Skip to main content

Distributing Negative Messages in VANET Based on Meet-Table and Cloud Computing

  • Conference paper
  • First Online:
Wireless Algorithms, Systems, and Applications (WASA 2017)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 10251))

Abstract

A negative message defines the negative attributes of a vehicle. CRL (Certificate Revocation List) and black list are typical negative messages. Securely and efficiently distributing negative messages is essential to protect VANET (Vehicular Ad hoc Network) from attacks. We formally define coverage percentage as the availability of negative message, and accurate coverage percentage represents the efficiency of distributing negative messages. These two metrics jointly evaluate the performance of a negative message distributing method. Meet-Table in a vehicle or a RSU (Road Side Unit) records the encountered vehicles. A scheme based on Meet-Table and Cloud Computing is proposed to accurately distributing negative messages in VANET in this paper. An algorithm for distributing negative messages, and an algorithm for redistributing negative messages when its objective vehicle enters a new area are proposed within the scheme. Security analysis shows that the proposed scheme is secure against fake and holding on negative messages, DDoS (Distributed Denial of Service), and confusing Meet-Table attacks. Simulation results show that the proposed scheme, comparing to the RSU broadcasting and epidemic model, is the only one that achieve high coverage percentage and high accurate coverage percentage simultaneously.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zhu, H., Li, M., Fu, L., et al.: Impact of traffic influxes: revealing exponential intercontact time in urban VANETs. IEEE Trans. Parallel Distrib. Syst. 22(8), 1258–1266 (2011)

    Article  Google Scholar 

  2. Kakkasageri, M.S., Manvi, S.S.: Information management in vehicular ad hoc networks: a review. J. Netw. Comput. Appl. 39(3), 334–350 (2014)

    Article  Google Scholar 

  3. Farradyne, P.: Vehicle Infrastructure Integration-VII Architecture and Functional Requirements, v1.1. http://ral.ucar.edu/projects/vii.old/vii/docs/VIIArchandFuncRequirements.pdf

  4. Haas, J.J., Hu, Y.-C., Laberteaux, K.P.: Efficient certificate revocation list organization and distribution. IEEE J. Sel. Areas Commun. 29(3), 595–604 (2011)

    Article  Google Scholar 

  5. Huang, B., Mo, J., Lu, Q., Cheng, W.: Optimizing propagation network of certificate revocation in VANET with meet-table. In: Wang, G., Ray, I., Alcaraz Calero, J.M., Thampi, S.M. (eds.) SpaCCS 2016. LNCS, vol. 10067, pp. 147–154. Springer, Cham (2016). doi:10.1007/978-3-319-49145-5_15

    Chapter  Google Scholar 

  6. Gonzalez, M.C., Hidalgo, C.A., Barabasi, A.-L.: Understanding individual human mobility patterns. Nature 453(7196), 779–782 (2008)

    Article  Google Scholar 

  7. Tian, X., Huang, B., Wu, M.: A transparent middleware for encrypting data in MongoDB. In: 2014 IEEE Workshop on Electronics, Computer and Applications (IWECA 2014), Ottawa, Canada, pp. 906–909 (2014)

    Google Scholar 

  8. Yu, L., Shen, H., Sapra, K., et al.: CoRE: cooperative end-to-end traffic redundancy elimination for reducing cloud bandwidth cost. IEEE Trans. Parallel Distrib. Syst. 28(2), 446–461 (2017)

    Google Scholar 

  9. Yu, L., Cai, Z.: Dynamic scaling of virtualized networks with bandwidth guarantees in cloud datacenters. In: The 35th Annual IEEE International Conference on Computer Communications (INFOCOM), San Francisco, USA, pp. 1–9 (2016)

    Google Scholar 

  10. Ndashimye, E., Ray, S.K., Sarkar, N.I., et al.: Vehicle-to-infrastructure communication over multi-tier heterogeneous networks: a survey. Comput. Netw. 112, 144–166 (2017)

    Article  Google Scholar 

  11. Bouali, T., Senouci, S.-M., Sedjelmaci, H.: A distributed detection and prevention scheme from malicious nodes in vehicular networks. Int. J. Commun. Syst. 29(10), 1683–1704 (2016)

    Article  Google Scholar 

  12. Ding, J., Gao, J., Xiong, H.: Understanding and modelling information dissemination patterns in vehicle-to-vehicle networks. In: 23rd SIGSPATIAL International Conference on Advances in Geographic Information Systems, New York, NY, USA, pp. 1–10 (2015)

    Google Scholar 

  13. Naumov, V., Baumann, R., Gross, T.: An evaluation of inter-vehicle ad hoc networks based on realistic vehicular traces. In: 7th ACM International Symposium on Mobile Ad Hoc Networking and Computing, Florence, Italy, pp. 595–604 (2006)

    Google Scholar 

  14. SFMTA: San Francisco Transportation Fact Sheet. https://www.sfmta.com/sites/default/files/2013%20SAN%20FRANCISCO%20TRANSPORTATION%20FACT%20SHEET.pdf

  15. Reisman, W.: Commute speeds have slowed down for San Francisco drivers. http://archives.sfexaminer.com/sanfrancisco/commute-speeds-have-slowed-down-for-san-francisco-drivers/Content?oid=2187521

  16. Engoulou, R.G., Bellaïche, M., Pierre, S., et al.: VANET security surveys. Comput. Commun. 44(2), 1–13 (2014)

    Article  Google Scholar 

  17. Chokhani, S.: Toward a national public key infrastructure. IEEE Commun. Mag. 9, 70–74 (1994)

    Article  Google Scholar 

  18. Yeh, Y.-S., Lai, W.-S., Cheng, C.-J.: Applying lightweight directory access protocol service on session certification authority. Comput. Netw. 38(5), 675–692 (2002)

    Article  Google Scholar 

  19. Hormann, T.P., Wrona, K., Holtmanns, S.: Evaluation of certificate validation mechanisms. Comput. Commun. 29(3), 291–305 (2006)

    Article  Google Scholar 

  20. Cunha, F.D., Vianna, A.C., Mini, R.A.F., et al.: Are vehicular networks small world? In: IEEE Conference on Computer Communications Workshops, ON, Canada, pp. 195–196 (2014)

    Google Scholar 

  21. Zhang, H., Lia, J.: Modeling and dynamical topology properties of VANET based on complex networks theory. AIP Adv. 5, 1–11 (2015)

    Google Scholar 

  22. Wang, X., Guo, L., Ai, C., Li, J., Cai, Z.: An urban area-oriented traffic information query strategy in VANETs. In: Ren, K., Liu, X., Liang, W., Xu, M., Jia, X., Xing, K. (eds.) WASA 2013. LNCS, vol. 7992, pp. 313–324. Springer, Heidelberg (2013). doi:10.1007/978-3-642-39701-1_26

    Chapter  Google Scholar 

Download references

Acknowledgments

This work was supported by National Natural Science Foundation of China under Grant No. 61262072.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wei Cheng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Huang, B., Cheng, W. (2017). Distributing Negative Messages in VANET Based on Meet-Table and Cloud Computing. In: Ma, L., Khreishah, A., Zhang, Y., Yan, M. (eds) Wireless Algorithms, Systems, and Applications. WASA 2017. Lecture Notes in Computer Science(), vol 10251. Springer, Cham. https://doi.org/10.1007/978-3-319-60033-8_56

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-60033-8_56

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-60032-1

  • Online ISBN: 978-3-319-60033-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics