Abstract
Modern vehicles are developed with increasing levels of automation and connectivity. To improve the driving experience, the software requires frequent alterations adding new functionality and/or fixing software-related issues. In a typical connected vehicle ecosystem, over-the-air (OTA) updates provide a platform for safely distributing new software to connected vehicles. Often the cloud is used for OTA updates but with significant communication overhead. Here, fog computing paradigm involves strategically placed and distributed fog nodes with minimal capabilities near vehicles. It potentially provides a reliable and sustainable approach to push OTA updates for connected vehicles. In this work, we adopt a collaborative framework with congestion control to push OTA updates across the multi-level vehicular network. Moreover, to keep at bay the heightened risk of cyber threats in fog-computing paradigm, we build implicit trust and implement explicit verification across the fog consortium to detect compromised fog nodes. The effectiveness of the framework is evaluated against baseline scheme in terms of update coverage, cost per update, attempt efficiency and update time. The results demonstrate improved update coverage by 4%, reduced cost per update by 5%, which in turn contributes to an improved update attempt efficiency up to 2% across the connected vehicular network.










Similar content being viewed by others
Data Availability
Availability of data and materials—NA.
Code availability
On request.
References
Mahmud R, Ramamohanarao K, Buyya R (2018) Latency-aware application module management for fog computing environments. ACM Trans Internet Technol (TOIT) 19(1):1–21
Charyyev B, Arslan E, Gunes MH (2020) Latency comparison of cloud datacenters and edge servers. In: GLOBECOM 2020-2020 IEEE Global Communications Conference, pp. 1–6. IEEE
Caiza G, Saeteros M, Oñate W, Garcia MV (2020) Fog computing at industrial level, architecture, latency, energy, and security: a review. Heliyon 6(4):03706
Malik AW, Rahman AU, Ahmad A, Santos MM (2022) Over-the-air software-defined vehicle updates using federated fog environment. IEEE Trans Netw Service Manage
Alzoubi YI, Osmanaj VH, Jaradat A, Al-Ahmad A (2021) Fog computing security and privacy for the internet of thing applications: state-of-the-art. Security Privacy 4(2):145
Wang X, Yang LT, Xie X, Jin J, Deen MJ (2017) A cloud-edge computing framework for cyber-physical-social services. IEEE Commun Mag 55(11):80–85
Ni J, Zhang K, Lin X, Shen X (2017) Securing fog computing for internet of things applications: challenges and solutions. IEEE Commun Surv Tutorials 20(1):601–628
Galluccio L, Milardo S, Morabito G, Palazzo S (2015) Sdn-wise: Design, prototyping and experimentation of a stateful sdn solution for wireless sensor networks. In: 2015 IEEE Conference on Computer Communications (INFOCOM), pp. 513–521. IEEE
Wang T, Zhang G, Liu A, Bhuiyan MZA, Jin Q (2018) A secure iot service architecture with an efficient balance dynamics based on cloud and edge computing. IEEE IoT J 6(3):4831–4843
Cho J-H, Swami A, Chen R (2010) A survey on trust management for mobile ad hoc networks. IEEE Commun Surv Tutorials 13(4):562–583
Li Q, Malip A, Martin KM, Ng S-L, Zhang J (2012) A reputation-based announcement scheme for vanets. IEEE Trans Veh Technol 61(9):4095–4108
Hwang K, Kulkareni S, Hu Y (2009) Cloud security with virtualized defense and reputation-based trust mangement. In: 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, pp. 717–722. IEEE
Henze M, Hummen R, Matzutt R, Wehrle K (2014) A trust point-based security architecture for sensor data in the cloud. In: Trusted cloud computing, pp. 77–106. Springer, Berlin
Jiang J, Han G, Wang F, Shu L, Guizani M (2014) An efficient distributed trust model for wireless sensor networks. IEEE Trans Parallel Distrib Syst 26(5):1228–1237
Fan Q, Ansari N (2018) Towards workload balancing in fog computing empowered iot. IEEE Trans Netw Sci Eng 7(1):253–262
Wang T, Zhang G, Bhuiyan MZA, Liu A, Jia W, Xie M (2020) A novel trust mechanism based on fog computing in sensor-cloud system. Future Gener Comp Syst 109:573–582
Elmisery AM, Rho S, Botvich D (2016) A fog based middleware for automated compliance with oecd privacy principles in internet of healthcare things. IEEE Access 4:8418–8441
Soleymani SA, Abdullah AH, Zareei M, Anisi MH, Vargas-Rosales C, Khan MK, Goudarzi S (2017) A secure trust model based on fuzzy logic in vehicular ad hoc networks with fog computing. IEEE Access 5:15619–15629
Wenjuan Zhang GL (2020) An efficient and secure data transmission mechanism for internet of vehicles considering privacy protection in fog computing environment. IEEE Access, pp 64461–64474. IEEE
Mahmud SM, Shanker S, Hossain I (2005) Secure software upload in an intelligent vehicle via wireless communication links. In: IEEE Proceedings Intelligent Vehicles Symposium, 2005., pp. 588–593. IEEE
Nilsson DK, Larson UE (2008) Secure firmware updates over the air in intelligent vehicles. In: ICC Workshops-2008 IEEE International Conference on Communications Workshops, pp. 380–384. IEEE
Steger M, Dorri A, Kanhere SS, Römer K, Jurdak R, Karner M (2018) Secure wireless automotive software updates using blockchains: a proof of concept. Adv Microsyst Auto Appl 2017, pp 137–149. Springer
Sohal AS, Sandhu R, Sood SK, Chang V (2018) A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments. Comput Security 74:340–354
Liu L, Ma Z, Meng W (2019) Detection of multiple-mix-attack malicious nodes using perceptron-based trust in iot networks. Future Gener Comput Syst 101:865–879
Liu L, Yang J, Meng W (2019) Detecting malicious nodes via gradient descent and support vector machine in internet of things. Comput Electr Eng 77:339–353
Hafeez I, Antikainen M, Ding AY, Tarkoma S (2020) Iot-keeper: detecting malicious iot network activity using online traffic analysis at the edge. IEEE Trans Netw Serv Manage 17(1):45–59
Xiao L, Wan X, Dai C, Du X, Chen X, Guizani M (2018) Security in mobile edge caching with reinforcement learning. IEEE Wireless Commun 25(3):116–122
Khan AY, Latif R, Latif S, Tahir S, Batool G, Saba T (2019) Malicious insider attack detection in iots using data analytics. IEEE Access 8:11743–11753
Shafiq M, Tian Z, Bashir AK, Du X, Guizani M (2020) Corrauc: a malicious bot-iot traffic detection method in iot network using machine-learning techniques. IEEE IoT J 8(5):3242–3254
Chen W, Zhang M, Hu G, Tang X, Sangaiah AK (2017) Constrained random routing mechanism for source privacy protection in wsns. IEEE Access 5:23171–23181
Funding
The authors did not receive support from any organization for the submitted work.
Author information
Authors and Affiliations
Contributions
Authors [NK, AWM and AUR] contributed to the study conception, design, material preparation and analysis. System model is prepared by MA, AA and AUR. The first draft of the manuscript was written by NK, and AWM, later improved by AUR, and AA. All authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Conflict of interest
The authors have no relevant financial or non-financial interests to disclose.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Kalsoom, N., Malik, A.W., Rahman, A.U. et al. SUDV: Malicious fog node management framework for software update dissemination in connected vehicles. J Supercomput 79, 4534–4555 (2023). https://doi.org/10.1007/s11227-022-04829-1
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-022-04829-1