Vehicular Cloud Networking: Architecture and Design Principles

Slides:



Advertisements
Similar presentations
Network Resource Broker for IPTV in Cloud Computing Lei Liang, Dan He University of Surrey, UK OGF 27, G2C Workshop 15 Oct 2009 Banff,
Advertisements

Universität Innsbruck Leopold Franzens Copyright 2006 DERI Innsbruck LarCK Workshop, ISWC/ASWC Busan, Korea 16-Feb-14 Towards Scalable.
CarTorrent ® : Cars get to have fun too Kevin C. Lee and Ian S. Yap TA: Uichin Lee Prof Mario Gerla.
Resource Management §A resource can be a logical, such as a shared file, or physical, such as a CPU (a node of the distributed system). One of the functions.
Dynamic Object Tracking in Wireless Sensor Networks Tzung-Shi Chen 1, Wen-Hwa Liao 2, Ming-De Huang 3, and Hua-Wen Tsai 4 1 National University of Tainan,
Robot Sensor Networks. Introduction For the current sensor network the topography and stability of the environment is uncertain and of course time is.
Chapter 19: Network Management Business Data Communications, 5e.
FleaNet : A Virtual Market Place on Vehicular Networks Uichin Lee, Joon-Sang Park Eyal Amir, Mario Gerla Network Research Lab, Computer Science Dept.,
Peer-to-Peer Networks as a Distribution and Publishing Model Jorn De Boever (june 14, 2007)
Multicasting in Mobile Ad-Hoc Networks (MANET)
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks Telecommunication and Security LAB. Dept. of Industrial.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Scalable Application Layer Multicast Suman Banerjee Bobby Bhattacharjee Christopher Kommareddy ACM SIGCOMM Computer Communication Review, Proceedings of.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
An Efficient and Spontaneous Privacy-Preserving Protocol for Secure Vehicular Communications Hu Xiong, Konstantin Beznosov, Zhiguang Qin, Matei Ripeanu.
A State-based Programming Model and System for Wireless Sensor Networks Reporter : Zhi-Yuan Yang 2010/5/24.
Object Naming & Content based Object Search 2/3/2003.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
Di Wu 03/03/2011 Geographic Routing in Clustered Multi-layer Vehicular Ad Hoc Networks for Load Balancing Purposes.
Middleware for P2P architecture Jikai Yin, Shuai Zhang, Ziwen Zhang.
5205 – IT Service Delivery and Support
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
An Architecture for Video Surveillance Service based on P2P and Cloud Computing Yu-Sheng Wu, Yue-Shan Chang, Tong-Ying Juang, Jing-Shyang Yen speaker:
An affinity-driven clustering approach for service discovery and composition for pervasive computing J. Gaber and M.Bakhouya Laboratoire SeT Université.
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
A Study of Live Video Streaming over Highway Vehicular Ad hoc Networks Meenakshi Mittal ©2010 International Journal of Computer Applications ( )Volume.
UbiStore: Ubiquitous and Opportunistic Backup Architecture. Feiselia Tan, Sebastien Ardon, Max Ott Presented by: Zainab Aljazzaf.
Seung-Hoon Lee, Sewook Jung, Alexander Chang, Dea-Ki Cho, and Mario Gerla Network Research Lab Department of Computer Science University of California,
Peer-to-Pee Computing HP Technical Report Chin-Yi Tsai.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Maximum Network Lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges Cardei, M.; Jie Wu; Mingming Lu; Pervaiz, M.O.; Wireless And Mobile.
A Security Architecture Concept for Vehicular Network Nodes 蔡嘉翔 許閔傑.
Review of the literature : DMND:Collecting Data from Mobiles Using Named Data Takashima Daiki Park Lab, Waseda University, Japan 1/15.
Enabling Peer-to-Peer SDP in an Agent Environment University of Maryland Baltimore County USA.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
ITGS Databases.
Hop State Prediction Method using Distance Differential of RSSI on VANET 指導教授:許子衡 教授 學 生:董藝興 學生 1.
P2: Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid P2: Privacy-Preserving Communication and Precise Reward.
A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks Anand Patwardhan, Anupam Joshi, Tim Finin, and Yelena Yesha Anand Patwardhan.
Enabling the Future Service-Oriented Internet (EFSOI 2008) Supporting end-to-end resource virtualization for Web 2.0 applications using Service Oriented.
PROP: A Scalable and Reliable P2P Assisted Proxy Streaming System Computer Science Department College of William and Mary Lei Guo, Songqing Chen, and Xiaodong.
1 A Context Discovery Middleware for Context-Aware Applications with Heterogeneous Sensors Yu-Min Tseng.
Ad Hoc Network.
Network Coding Data Collecting Mechanism based on Prioritized Degree Distribution in Wireless Sensor Network Wei Zhang, Xianghua Xu, Qinchao Zhang, Jian.
The Problem of Location Determination and Tracking in Networked Systems Weikuan Yu, Hui Cao, and Vineet Mittal The Ohio State University.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Ching-Ju Lin Institute of Networking and Multimedia NTU
A Security Framework with Trust Management for Sensor Networks Zhiying Yao, Daeyoung Kim, Insun Lee Information and Communication University (ICU) Kiyoung.
An Adaptive Zone-based Storage Architecture for Wireless Sensor Networks Thang Nam Le, Dong Xuan and *Wei Yu Department of Computer Science and Engineering,
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
Internet of Vehicles: From Intelligent Grid to Autonomous Cars and Vehicular Clouds Speaker: Bo-Han Hua Advisor: Kai-Wei Ke Date: 2015/12/17.
Vignesh Ravindran Sankarbala Manoharan. Infrastructure As A Service (IAAS) is a model that is used to deliver a platform virtualization environment with.
Malugo – a scalable peer-to-peer storage system..
Dynamic Proxy Tree-Based Data Dissemination Schemes for Wireless Sensor Networks Wensheng Zhang, Guohong Cao and Tom La Porta Department of Computer Science.
VEHICULAR AD HOC NETWORKS GAURAV KORDE KAPIL SHARMA.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
ANDROID AS A SERVER PLATFORM ON CLOUD COMPUTING SONA COLLEGE OF TECHNOLOGY SUBMITTED BY: NAGADEVI PRIYA.G DIVYA PURNIMA.S.S
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai Supervised.
AMSA TO 4 Advanced Technology for Sensor Clouds 09 May 2012 Anabas Inc. Indiana University.
Introduction to Mobile-Cloud Computing. What is Mobile Cloud Computing? an infrastructure where both the data storage and processing happen outside of.
In the name of God.
Presented by Edith Ngai MPhil Term 3 Presentation
Intrusion Tolerant Architectures
Weikuan Yu, Hui Cao, and Vineet Mittal The Ohio State University
Peer-to-peer networking
Introduction to Cloud Computing
MobEyes: Smart Mobs for Urban Monitoring in Vehicular Sensor Networks
Developing Vehicular Data Cloud Services in the IoT Environment
Presentation transcript:

Vehicular Cloud Networking: Architecture and Design Principles Euisin Lee, Eun-Kyu Lee, and Mario Gerla 報告者:饒展榕

Outline INTRODUCTION VENET NEW MODELS FOR VANET APPLICATIONS AND NETWORKING VEHICULAR CLOUD NETWORKING DESIGN PRINCIPLES OF VCN CONCLUSION

INTRODUCTION With technological advancement, VANETs provide drivers and passengers with safety and convenience, and furthermore introduce new applications for entertainment and environment monitoring.

More specifically: • Vehicles produce and consume a great amount of contents having the property of local relevance (time, space, and consumer). • Vehicles simply seek contents regardless of their providers. • Vehicles collaborate using their resources to create value-added services with minimum help from the Internet infrastructure.

VANET-EMERGING APPLICATIONS ON WHEELS Applications in vehicle communications have ranged from safety and convenience to entertainment and commercial services.

Application Content Time-Space Validity — Local validity Explicit lifetime Local interest

Vehicle Collaboration Sharing Sensory Data— Emerging vehicle applications consume a huge amount of sensor data in a collaborative manner. That is, multiple sensors, installed on vehicles, record a myriad of physical phenomena. Vehicle applications collect such sensor records, even from neighboring vehicles, to produce value-added services.

NEW MODELS FOR VANET APPLICATIONS AND NETWORKING VEHICULAR CLOUD COMPUTING Vehicles and sensors within a local area generate vehicle contents. These contents are stored and searched in the vicinity, and processed and consumed within their lifetime period by neighbors.

VCC resolves the queries using a self-organized model of the local environment. That is, vehicles effectively form a cloud within which services are produced, maintained, and consumed.

INFORMATION-CENTRIC NETWORKING Information-centric networking (ICN) is initially conceptualized as a general form of communication architecture to achieve efficient content distribution on the Internet. ICN focuses on what (content) instead of where (host).

VEHICULAR CLOUD NETWORKING

VCN SYSTEM OPERATIONS Cloud resource discovery: When a vehicle runs an application, it becomes a cloud leader and recruits members (i.e., vehicles and RSUs in the vicinity) that can provide their resources to construct a vehicle cloud for the application.

VCN SYSTEM OPERATIONS Cloud formation: Upon receiving RREPs, the cloud leader selects nodes (cloud members) with which it organizes a cloud. Task assignment and result collection: The cloud leader splits the application into several tasks and distributes them to cloud members, considering the availability and accessibility of their resources.

VCN SYSTEM OPERATIONS Content publishing and sharing: Once collecting all the task results from the members, the leader processes them to obtain output content and saves/publishes it. Cloud maintenance:The leader distributes the task to the new cloud member and updates the cloud table. Cloud release:

DESIGN PRINCIPLES OF VCN SYSTEM PERSPECTIVE Service Instantiation —In VCN, it must instantiate three unique resources, available at each vehicle, as services: data storage service, sensing service, and computing service.

Decentralized Operations with Inelastic Resources — A vehicle cloud platform operates in a decentralized manner, and the cloud resources are no longer elastic and reliable. In VNC, however, there is no centralized cloud service provider, and each vehicle plays the provider and consumer roles simultaneously.

Management of Service Content — Most vehicle contents have local relevance and time scope, and thus are likely to quickly become obsolescent.

Naming Content and Resource — In VCN, data is delivered based on content names. Up to date, two directions on the naming schemes have been proposed: flat and hierarchical.

Content Distribution and Resource Discovery— Once named, content must be discovered, shared, and consumed by neighboring vehicles.

Connectivity and Resource Availability — Vehicles freely join and leave the vehicular cloud as they move. Thus, such dynamically changing connectivity must be managed properly using a cloud join/leave mechanism so as to minimize its impact on the service provision.

SERVICE PERSPECTIVE Incentive — In VCN, a cloud member must be rewarded properly for the services they provide. Otherwise, it would not share its valuable resources.

Security and Privacy — Since VCN encourages sharing resources, the most critical security issue would be a threat targeting the cloud platform itself. An intrusion detection system or system integrity checking can help mitigate damage. Privacy is also important in VNC because the contents each vehicle generates tend to disclose personal information. An anonymization scheme can help resolve the issue.

Fault Tolerance — Sensors can be physically broken, malfunction, or be compromised so that they may deliver erroneous data to the processes or even fail to deliver data.

CONCLUSION Reviewing emerging VANET applications and existing VANET networking. Investigating state-of-the-art computing and networking models for vehicular communication. Introducing VCN and its architecture. Discussing VCN design principles.