors have no relevant financial or non-financial interests to disclose.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kalsoom, N., Malik, A.W., Rahman, A.U. et al. SUDV: Malicious fog node management framework for software update dissemination in connected vehicles. J Supercomput 79, 4534–4555 (2023). https://doi.org/10.1007/s11227-022-04829-1

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-022-04829-1

Keywords