Security for Vehicular Ad Hoc Networks

A special issue of Future Internet (ISSN 1999-5903). This special issue belongs to the section "Cybersecurity".

Deadline for manuscript submissions: closed (29 February 2024) | Viewed by 6265

Special Issue Editor


E-Mail Website
Guest Editor
Department of Computer Science and Information Engineering, China University of Technology, Taipei 116, Taiwan
Interests: VANET; Network security; Mobile computing; IoT
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

VANET has recently emerged as a hot research topic, though there are various challenges associated with it that still require a solution, such as how to build an efficient and secure network framework in VANETs, how to place authentication servers to serve a massive number of users, and how to design offloading strategies for vehicles to boost system performance. At present, there are many national and international projects in government, industry, and academia devoted to VANET. The goal of this Special Issue is to present and discuss recent security issues of vehicular ad hoc network (VANET) technologies. Areas of interest include but are not limited to:

  • Attacks and threats of VANET;
  • Risk and security assessment of VANET;
  • Safety and non-safety applications;
  • Secure V2V/V2I/V2X communication;
  • Security issues and countermeasures;
  • Privacy issues;
  • Intrusion detection in VANET.

Dr. Ming-Chin Chuang
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Future Internet is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • VANET
  • secure communication
  • authentication
  • privacy

Published Papers (3 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

19 pages, 6121 KiB  
Article
Threshold Cryptography-Based Secure Vehicle-to-Everything (V2X) Communication in 5G-Enabled Intelligent Transportation Systems
by Nuwan Weerasinghe, Muhammad Arslan Usman, Chaminda Hewage, Eckhard Pfluegel and Christos Politis
Future Internet 2023, 15(5), 157; https://doi.org/10.3390/fi15050157 - 23 Apr 2023
Cited by 1 | Viewed by 1861
Abstract
Implementing 5G-enabled Vehicle-to-Everything (V2X) intelligent transportation systems presents a promising opportunity to enhance road safety and traffic flow while facilitating the integration of artificial intelligence (AI) based solutions. Yet, security and privacy concerns pose significant challenges that must be addressed. Therefore, researchers have [...] Read more.
Implementing 5G-enabled Vehicle-to-Everything (V2X) intelligent transportation systems presents a promising opportunity to enhance road safety and traffic flow while facilitating the integration of artificial intelligence (AI) based solutions. Yet, security and privacy concerns pose significant challenges that must be addressed. Therefore, researchers have focused on improving the security and integrity of vehicle data sharing, with a particular emphasis on V2X application layer security and privacy requirements. This is crucial given that V2X networks can consist of vehicles manufactured by different companies and registered in various jurisdictions, which may only be within communication range for a few seconds. Thus, it is necessary to establish a trusting relationship between vehicles quickly. The article proposes a threshold cryptography-based key exchange protocol that meets the key requirements for V2X data sharing and privacy, including the rapid establishment of trust, the maintenance of vehicle anonymity, and the provision of secure messages. To evaluate the feasibility and performance of the proposed protocol, a tailored testbed that leverages the NS-3 network simulator, a commercial 5G network, and public cloud infrastructure is used. Overall, the proposed protocol provides a potential solution for addressing security and privacy concerns in V2X networks, which is essential for successfully implementing and adopting this technology. Full article
(This article belongs to the Special Issue Security for Vehicular Ad Hoc Networks)
Show Figures

Figure 1

13 pages, 1866 KiB  
Article
A V2V Identity Authentication and Key Agreement Scheme Based on Identity-Based Cryptograph
by Qiang Li
Future Internet 2023, 15(1), 25; https://doi.org/10.3390/fi15010025 - 3 Jan 2023
Cited by 3 | Viewed by 1672
Abstract
Cellular vehicle to everything (C-V2X) is a technology to achieve vehicle networking, which can improve traffic efficiency and traffic safety. As a special network, the C-V2X system faces many security risks. The vehicle to vehicle (V2V) communication transmits traffic condition data, driving path [...] Read more.
Cellular vehicle to everything (C-V2X) is a technology to achieve vehicle networking, which can improve traffic efficiency and traffic safety. As a special network, the C-V2X system faces many security risks. The vehicle to vehicle (V2V) communication transmits traffic condition data, driving path data, user driving habits data, and so on. It is necessary to ensure the opposite equipment is registered C-V2X equipment (installed in the vehicle), and the data transmitted between the equipment is secure. This paper proposes a V2V identity authentication and key agreement scheme based on identity-based cryptograph (IBC). The C-V2X equipment use its vehicle identification (VID) as its public key. The key management center (KMC) generates a private key for the C-V2X equipment according to its VID. The C-V2X equipment transmit secret data encrypted with the opposite equipment public key to the other equipment, they authenticate each other through a challenge response protocol based on identity-based cryptography, and they negotiate the working key used to encrypt the communication data. The scheme can secure the V2V communication with low computational cost and simple architecture and meet the lightweight and efficient communication requirements of the C-V2X system. Full article
(This article belongs to the Special Issue Security for Vehicular Ad Hoc Networks)
Show Figures

Figure 1

11 pages, 1419 KiB  
Article
A New Scheme for Detecting Malicious Nodes in Vehicular Ad Hoc Networks Based on Monitoring Node Behavior
by Muhsen Alkhalidy, Atalla Fahed Al-Serhan, Ayoub Alsarhan and Bashar Igried
Future Internet 2022, 14(8), 223; https://doi.org/10.3390/fi14080223 - 26 Jul 2022
Cited by 11 | Viewed by 1681
Abstract
Vehicular ad hoc networks have played a key role in intelligent transportation systems that considerably improve road safety and management. This new technology allows vehicles to communicate and share road information. However, malicious users may inject false emergency alerts into vehicular ad hoc [...] Read more.
Vehicular ad hoc networks have played a key role in intelligent transportation systems that considerably improve road safety and management. This new technology allows vehicles to communicate and share road information. However, malicious users may inject false emergency alerts into vehicular ad hoc networks, preventing nodes from accessing accurate road information. In order to assure the reliability and trustworthiness of information through the networks, assessing the credibility of nodes has become a critical task in vehicular ad hoc networks. A new scheme for malicious node detection is proposed in this work. Multiple factors are fed into a fuzzy logic model for evaluating the trust for each node. Vehicles are divided into clusters in our approach, and a road side unit manages each cluster. The road side unit assesses the credibility of nodes before accessing vehicular ad hoc networks. The road side unit evicts a malicious node based on trust value. Simulations are used to validate our technique. We demonstrate that our scheme can detect and evict all malicious nodes in the vehicular ad hoc network over time, lowering the ratio of malicious nodes. Furthermore, it has a positive impact on selfish node participation. The scheme increases the success rate of delivered data to the same level as the ideal cases when no selfish node is present. Full article
(This article belongs to the Special Issue Security for Vehicular Ad Hoc Networks)
Show Figures

Figure 1

Back to TopTop