Research Article

A Crowd-Based Intelligence Approach for Measurable Security, Privacy, and Dependability in Internet of Automated Vehicles with Vehicular Fog

Table 1

Cloud computing versus fog computing.

RequirementCloud computingFog computing

LatencyHighLow
Delay jitterHighVery low
Location of server nodesWithin the InternetAt the edge of the local network
Distance between the client and serverMultiple hopsOne hop
SecurityUndefinedCan be defined
Attack on data en-routeHigh probabilityVery low probability
Location awarenessNoYes
Geographical distributionCentralizedDistributed
Support for mobilityLimitedSupported
Target usersGeneral Internet usersMobile users
ConnectivityCommunicate through IP networksWireless interface
Bandwidth requirementsSensitive for bandwidthLess demand for bandwidth