preview

Nt1330 Unit 6 Exercise 1

Decent Essays

While downloading the file requesting node will look for the neighbor node if they are in coverage then the cloud is created as shown in Fig(2). Node A requesting for download of a file, observes the neighboring nodes i.e., B and C. the VM is created on both the nodes B and C, all the three vehicles will download the file from the roadside cloud in this way the vehicle A will have the file before it moves out of the range of roadside infrastructure, as it moves out the remaining each part will be downloaded from the vehicle by using V2V communication. IV. SECURITY CHALLENGES As the information generated here is very sensitive that that need to be handled carefully. The security issues that may arise are listed in [6]. Providing authentication to each and every vehicle is the tedious task due to the high mobility, as vehicles will be sharing same physical infrastructure it’s difficult to keep the attacker at the bay. Though the attacker and target are located on different machines but they share same infrastructure in Vehicular cloud. The attacker can attack on confidentiality, integrity and availability. …show more content…

The integrity is nothing but tampering the information, the attacker may alter the information generated by the legal user. Availability, the attacker may change the privileges that make the resources unavailable to the target user. Problem of authentication in vehicular cloud is because of the frequent change in

Get Access