Abstract
The growth of the Internet has led to the increasing usage of smart infotainment applications on the vehicular ad-hoc network (VANET). Preserving privacy and security regarding the provision of smart infotainment applications while on the go is most desired. Thus, a secure authentication scheme is required. Many privacy-preserving security schemes have been developed in recent times using cryptography approaches. However, these incur key management and communication overhead. The usage of third-party servers incurs the overhead of key computation, storage and distribution. Post completion of the initialization phase, the message is secured using cryptography and is shared among vehicles. The design of the proposed secure enhanced non-cooperative cognitive division multiple access () aims to eliminate the need for the local message available with the parties to be released for provisioning secure safety-related applications. To overcome the research challenges, this work presents a novel security scheme, namely secure non-cooperative cognitive medium access (). The experiment is conducted to evaluate the overhead incurred in provisioning security to . The outcome shows that the overhead incurred by over was negligible to provide the real-time security requirements of smart infotainment applications, which is experimentally shown in this paper in terms of throughput, collision and successful packet transmission considering varied environmental models such as cities, highways and rural areas.
1. Introduction
The vehicular ad-hoc network () has similar characteristics to the Mobile Ad-Hoc Network () where the vehicle is mobile in nature and controlled by road topologies []. The objective of is to provide the driver and user with a safe and reliable communication environment. The communication in can be broadly classified into a vehicle to vehicle (), vehicle to infrastructure or roadside unit () () and , which is a combination of both and . The basic architecture of VANET communication is shown in Figure 1. Each vehicle is embedded with an onboard unit () that has communicational and computational capabilities [].

Figure 1.
The architecture of vehicular ad-hoc network (VANET) communication.
As per the standard stated by Dedicated Short Range Communication (), a vehicle broadcasts safety-related message or beacons []. These messages possess information such as the vehicle direction, location, speed and other traffic-related information such as accidents and congestion. This aids in assisting vehicle drivers or users to take its contextual corresponding decisions in order to avoid an accident and congested routes. However, preserving the privacy of such information is considered a critical element, since it may breach the privacy concern of the user. For example, the starting and ending positions of a particular vehicle may generally be the information of the office and home addresses or vice versa of a user. There are also some security concerns, i.e., there is a risk if an intruder beacons a false message to gain unfair access, which may lead to congestion or in the worst case may lead to an accident or loss of life. In order to take part in communication, a valid user must be authenticated. However, authenticating users in such an environment is challenging, since authentication requires some identity-related information such as the vehicle number, driving license and so on. As a result, exposing such information may breach the privacy concern of users. Hence, it is desired to preserve the privacy of such information. In case of any malicious activity detected, the security design should be able to track the malicious user. These requirements make provisioning security and privacy a key challenge in and for achieving an effective security mechanism, these issues need to be addressed [] and [].
Authentication is an important necessity in the VANET, as it assures that the actual node sends the messages and therefore that a greater range of attacks can be reduced, which are done by the greedy drivers or the opponent drivers. However, an authentication increases the concern of privacy; a basic scheme for authentication of providing the identity details of the sender along with the message would help with tracking the vehicles. Therefore, as per the application, authentication should be provided as an absolute essential to authenticate that a certain property is being assigned to the sending vehicles. For instance, in location-based services, that a vehicle is in a particular area where it is stated to be is the property that could state it. Message integrity is also important, because this assures that the message is not being altered during the transition and that the messages that the driver receives are not false. In this security-based system, message non-repudiation ensures that the sender cannot deny the message that has already been sent. However, it does not state that any of the drivers can identify the sender; instead, only the specifically authorized drivers should be allowed to identify the authenticated message from the vehicle sending/transferring the message. Entity authentication assures that the message generated by the sender is still in the network, which allows the driver to understand that the message from the sender is delivered in a shorter period of time. Access control is important and necessary for ensuring that the roles and privileges that are authorized are functioning via the nodes accorded to them in the network. Access control and authorization state what each of the nodes in a network can do and what messages they can create. Message confidentiality is required in a system where the communication is done privately by some of the certain nodes. However, not all the nodes can do that. This type of communication can only be done by law enforcement vehicles that are authorized to convey private information among each other, such as identifying the location of a terrorist or criminal. In this system, privacy is used for ensuring that any unauthorized people do not access the information and cannot view the information; the information should not be leaked to any unauthorized person. Any third party should not be able to track the movements of the vehicle, since it could be a violation of personal privacy. Therefore, there should be some sort of privacy or secrecy for the movements of the vehicles and the messages. However, in the cases related to liability, to determine responsibilities, only specified authorities should be allowed to trace the identities of the user. One should not be allowed to know the future and past location of particular vehicles; location privacy is also very important and required. Real-time guarantees are extremely important in a VANET, as many applications that are related to safety depend on the strict time guarantees. This assures that the time-sensitivity of the safety-related applications can be built into many protocols such as avoiding collisions.
The authorities involved in preserving privacy in the semi-honest trust model are not suitable for provisioning high throughput safety and smart infotainment application. To preserve the privacy of user data, in the literature, many researchers have predominantly adopted cryptography techniques. The cryptography technique relies on the keys for encryption and decryptions, where keys are symmetric or asymmetric in nature.
The usage of third-party servers incurs the overhead of key computation, storage, and distribution, which is also known as the initialization phase. Post completion of the initialization phase, the message is secured using cryptography and is shared among vehicles. The design of the proposed secure enhanced non-cooperative cognitive division multiple access () aims to eliminate the need for the local message available with the parties to be released for provisioning secure safety-related applications. A security model is designed using Commutative Rivest–Shamir–Adleman (CRSA), namely .
The research work contribution is as follows:
- The message integrity and privacy are preserved using the commutative cryptography technique.
- The model preserves privacy in the presence of non-trusted or dishonest authorities.
- Our design incurs much lower overhead in providing security when compared to existing design considering throughput, collision and successful packet transmission performances.
2. Related Work
Recently, many privacy-preserving authentication approaches have been proposed. These approaches can be broadly classified into group-based approaches [] and pseudonymous-based approaches [] and []. Alongside, there are Mix-zones, -assisted [], and a silent period []. These approaches aim at resolving many securities and privacy-related issues in , but each approach has its own benefits and limitations. The existing pseudonym-based approaches induce significant delay [], since it adopts public key infrastructure () by using a digital signature to authenticate the message. As reported in [], it requires about 20 to verify a signature by an on-board unit considering a 400 processor. This may not be an issue in a sparsely populated region, but in a densely populated region, it may incur serious delay for the message verification process. Another limitation of pseudonym-based approaches is the certificate revocation list (), i.e., a certification authority () generates a set of public-key certificates to a vehicle. Then, the vehicle signs the beacon with its private key and broadcasts the beacons with its corresponding public key certificates. However, in the case of revocation, all certificates pertaining to the revoked user need to be added into . The grows exponentially with respect to a number of revoked vehicles. The on-board unit checks the attached certificate each time the vehicle obtains a beacon message. As a result, it induces the computation and communication overhead of an on-board unit. Pseudonymous-based approaches also suffer from trust-related issues, since it requires the complete trust of RSU and certificate authority. The privacy of the user is compromised if the certificate authority turns malicious or been attacked, since the certificate authority has all the information about the vehicle. Similarly, the RSU is located in open areas, and side-channel attacks may compromise the security and privacy of RSU/users. The group signature-based approaches also have certain limitations. As stated in [], it incurs significant processing overhead on the onboard unit, since the pairing operation needs to check the association among the identity and the signature. Group management is another issue of group signature-based approaches. That is, the group manager can track its member vehicles, since it possesses the complete knowledge of group members. Therefore, choosing the group manager is a complicated and challenging task. A node can leave or join a group at any instance of time in a dynamic environment and the freshly joined group manager may have all knowledge of its members. To overcome the communication overhead due to the , [] presented a hierarchy of pseudonyms for semi-trusted multi-authority to preserve the privacy of the user. To communicate among different authority pseudonyms with longer sessions is presented, and to communicate with the vehicle a pseudonym with shorter sessions is presented. However, their model suffers from trust issues pertaining to the certification authority. To address the trust-related issue, [] presented a hardware-based hybrid security model. In their model, firstly the onboard unit first generates its anonymous encryption key to initialize authentication sessions. Secondly, the trusted authority verifies the anonymity of the users. The trust parameter is evaluated using the behavior of the user. Post evaluation of the trust parameter, a session key is generated for commencing communication among vehicles. Their model adopts bilinear pairing, which aids in minimizing the key management overhead. However, the tamper-proof hardware cannot address all the security requirements of []. [] presented a hierarchical identity-based signature sharing scheme considering different types of communication hardware.
The parties involved in preserving privacy in the semi-honest trust model is not suitable for provisioning safety-related application. To preserve the privacy of user data, in the literature, may researchers have adopted cryptography techniques. The cryptography technique relies on the keys for encryption and decryptions, where keys are symmetric or asymmetric in nature. To compute keys and distribute among parties, secure or third-party servers are considered, as seen in [] and [].
3. Proposed Secure Non-Cooperative Cognitive Division Multiple Access Model
This work presents a secure enhanced non-cooperative cognitive division multiple access () model using a commutative RSA cryptography mechanism. This adopts the enhanced non-cooperative cognitive division multiple access () [] real-time (Medium Access Control) communication protocol. To provision real-time access, the combines Time Division Multiple Access (), Frequency Division Multiple Access (), and the Cognitive Radio () technique. The Medium Access Control protocol avoids signaling, which aids in enhancing the system efficiency. However, did not consider provisioning security for message authentication and user privacy. In the next subsection, the authors present our proposed security model.
3.1. Commutative RSA (CRSA) Model
Here, the authors present a secure and efficient implementation of the commutative algorithm for message authentication among vehicles for the environment. The notations used in the RSA commutative key are given in Table 1. In order to enable secure data communication among the corresponding vehicles in the environment, a noble commutative methodology that states that the order in which encryption is performed does not affect the result of the encryption, or the decryption can be done in a similar manner. In the majority of existing approaches, the public key cryptosystems employ a key exchange approach that ultimately causes the increase in computational overheads for key exchange; alternatively, at individual transceivers, the encryption and decryption are missed and thus somewhere the efficiency, as well as security, would be compromised. Therefore, the consideration of commutative RSA (CRSA) might be an optimum solution for accomplishing an efficient and most secure communication for multi-channel V2V vehicular ad-hoc smart infotainment applications. Here, the authors have proposed a secure cryptography algorithm, with the goal of enhancing the system performance for its lower memory occupancy and with higher throughput.

Table 1.
Variable notation.
A secure communication model can be realized only when the message transmitted over the communication channel is protected and cannot be collided. To achieve the cryptography mechanism is generally considered. Therefore, the proposed here adopts the algorithm. The considers two prime param and initialized amongst all the vehicles of the region. Let and represent the region member required to securely communicate over the secure channel. To compute the encryption keys and decryptions, key pairs of the algorithm—the propertord and —are evaluated using the following
From the above expression, it can be seen that and for and . The key pair for the encryption of and are signified as follows
The parameter is obtained by arbitrarily choosing a parameter such that it is a co-prime of , or in other terms,
where signifies the greatest common divisor function among and
The key pair for the decryption of and is depicted by and and the property is evaluated by using the following expression:
Let denote the encrypted message . The encryption process is expressed as follows
The decryption process of on encrypted message is expressed as
3.2. Proof of CRSA Model
The commutative property of adopted in the model can be proved if message encrypted by and then encrypted by provides the identical resultant to when the encryption is carried out by followed by encryption carried out by , which can be stated as
As it can be said that
Therefore,
Each vehicle computes its public and private key using the proposed commutative RSA algorithm. Hop-based communication is adopted for data transmission among vehicles. Each vehicle encrypts the data using its own public key. The receiver performs decryption operation based on the number of times it is encrypted using its commutative keys of participating vehicles. The proposed model preserves the data and user’s privacy, and an intruder can be tracked using the user’s commutative keys. First, we established the key management where the key management center will distribute two prime numbers A and B to all VANETs, which are the same. Then, we will calculate L and M at each VANET node. Based on this, two vehicular nodes will compute the encryption and decryption keys. Second, we established the key exchange; now, once all the vehicles completed their encryption and decryption keys, they will inform the key management that it’s over. For instance (Figure 2), Vehicle 1 is the source and Vehicle 4 is the destination. Vehicle 1 has to send the data to Vehicle 4. So, what could happen is that the intermediate hops are Vehicle 2 and Vehicle 3. So, Vehicles 1, 2 and 3 will send their decryption key to the key management center, who will give these keys to only the destination vehicle, which is Vehicle 4. In secure data exchange, Vehicle 1 will then encrypt the data and send it to Vehicle 2. In normal RSA or normal Elliptic-curve cryptography (ECC), when you encrypt encrypted data again, data gets corrupted. So, on decryption, the data cannot be recovered (data lost). So, in our mechanism, the user does not need to decrypt the data; the user can just encrypt using his key and forward it. If there is an attacker that knows I’m Vehicle 3, now this attacker will not have the same encryption key. However, all the encryption keys are different from each vehicle, so the attacker will not be able to get the data. Even if the attacker gets the data, he will not be able to decrypt it because all the decryption keys are also different, and the attacker will not know how many times the data is encrypted. So, in this case, no one other than Vehicle 1 and Vehicle 4 will get to know the original data. That is the biggest advantage of securing complete VANET transmission. In addition, another advantage of this protocol that the intermediate nodes will not get to know the data content at all, because the data is encrypted multiple times and these multiple encryptions do not crop the data. In the normal RSA or ECC, every time you need to decrypt your data and then again re-encrypt it, because it does not support multiple encryptions and multiple decryptions.

Figure 2.
Secure enhanced non-cooperative cognitive division multiple access (S-ENCCMA) with Commutative Rivest–Shamir–Adleman (CRSA).
In the next section, the simulation study proposed is evaluated.
4. Simulation Analysis and Result
The experiments are conducted on a Windows operating system, bit quad-core processor with and Dedicated Nvidia card. The [] simulator tool is used for experimental evaluation. The Proposed and existing [] algorithm are written in C# object-oriented programing language using the Visual studio framework . The and city, highway, and rural radio propagating environment model [Ours] is incorporated into the tool [,,,,]. Experiments are conducted to evaluate the performance of over in terms of throughput achieved, successful packet transmission and packet collision. The experiments are conducted considering different environments such as city, highway, and rural areas. The overall experiment is conducted to evaluate the overhead incurred in provisioning the proposed security model to protocol.
For modeling and simulating the environmental conditions of city, highway, and rural areas, we considered the parameters presented in []. These environmental parameters are as shown in Table 2 and have been obtained from a set of tests on IEEE 802.11p (5.9 GHz). This setup allows our model to achieve idealistic channel configuration. The simulation parameters considered for evaluation are shown in Table 3.

Table 2.
Channel parameters for different environments used for simulation [].

Table 3.
Parameters. MAC: Medium Access Control.
4.1. Throughput Performance
Experiments are conducted to evaluate the throughput overhead incurred in provisioning security by the proposed security model considering 20 vehicles that are moving at a speed of 20 m/s. Figure 3, Figure 4 and Figure 5 show the throughput performance of the proposed with security and existing without security for city, highway and rural environments, respectively. The experiment outcomes show that and achieve an average throughput of 6.96 Mbps and 5.8 Mbps respectively considering varied environments. The overall result obtained shows that provisioning security to protocol incurs a throughput overhead of 15.91% considering varied environments.

Figure 3.
City environment throughput performance for varied vehicles.

Figure 4.
Highway environment throughput performance for varied vehicles.

Figure 5.
Rural environment throughput performance for varied vehicles.
4.2. Successful Packet Transmission Performance
The experiment is conducted to evaluate the successful packet transmission overhead incurred in provisioning security by the proposed security model. Figure 6, Figure 7 and Figure 8 show the throughput performance of the proposed with security and existing without security for city, highway and rural environments, respectively. The experiment outcomes show that the and achieve an average successful packet transmission of 53.66 Mbps and 43.66 Mbps respectively considering varied environments. The overall result obtained shows that provisioning security to protocol incurs a successful packet transmission overhead of 17.97% considering varied environments.

Figure 6.
Successful packet transmission performance achieved for a city environment.

Figure 7.
Successful packet transmission performance achieved for a highway environment.

Figure 8.
Successful packet transmission performance achieved for a rural environment.
4.3. Collision Performance
The experiment is conducted to evaluate the collision overhead incurred in provisioning security by the proposed security model. Figure 9, Figure 10 and Figure 11 show the collision performance of proposed with security and existing without security for city, highway, and rural environments, respectively. The experiment outcomes show that the and achieve an average collision of 22.0 Mbps and 36.33 Mbps respectively, considering varied environments. The overall result obtained shows that provisioning security to protocol incurs a collision overhead of about 38.91% considering varied environments.

Figure 9.
Collision performance achieved for a city environment.

Figure 10.
Collision performance achieved for a highway environment.

Figure 11.
Collision performance achieved for a rural environment.

Table 4.
Comparison with state of-art-techniques.
Table 4.
Comparison with state of-art-techniques.
S-ENCCMA (Ours) | ENCCMA [] | Mobile Slotted Aloha (MS-ALOHA) [] | Slotted Period (SLOP) [] | Earliest Deadline First based Carrier Sense Multiple Access (EDF-CSMA) [] | |
---|---|---|---|---|---|
Environmental model used | City, Highway, and Rural (CHR) | Freely flowing vehicles | Urban and highway | Intelligent driver | NA |
Scheduling Algorithm Used | CRSA | ENCCMA (NCC-TDMA-FDMA) | MS-ALOHA | Wave-Slotted aloha | EDF-CSMA |
Simulator used | SIMITS | SIMITS | VISSIM | YES (NA) | NS-3 |
MAC USED | 802.11p MAC | 802.11p MAC | 802.11p MAC | 802.11p MAC | 802.11p MAC |
Channel sharing available | Yes | Yes | No | No | No |
4.4. Comparison with State of Technique
In Table 4, a comparison of S-ENCCMA with a state-of-art technique is showed. It shows that S-ENCCMA support distributes channel-sharing mechanisms for the V2V environment. Thus, S-ENCCMA aids in maximizing the system throughput with minimum collision overhead and hence enhancing system efficacy. The adopts the enhanced non-cooperative cognitive division multiple access () [] real-time (Medium Access Control) communication protocol. To provision real-time access, the combines Time Division Multiple Access (), Frequency Division Multiple Access (), and Cognitive Radio () techniques. The Medium Access Control (MAC) protocol avoids signaling, this aids in enhancing the system’s efficiency. However, did not consider provisioning security for message authentication and user privacy. In [], they evaluated the packet delivery performance considering different environments. However, they did not consider varying the number of devices and vehicle mobility in their experiments. In [,], the authors conducted the experimental analysis considering varied mobility speeds to evaluate the collision performance. However, the performance evaluation under different environmental conditions was not considered. Our model considers performance evaluation considering throughput, collision and successful transmission considering a varied number of vehicles, varied speed, and varied environmental conditions. The overall survey shows the efficiency of our model over state-of-the-art techniques.
5. Discussion
A malicious user can sit in a parking lot and pick up communications from several miles away through digging up cables or gaining physical access to a router. Their own wireless signal can be created or interjected by a malicious user. So, it is very important that the communications for traffic monitoring be safe and secured. The accidental or malicious actions that can cause disruption can be prevented. Even though malicious attacks on traffic monitoring might seem far-fetched, they appear quite plausible if you examine the gray market devices people now buy to minimize travel time (such as infrared transmitters to redo traffic lights). To reduce a particular driver’s travel time or toward a particular roadway to increase revenue at a particular store, these new devices might manipulate the congestion index to divert traffic away from a road. The information quality of a competing traffic-monitoring service might be diluted by other service providers for four reasons, and a result, protecting the ITS communications network throughout the system design phase is crucial. First, the most effective phase at which to limit exposures is presented by system design. Second, the research can be done in a limited expenditure by considering security early, which is unlikely to be securable. Third, the possibility of attacks is ignored, which can cause incorrect conclusions about system robustness. Finally, to garner governmental approval and consumer acceptance, the security is crucial. VANET is very useful in recent times, as it can be applied to the safety application. As the various broadcast messages in the VANET are safety-related, it needs deep penetration and less delivery time. The security of these messages is also important; the message must be authorized and not leaked, as the owner of the vehicle has the right of privacy. Security has attracted less attention so far. VANET packets contain life-critical information; hence, it is necessary to make sure that these packets are not inserted or modified by the attacker. Likewise, the liability of drivers should also be established that they inform the traffic environment correctly and in time. These security problems are not similar to a general communication network. The size of the network, mobility, geographic relevancy, etc., makes the implementation difficult and distinct from other network security.
In VANET, each vehicle computes its public and private keys using the proposed commutative RSA algorithm. Hop-based communication is adopted for data transmission among vehicles. Each vehicle encrypts the data using its own public key. The receiver performs decryption operation based on the number of times it is encrypted using the commutative keys of participating vehicles. This work presents a secure enhanced non-cooperative cognitive division multiple access () model using a commutative RSA cryptography mechanism. This adopts the enhanced non-cooperative cognitive division multiple access () real-time (Medium Access Control) communication protocol. To provision real-time access, the combines Time Division Multiple Access (), Frequency Division Multiple Access (), and Cognitive Radio () techniques. The Medium Access Control protocol avoids signaling, which aids in enhancing system efficiency. However, did not consider provisioning security for message authentication and user privacy. Here, the authors present a secure and efficient implementation of the commutative algorithm for message authentication among vehicles for the environment. The notations used in the RSA commutative key are given in Table 1. In order to enable secure data communication among the corresponding vehicles in the environment, a noble commutative methodology that states that the order in which encryption is performed does not affect the result of the encryption or the decryption can be done in a similar manner. For modeling and simulating the environmental conditions of city, highway and rural areas, the authors considered the parameters presented in []. These environmental parameters are as shown in Table 2 and have been obtained from a set of tests on IEEE 802.11p. This setup allows our model to achieve an idealistic channel configuration. Experiments are conducted to evaluate the throughput, successful packet transmission, and collision overhead that are incurred in provisioning security by the proposed security model considering 20 vehicles that are moving at a speed of 20 m/s. The result shows provisioning security to protocol incurs a throughput overhead of 15.91%, a successful packet transmission overhead of 17.97%, and a collision overhead of 38.91% considering varied environments. The outcome shows that overhead incurred by over was negligible regarding the provision of the real-time security requirements of smart infotainment applications, which is experimentally proven.
6. Conclusions
Providing security for smart infotainment applications in is most desired. As a result, it requires an efficient authentication mechanism that preserves the user’s privacy and security requirements of . Many existing schemes to preserve privacy have adopted cryptography approaches. However, it incurs key management and communication overhead. To address this, this work presents a novel security scheme—namely, secure non-cooperative cognitive medium access . In the majority of existing approaches, the public key cryptosystems employ a key exchange approach that ultimately causes the increase in computational overheads for key exchange; alternatively, an individual transceiver requires encryption and decryption, and thus somewhere the efficiency, as well as security, would be compromised. Therefore, the consideration of commutative RSA (CRSA) might be an optimum solution for accomplishing an efficient and most secure communication for multi-channel V2V vehicular ad hoc smart infotainment applications. Here, we proposed secure with a commutative key cryptography algorithm, with a goal of enhancing the system performance for its lower memory occupancy and with higher throughput. Here, each vehicle computes its public and private key using the proposed commutative RSA algorithm. Hop-based communication is adopted for data transmission among vehicles. Each vehicle encrypts the data using its own public key. The receiver performs a decryption operation based on the number of times it is encrypted using its commutative keys of participating vehicles. The experiment is conducted to evaluate the overhead incurred in provisioning security to . The protocol incurs an average throughput overhead of 15.91%, an average collision overhead of 38.91%, and an average success packet transmission overhead of 17.97% when security is provisioned to considering the different environmental conditions. The outcome shows that the overhead incurred by S- over was negligible regarding the provision of the real-time security requirements of smart infotainment applications, considering the varied environmental model. However, future work would consider a comparison between the performances of the proposed model with the performances of the existing models using more than 20 vehicles. A field study is needed to validate the results of this study with a real-world use case that develops a new that further reduces the collision and improves the throughput and packet transmission efficiency. For this, we considering provisioning the proposed security design.
Author Contributions
M.A.A.-A. and A.A.A.-A. contributed to the main idea and the methodology of the research. M.A.A.-A. designed the experiment, performed the simulations, and wrote the original manuscript. A.A.A.-A. contributed significantly to improving the technical and grammatical contents of the manuscript. A.A.A.-A. and H.J.L. reviewed the manuscript and provided valuable suggestions to further refine the manuscript. Supervision H.J.L. All authors have read and agreed to the published version of the manuscript.
Funding
This work was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (grant number: NRF2016R1D1A1B01011908). And it was also supported by the Institute for Information and Communications Technology Promotion (IITP) grant funded by the Korea government (MSIT) (No.2018-0-00245).
Conflicts of Interest
The authors declare no conflict of interest.
References
- Ros, F.J.; Ruiz, P.M.; Stojmenovic, I. Acknowledgment-based broadcast protocol for reliable and efficient data dissemination in vehicular ad hoc networks. IEEE Trans. Mob. Comput. 2012, 11, 33–46. [Google Scholar] [CrossRef]
- Azees, M.; Vijayakumar, P.; Deborah, L.J. Comprehensive survey on security services in vehicular ad-hoc networks. IET Intell. Transp. Syst. 2016, 10, 379–388. [Google Scholar] [CrossRef]
- DSRC Technology, Intelligent Transportation Systems. Available online: http://www.its.dot.gov/dsrc/ (accessed on 28 January 2011).
- Parno, B.; Perrig, A. Challenges in securing vehicular networks. In Workshop on Hot Topics in Networks (HotNets-IV); University of Maryland: College Park, MD, USA, 2005; pp. 1–6. [Google Scholar]
- Raya, M.; Hubaux, J.P. Securing vehicular ad hoc networks. J. Comput. Secur. 2007, 15, 39–68. [Google Scholar] [CrossRef]
- Lin, X.; Sun, X.; Ho, P.H.; Shen, X. GSIS: A secure and privacy preserving protocol for vehicular communications. IEEE Trans. Veh. Technol. 2007, 56, 3442–3456. [Google Scholar]
- Lu, R.; Lin, X.; Zhu, H.; Ho, P.H.; Shen, X. ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications. In Proceedings of the IEEE INFOCOM 2008—The 27th Conference on Computer Communications, Phoenix, AZ, USA, 13–18 April 2008; pp. 1229–1237. [Google Scholar]
- Bellur, B. Certificate Assignment Strategies for a PKI-Based Security Architecture in a Vehicular Network. In Proceedings of the IEEE GLOBECOM 2008—2008 IEEE Global Telecommunications Conference, New Orleans, LA, USA, 30 November–4 December 2008; pp. 1–6. [Google Scholar]
- Yu, R.; Kang, J.; Huang, X.; Xie, S.; Zhang, Y.; Gjessing, S. MixGroup: Accumulative Pseudonym Exchanging for Location Privacy Enhancement in Vehicular Social Networks. IEEE Trans. Dependable Secur. Comput. 2016, 13, 93–105. [Google Scholar] [CrossRef]
- Hsiao, H.; Studer, A.; Chen, C.; Perrig, A.; Bai, F.; Bellur, B. Floodingresilient Broadcast Authentication for VANET. In Proceedings of the 17th Annual International Conference on Mobile Computing and Networking (MobiCom), Las Vegas, NV, USA, 19–23 September 2011; pp. 193–204. [Google Scholar]
- Wang, M.; Liu, D.; Zhu, L.; Xu, Y.; Wang, F. LESPP: Lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication. J. Comput. 2016, 98, 685–708. [Google Scholar] [CrossRef]
- Rajput, U.; Abbas, F.; Oh, H. A Hierarchical Privacy Preserving Pseudonymous Authentication Protocol for VANET. IEEE Access 2016, 4, 7770–7784. [Google Scholar] [CrossRef]
- Cui, J.; Zhang, J.; Zhong, H.; Xu, Y. SPACF: A Secure Privacy-preserving Authentication Scheme for VANET with Cuckoo Filter. IEEE Trans. Veh. Technol. 2017, 66, 10283–10295. [Google Scholar] [CrossRef]
- Liu, Y.; Wang, Y.; Chang, G. Efficient Privacy-Preserving Dual Authentication and Key Agreement Scheme for Secure V2V Communications in an IoV Paradigm. IEEE Trans. Intell. Transp. Syst. 2017, 18, 2740–2749. [Google Scholar] [CrossRef]
- Manzano, M.; Espinosa, F.; Bravo-Santos, Á.M.; Gardel-Vicente, A. Cognitive Self-Scheduled Mechanism for Access Control in Noisy Vehicular Ad Hoc Networks. Math. Probl. Eng. 2015, 2015, 354292. [Google Scholar] [CrossRef]
- Mohammed, A.A.; Ahmed, A.A.; Kang, Y.J.; Lee, H.J. Obstacles Effects on Signal Attenuation in Line of Sight for Different Environments in V2V. In Proceedings of the 20th International Conference on Advanced Communication Technology (ICACT), Chuncheon-si Gangwon-do, Korea, 11–14 February 2018; pp. 17–20. [Google Scholar]
- Mohammed, A.A.; Ahmed, A.A.; Lee, H.J. V2V communication modeling for environmental channel throughput and radio propagation. In Proceedings of the 8th IEEE International Conference on ICTC Convergence, Jeju Island, Korea, 18–20 October 2017; pp. 507–512. [Google Scholar]
- Mohammed, A.A.; Ahmed, A.A.; Kim, T.; Lee, H.J. An Environmental Channel Throughput and Radio Propagation Modeling for Vehicle-to-Vehicle Communication. Int. J. Distrib. Sens. Netw. 2018, 14, 1–10. [Google Scholar]
- Mohammed, A.A.; Ahmed, A.A.; Lee, H.J. Performance Enriching Channel Allocation Algorithm for Vehicle-to-Vehicle City, Highway and Rural Network. Sensors 2019, 19, 3283. [Google Scholar]
- Mohammed, A.A.; Ahmed, A.A.; Hind, R.; Lee, H.J. A Novel Throughput and Collision for City Environment in V2V Communication. In Proceedings of the 10th IEEE International Conference on ICTC Convergence, Jeju Island, Korea, 16–18 October 2019; pp. 1413–1415. [Google Scholar]
- Bilgin, B.E.; Gungor, V.C. Performance Comparison of IEEE 802.11p and IEEE 802.11b for Vehicle-to-Vehicle Communications in Highway, Rural, and Urban Areas. Int. J. Veh. Technol. 2013, 2013, 971684. [Google Scholar] [CrossRef]
- Bazzi, A.; Zanella, A.; Masini, B.M. An OFDMA-Based MAC Protocol for Next-Generation VANETs. IEEE Trans. Veh. Technol. 2015, 64, 4088–4100. [Google Scholar] [CrossRef]
- Ferreira, N.F.G.C.; Fonseca, J.A.G. Improving Safety Message Delivery through RSU’s Coordination in Vehicular Networks. In Proceedings of the 2015 IEEE World Conference on Factory Communication Systems (WFCS), Palma de Mallorca, Spain, 27–29 May 2015; pp. 1–8. [Google Scholar]
- Chang, C.Y.; Yen, H.C.; Deng, D.J. V2V QoS Guaranteed Channel Access in IEEE 802.11p VANETs. IEEE Trans. Veh. Technol. 2015, 13, 5–17. [Google Scholar] [CrossRef]
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).