Keywords

1 Cloud Computing

Cloud computing is a model that enables users to access resources such as infrastructure (hardware, processing, memory, network, and services), platform (custom applications), and software through Internet according to their requirements. This helps the businesses to reduce costs by enabling them to pay only for the services they use and saves them from investing heavily on IT infrastructure. Cloud has been widely adopted in IT industry across the world during the last decade. The major advantages that cloud provides are easy access to information and resources, less personnel training, ability to scale up or scale down the resources easily, business continuity through backup and recovery, quick deployment, and cost efficiency. As a result, all the major companies including Apple, Samsung, Google, Microsoft, and Amazon are using cloud computing for different applications.

The amount of data being transferred to cloud services such as iCloud, Dropbox, and Google Drive is increasing every day. Along with that, cloud has many applications in various areas where it is used in combination with different technologies. Mobile cloud computing is referred to as an architecture in which data storage and data processing take place outside the mobile device and in the cloud. Users can access data in cloud through wireless Internet. As a result, not only the mobile applications can be used by a large number of cloud customers, but also the mobile devices do not need to have large processing power and storage to process data. Some applications of mobile cloud computing include mobile commerce, mobile learning, mobile healthcare, and mobile gaming [48]. Many health organizations are using cloud computing to store the record of their patients anonymously.

Another application of cloud computing is in vehicular ad hoc networks (VANET). VANET is a technology that uses short-range communication protocols such as wireless local area network (WLAN) technology to create a mobile network among vehicles in an approximately 100 to 300 m distance [45]. All the participating vehicles in VANET act as wireless nodes, and they can exchange different messages among each other and adjacent roadside infrastructure to support traffic safety and make driving experience more comfortable. Some of the messages that can be exchanged between vehicles in VANET are vehicle collision warning, security distance warning, driver assistance, cooperative driving, and dissemination of road information, Internet access, map location, automatic parking, and driverless vehicles [17].

Vehicular cloud networks (VCN) is a promising technology which introduces the concept of merging VANET technology with cloud computing. This provides an unlimited computing resources and storing/downloading VANET data via the Internet. The extension of traditional computing facilities with vehicular computing resources such as storage, processing, and sensing can help drivers in new ways to overcome critical road safety and congestion issues.

Rest of the chapter is organized as follows: Section 12.2 introduces the VANET in detail including its architecture, components, and its different characteristics. Section 12.3 leads to VCN where the three-tier architecture and its operation is explained. Threats in VCN are introduced in Sect. 12.4, where different threats in each tier are explained in detail and the review questions are given in Sect. 12.5.

2 Vehicular Ad Hoc Networks (VANET)

VANET are considered as the backbone of intelligent transportation system (ITS) as it ensures traffic safety and traffic assistance. This section introduces the VANET architecture, its different components, and their characteristics in detail.

2.1 VANET Architecture

VANET is an emerging technology with its main motivations to ensure life safety and security on the roads. In VANET, the vehicles are equipped with communication interfaces, which enable the transportation of important messages between neighboring vehicles and adjacent infrastructure in the vicinity of communication range [4]. Infrastructure refers to the static entities and is mostly positioned along the roadside. In the context of VANET, this refers to roadside units (RSUs). This includes a speed camera, relay node (RN), or mobile communication base station.

In VANET, the transportation of messages is carried via two modes. These are

  1. 1.

    Vehicle-to-vehicle (V2V) communication

  2. 2.

    Vehicle-to-infrastructure (V2I) communication

In V2V communication, the messages are shared with neighboring vehicles via short-range communication protocols. These include dedicated short-range communication (DSRC) technologies and wireless LAN protocols, i.e., IEEE 802.11. V2V communication results in short-range communication where it ensures communication between neighboring vehicles without any support from infrastructure. On the other hand, V2I communication ensures communication between vehicles and adjacent infrastructure with the help of RN or any mobile communication technologies such as long-term evolution (LTE). V2I communication is used for transporting messages generated by source vehicle over large geographical location.

Figure 12.1 depicts the architecture of VANET in case of an accident. It can be seen that the vehicles close to the vicinity of accident receives messages via V2V communication, while other vehicles receives messages via V2I communication.

Fig. 12.1
figure 1

VANET architecture; example of collision of vehicles

2.2 Components of VANET

VANET consists of several components, i.e., vehicular user, vehicle, messages, infrastructure, wireless communication network, back-end server, and attackers.

  • Vehicular user: Vehicular user constitutes the most important entity in VANET. The user privacy including personal data, geographical location, and confidential information must be guaranteed in VANET.

  • Vehicle: The important assets in vehicle are its on-board unit (OBU) with communication capabilities, application unit (AU) with several applications like collision avoidance system, and different sensors which collect information from surroundings.

  • Messages: Messages contain various important information which are exchanged between vehicles and adjacent RSU. This contains accident warning, driver and vehicular passenger information, confidential data, weather and road traffic information, etc.

  • Infrastructure: Infrastructure acts as a bridge for exchanging messages between vehicles and back-end server. Infrastructure also enables the messages to be transmitted over a large geographical location. This includes adjacent RSUs, speed camera, and RNs.

  • Wireless communication network: It provides the air interface to transmit the important messages to neighboring vehicles and RSUs. In VANET, there are three types of communication.

    1. 1.

      In-vehicle communication between OBU and sensors via internal high-speed buses

    2. 2.

      Communication between two vehicles via DSRC technologies

    3. 3.

      Communication between vehicle and RSU via mobile communication such as LTE and RN

  • Back-end server: Back-end server lies in the Internet domain containing the application server such as collision avoidance application server. The messages received on server are transmitted via RSU to vehicles on large geographical location.

  • Attacker: Attacker is a temporary component in VANET; it is usually active for a short period of time. The main motivation of attacker is to manipulate the information and modify the information and vehicular network for his own benefits. The attacker must be identified and eliminated from the network intelligently.

2.3 Important Characteristics of VANET

VANET is designed to provide a safe and comfortable journey to the vehicular user on the road. VANET is also useful in fleet management where different vehicles have identical destination address [5, 6]. However, VANET relies on applications which depend on the availability of different vehicles and RSUs in the vicinity of source vehicle to transport the messages. These generated messages must arrive at the destination without any alteration from an attacker as this can lead to a drastic impact on the overall network operation and performance. Therefore, from security point of view, integrity of the information is one of the important aspects in VANET [7, 8].

VANET possess different unique properties which makes them different from other ad hoc networks. These are as follows:

2.3.1 Decentralized Systems

One of the main characteristics of VANET is the distributed and decentralized system since the occurrence of fixed infrastructure is not guaranteed in VANET. This lack of central entity poses different challenges such as secure message routing and QoS [9].

2.3.2 High-Speed Mobility and Dynamic Topology

VANET involves high-speed vehicles which are mostly randomly dispersed in the network. According to [10], two vehicles meet each other for a very short span of time which makes the network highly dynamic with constantly changing topology. Therefore, the availability of messages for this randomly changing topology must be ensured.

2.3.3 Cooperative Message Routing

Since VANET lacks centralized routing entity, the cooperation between two vehicles is necessary for message routing. Due to high-speed mobility of vehicles, the routing table cannot be maintained and updated all the time. Researchers have proposed different routing protocols in VANET which are grouped in six categories: topology-based routing, geo-cast routing, broadcast-based routing, position-based routing, infrastructure-based routing, and cluster-based routing [1012].

2.3.4 Real-Time Processing

Real-time processing of information in VANET is of great importance since any delay in the important life-saving situation might affect the network severely. The information in VANET must ensure the security requirements, i.e., confidentiality, availability, authenticity, and integrity, and must ensure to process the safety messages in real-time environment [13].

2.3.5 User and Data Privacy

Vehicular user constitutes the most vital entity in VANET. Privacy of the vehicular user’s information such as name, address, and geo-location must be secured from the malicious attacker [14].

3 Vehicular Cloud Networking (VCN)

VANET usually involves vehicles equipped with different communication interfaces which enable the vehicles to communicate with others via dedicated short-range communication (DSRC) or mobile communication such as long-term evolution (LTE) [15, 16]. Each vehicle posses some storage and computation resources. Due to fixed size hardware limitations of vehicles, these storage and computation resources are limited in nature. In the future, the bandwidth hungry applications such as vehicular user multimedia applications and social networking applications may not be supported by the vehicle itself. Therefore, different vehicles must cooperate together to share their resources, resulting in a newly emerging vehicular technology, called vehicular-based cloud networks (VCN).

In recent years, different research projects have been carried out which merge VANET with cloud computing. The concept of VCN was first introduced by the authors in [17] in the form of autonomous vehicular clouds (AVC). In AVC, the computing and communication resources are assigned dynamically to the users. In [18], the authors have taken a step further where they introduced a platform as a service (PaaS) model to provide multiple services to users in a highly dynamic environment. Hussain et al. proposed an architecture with multiple clouds such as vehicular cloud (VC), vehicles using clouds (VuCs), and hybrid clouds (HCs) [19]. The authors in [20] proposed a hierarchical structure of cloud computing in vehicular networks. However, security aspect of VCN is missing in existing literature. The main contribution of this chapter is twofold: Firstly, it presents a 3-tier architecture of cloud-based vehicular networks, and, secondly, it identifies threats in each tier of the architecture.

3.1 Vehicular-Based Cloud Networking (VCN) Architecture

The hierarchical architecture of VCN is depicted in Fig. 12.2. It is a three-tier architecture which consists of following levels:

  1. 1.

    Tier-1 cloud: vehicular cloud (VC)

  2. 2.

    Tier-2 cloud: infrastructure cloud (IC)

  3. 3.

    Tier-3 cloud: back-end cloud (BEC)

Fig. 12.2
figure 2

Vehicular-based cloud networking architecture

  1. 1.

    Vehicular cloud (VC): In VC, the physical resources (storage and computation) of vehicles are shared between group of vehicles only. This results in high overall efficiency of the network. The scope of VC is local in the context of VANET where information is shared between vehicles via V2V communication. Due to high mobility and dispersed distribution of vehicles in the network, the formation of VC is technically very difficult. The best example to implement VC is for fleet vehicles where the start and destination of the vehicles are mostly similar. These fleet vehicles can share their resources, resulting in a VC which can be used to serve different applications such as road information, weather information, etc.

  2. 2.

    Infrastructure cloud (IC): IC is initiated by adjacent RSU along the road where other vehicles request to access the services provided by the cloud. The scope of this cloud is local to small geographical area where RSU is located. Communication between two different ICs is carried out through dedicated local servers. The technically difficulty of formation of this cloud varies in different scenarios. If an extensive amount of RSU is available in a region, then different vehicles and RSUs can share their resources resulting in IC. However, despite the fact that VCN mostly faces high-speed mobility of vehicles in the network, IC is technically formed for a very short span of time.

  3. 3.

    Back-end cloud (BEC): Back-end cloud is the largest cloud in vehicular environment which exists in the Internet domain. BEC has more resources which can be used by vehicles for extensive data storage and high computation [20]. The scope of BEC is spread over the large geographical area to serve the vehicles.

3.2 Vehicular-Based Cloud Networking (VCN) Operation

To create and initiate a cloud in vehicular networks, it needs a cloud leader. If leader is a vehicle and no RSU participates in its cloud formation, then the cloud created is VC. However, if the request for cloud is initiated by RSU, then it forms IC, where other vehicles can access the resources of cloud.

The cloud leader invites other vehicles and RSUs in its vicinity by transmitting the resource request messages (REQs) to form a cloud. Any vehicle wishes to join the cloud responds back to the cloud leader with resource reply messages (REPs) where these vehicles act as cloud members [21]. When cloud leader receives the confirmation via REP messages, it keeps its members’ ID and assigns different tasks to them. The members communicate constantly with its cloud leader. Based on the permission from cloud leader, the members can publish and share the content received from leader with other vehicles.

Cloud leader is responsible to maintain the cloud it created. However, if any member wishes to leave, the cloud sends the resource, leaving message to the cloud leader. In that case, the cloud leader releases that specific member and recruits new members by broadcasting REQ messages. However, in case a cloud leader no longer wants to keep the cloud, it broadcasts the cloud release message.

4 Threats in Vehicular-Based Cloud Networking

VCN extends the list of assets explained in Sect. 12.2.2 by adding assets related to cloud itself. This includes data, custom, and user-defined applications and infrastructure. This section introduces different threats to 3-tier structure of VCN.

4.1 Threats to Tier-1 and Tier-2 Clouds

The threats in this category are specific to tier-1 and tier-2 clouds of VCN. The threats lie to the vehicles, adjacent infrastructure, messages, wireless communication, and the resources which vehicles and RSU share among them. The threats can be exploited as:

4.1.1 Vehicle

Usually, VCN involves highly mobile vehicles, and the two vehicles communicate with each other for a very short span of time to form VC. However, there are still some threats to vehicles and its different components. The attacker can plan to access the OBU or AU of vehicle and sensors. The threat also includes the software running on AU and sensors where the strong aim of attackers is to introduce malware. Firmware updates are also one of the targets where the attacker injects malicious code inside the in-vehicle network via CAN. This can lead to drastic results, e.g., the attacker can misconfigure the sensor with its malicious code [22, 23].

4.1.2 Adjacent Infrastructure

Infrastructure includes the static entity called RSU. As these are not mobile, the major threats lie to its hardware. Usually, physical security to RSU hardware is provided via CCTV. Other threats to infrastructure include illegal access of attacker to its software platform and DoS attack.

4.1.3 Wireless Communication

Wireless communication is a medium, responsible for exchanging messages with other vehicles. This includes both V2V and V2I communication. As this wireless medium is exposed to different vulnerabilities, if offers several opportunities to an attacker to exploit it for its own benefits. The threats to wireless communication include denial of service (DoS), tempering and alteration of the messages en route and jamming the wireless communication channel, etc.

  • Denial of service (DoS): DoS attack is one of the critical attacks in ad hoc networks, and in case of VCN, it can leave a severe impact on the network. In this attack, the attacker blocks the communication channel by refusing other cloud members to forward important messages to the cloud, other vehicles, and RSU in the vicinity.

  • Data tempering: The main motivation of the attacker is to alter and modify the messages en route to vehicles, RSU, IC, and VC in this attack [24].

  • Jamming the wireless communication channel: This type of attack results in the complete jamming of wireless medium responsible to carry the messages. Jamming of the wireless medium is the result of DoS attack most of the time.

4.1.4 Messages

Messages contain important information about a particular event, which is usually exchanged among the vehicles and adjacent RSUs during V2V and V2I communication. Threats to these messages always exist where the main interest of the attacker is to compromise its confidentiality, integrity, and authenticity (CIA). The threats to information can be exploited in the following different security aspects.

  • Threats to confidentiality of message: Confidentiality is a significant security aspect which provides secrecy by limiting access of attacker to the message. The threat caused by this aspect is the illegal monitoring transmitted in V2V and V2I communication.

  • Threats to authenticity of message: The routing of accurate and authentic message should be ensured in VCN as it involves several life-saving contexts. The source and destination of messages must be known and verifiable. The threat which lies to messages from this perspective is the ID theft of vehicular user from an attacker. This can lead to severe and drastic results in VCN, especially during the event of an accident.

  • Threats to integrity of message: Message transmitted from source should arrive at the destination without any alteration to its content. The threat from this aspect is that the message can be tempered, modified, or deleted from attacker in transit while carrying the transmission of message between two vehicles [25]. Therefore, integrity of message in both modes of communication, i.e., V2V and V2I, should be ensured.

  • Threat to availability of message: Since the main aim of vehicular network is to provide drivers safety, it should be ensured that the message transmitted from any vehicle and tier-1 and tier-2 cloud regarding any particular context is available to other neighboring vehicles and adjacent RSU.

  • Non-repudiation: Non-repudiation ensures the message generated from sender and receiver is verifiable by the authorities [26]. Therefore, the senders should be responsible for the messages generated. The threat from this category is the denial of message produced by sender or denial of message reception by receiver through the clouds.

4.1.5 Vehicular Cloud

As VC is the result of sharing of computation and storage resources of vehicles, therefore, the main threats lie to the cloud platform itself. An adversary may attack the cloud by injecting malware into the cloud platform. Threat also lies to the important messages, as these are communicated between the vehicles through this cloud. Privacy is also one of the important security aspects which aim to ensure that the identity of the vehicular user is kept secret from an unauthorized person [27]. The threats in this regard include revealing the vehicular user identity, its geographical location, and sensitive information.

4.1.6 Infrastructure Cloud

Since both static and mobile entities are involved in IC, the threats lie to both cloud platform and the messages. The attacker may prevent the static RSU to exchange messages with other members by implementing DoS attack. Threats also exist to the messages which are communicated via infrastructure cloud. The possible scenario is the rouge cloud member, which becomes part of the cloud to steal important information via spoofing. This can produce threat to the privacy of the user information. This rouge cloud member must be identified and cleverly removed from the cloud.

4.2 Threats to Tier-3 Cloud

In this section, we focus on the threats that can be used to launch attacks on the tier-3 cloud. These attacks can be launched on the vehicular data once it has been transferred to a traditional IT cloud. We do not consider the attacks on the vehicular cloud which is temporarily formed among vehicles in local area to share their data and processing.

4.2.1 Data Breaches

Data breach in infrastructure cloud is the leakage of vehicular data to an unauthorized entity who does not have the legal right to see that data. Data breach is a very common attack, and Cloud Security Alliance (CSA) [28] has mentioned it as the most critical threat in cloud. According to CSA, 91 % of cloud tenants consider it as a significant threat in cloud computing. It can result in the loss of data security properties of confidentiality and integrity.

Data breaches in infrastructure cloud mostly occur due to flaws in application designing, operational issues, insider attackers, and insufficiency of authentication, authorization, and audit controls. Moreover, virtual machine (VM) escape attack [29] can be used to breach vehicular data of other users in a cloud environment. To launch a VM escape attack, an attacker leases a VM in cloud to run a script through which he can break out of his VM and access the code of Virtual Machine Manager (VMM). Having access to the code of VMM provides root privileges to the attacker who can access the data from services processing vehicular data on cloud. Similarly, attacker will also be able to access the vehicular data if it is stored in cloud or being processed by any application.

4.2.2 Data Loss

Data loss is referred to the loss of vehicular data in infrastructure cloud. Data life cycle in cloud has five main stages, namely, creation, transfer, processing, storage, and destruction. Once the vehicular data has been transferred to the cloud, it will be processed by applications and stored in the cloud storage. Data loss in cloud occurs during data transfer to and from cloud, during processing by applications or in cloud storage [30]. CSA in their survey have listed data loss is the second most significant threat in cloud computing with almost 91 % of cloud tenants considering it as a significant threat [28]. Data loss mostly occurs due to insider attacks which include data deletion, data corruption, and loss of data encryption key and other issues such as faults in storage system and natural disasters.

4.2.3 Account or Service Hijacking

Account or service hijacking is a term referred to an attack in which attacker steals the credentials of victims to access their data and services in cloud [31]. This not only results in loss of confidentiality, integrity, and availability of data, but attacker can also use these credentials to launch attacks from victims’ account. Account or service hijacking of vehicular data can be done by the network attacks such as phishing, SQL injection, cross-site scripting (XSS), botnets, and software vulnerabilities such as buffer overflow. In phishing attacker usually sends an email that seems to come from a legitimate authority to the user with the purpose of stealing his identity such as login credentials. XSS is done by compromising the web application to contain a malicious script which maybe a JavaScript, HTML, or flash and sending it to a benign user, while botnet is a network of interconnected computers over the Internet that can perform automated tasks such as distributed denial of service attack.

4.2.4 Denial of Service

Denial of service (DOS) attacks can be launched from cloud services or from outside the cloud that consume the resources including data, storage, virtual machines, and network bandwidth. This results in the unavailability of these resources to the legitimate users due to which vehicular services running on infrastructure cloud will be unable to respond to user requests. DOS attacks are very common in cloud computing, and 81 % of cloud tenants consider it as a relevant threat [28]. Another variant of DOS attack is distributed denial of service (DDOS) attack in which more than one sources are used to launch this attack [32]. Some attack sources in DDOS attack are legitimate users who are compromised by network attack such as Trojan which makes the DDOS hard to detect. Other ways of launching DOS attack include exploiting the vulnerabilities in web server, databases, and applications, resulting in unavailability of resources.

4.2.5 Insecure Interfaces and APIs

Application programming interfaces (APIs) is a set of rules that governs how applications communicate with each other and the underlying operating systems or libraries. All the cloud service models including IaaS, PaaS, and SaaS have standard and custom APIs for their applications. Different applications can be integrated into the cloud using APIs, and cloud providers have introduced APIs for their platforms. Some of the widely used APIs are Amazon Web Service (AWS) API, Google Compute Engine, VMware vCloud API, and OpenStack API [33]. The security of an application in cloud depends on the security of its APIs. Insecure APIs on vehicular services can result in the violation of authentication and access control principles. Moreover, the attacker having access to data can lead to the loss of data confidentiality or integrity.

4.2.6 Malicious Insider

Malicious insider is an employee of the cloud organization with access to its resources and assets such as data, but he misuses his privileges to perform unauthorized actions. CSA has defined malicious insider as the employee whose actions result in the loss of security properties of confidentiality, integrity, or availability of organization’s information or information systems. Having malicious insiders is a critical threat in cloud with 88 % of cloud users considering it as a relevant issue [28]. Malicious insiders can also be hobbyist attacker who exploits organizations’ resources weaknesses just for fun. Moreover, lack of security measures for vehicular applications protection in cloud can also be exploited by the malicious insiders.

4.2.7 Abuse of Cloud Services

Abuse of cloud services in VCN is referred to the tenants who misuse the vehicular cloud services they have purchased. Misuse includes the illegal or unethical use of services by tenants that violate their contract with service provider which is called service-level agreement (SLA) [34]. Abuse of cloud services was the most common threat in cloud computing in 2010, but different security measures were introduced to prevent it, and now it is the seventh most critical threat in cloud computing. Cloud services have been used to launch different attacks over the years. A botnet attack was launched in 2009 using Amazon’s EC2 services as the command and control servers for that attack [35]. Similarly, the unlimited computation power of cloud can be used to launch password-cracking attacks such as brute force, performing DOS attacks and others such as cross-site scripting.

4.2.8 Shared Technology Vulnerabilities

Cloud service provider’s provision shared resources such as computation, network, and storage resources to different users. However, the sharing of resources such as hard disk, RAM, and GPUs might not offer perfect isolation. If isolation is not properly implemented, a malicious attacker can get unauthorized access to cloud resources, VMs, customer’s data, and sensitive vehicular data. Almost 82 % of users consider shared technology vulnerabilities as a relevant threat in cloud that can have impact on IaaS, PaaS, and SaaS services models [28]. XEN is an open-source virtualization platform for cloud that has a XEN hypervisor with API toolstack and other features [36]. A vulnerability of local privilege escalation was found in XEN that can be used to launch guest to host virtual machine escape attack.

5 Review Questions

  1. 1.

    What are the main characteristics of the modes of transporting messages in VANET?

  2. 2.

    Identify different key infrastructure components in VANET and explain their main purpose.

  3. 3.

    How important is real-time processing in context of VANET?

  4. 4.

    What are the key differences between the clouds in three-tier architecture of VCN?

  5. 5.

    To which attacks is the wireless communication in VCN most vulnerable?

  6. 6.

    What is the difference between the threats to the authenticity of message and non-repudiation in VCN?

  7. 7.

    What are the main stages in data life cycle in cloud? In which stages can data loss occur?

  8. 8.

    Name the attacks that can be launched in tier-three cloud network to hack accounts or services.

  9. 9.

    How can the tier-three cloud services be misused by tenants?

  10. 10.

    Which shared technology vulnerability was discovered in XEN virtualization platform?