Abstract
In this work concentrated confirmation security among the V2V correspondence. The paper anticipates an effectual RTSP protocol that combines the Internet of things, cloud with specialist innovation into one stage where it manages secure correspondence and interfaces between the huge measure of decentralized and heterogeneously conveyed devices in IoT. Subsequently our proposed work is for decreasing blockage, following articles, traffic the executives, directing, and keeping away from clog. This design starts the usage of Road Side Unit (RSU), Central Cloud Layer (CCL), and Vehicular Cloud Layer (VCL), with sensor innovations, IoT based vehicular data frameworks, Vehicular cloud-based Ad-hoc networks where the traffic objects are addressed, followed over the web. In recent years the vehicle AdHoc network plays a vital role in smart vehicles monitoring, tracking, and sharing of location-based information. The VANET communication occurs among the vehicles -to- vehicles(V2V) and Vehicles-to-infrastructure(V2I). The communication message provides information on traffic and critical road events for each vehicle's comfortable driving. Smart transport involves smart sensors and the internet of things vehicles (IoTV). The wide range of data has been outsourced from IoTV for efficient monitoring with a cloud environment adapted for vehicles cloud. There has been plenty of security issues among the VANET and IoTV due to multiuser and open access channel transmission there has been plenty of VANET protocol delivered for secure smart vehicles transmission technology. various security issues have been concentrated, the issues like authentication, integrity, non-reputation, confidentiality, and availability have been the major vulnerable security threads. In this work concentrated authentication security among the V2V communication. This examination offers a useful structure for checking appropriated directing for vehicles, blockage shirking, and traffic the executives, etc. Broad reenactment is done in MATLAB climate, which shows a superior compromise as opposed to traditional methods.
Similar content being viewed by others
Code availability
The high weight piece of implementation as shown in Appendix 1.
References
Biswas, S., Miˇsi'c, J., Miˇsi'c, V., (2012). DDoS attack on WAVEenabled VANET through synchronization. In Proceedings of the global communications conference (GLOBECOM), Anaheim, CA, USA. pp. 1079–1084.
Wang, Y., Zhong, H., Xu, Y., & Cui, J. (2016). ECPB: Efficient conditional privacy-preserving authentication scheme supporting batch verification for VANETs. International Journal of Network Security, 18(2), 374–382.
Wang, Z., (2017) A privacy-preserving and accountable authentication protocol for IoT end-devices with weaker identity. Future Generation Computer Systems, in press.
Shen, J., Chang, S., Shen, J., Liu, Q., & Sun, X. (2016). A lightweight multi-layer authentication protocol for wireless body area networks. Future Generation Computer Systems, 78(3), 956–963.
Lee, C. C., & Lai, Y. M. (2013). Toward a secure batch verification with group testing for VANET. Wireless Networks, 19(6), 1441–1449.
Bayat, M., Barmshoory, M., Rahimi, M., & Aref, M. R. (2015). A secure authentication scheme for VANETs with batch verification. Wireless Networks, 21(5), 1733–1743.
Jiang, S., Zhu, X., & Wang, L. (2016). An efficient anonymous batch authentication scheme based on HMAC for VANETs. IEEE Transactions on Intelligent Transportation Systems, 17(8), 2193–2204.
Azees, M., Vijayakumar, P., & Deboarh, L. J. (2017). EAAP: Efficient anonymous authentication with a conditional privacy-preserving scheme for vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems, 18(9), 2467–2476.
Xie, Y., Wu, L. B., Shen, J., & Alelaiwi, A. (2017). EIASCP: New efficient identity-based authentication scheme with conditional privacy-preserving for VANETs. Telecommunication Systems, 65(2), 229–240.
Lo, N. W., & Tsai, J. L. (2016). An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings. IEEE Transactions on Intelligent Transportation Systems, 17(5), 1319–1328.
Karagiannis, G., Altintas, O., Ekici, E., Heijenk, G., Jarupan, B., Lin, K., & Weil, T. (2011). Vehicular networking: A survey and tutorial on requirements, architectures, challenges, standards, and solutions. IEEE Communications Surveys & Tutorials, 13, 584–616.
Wang, X.O, Cheng, W., Mohapatra, P., Abdelzaher, T.F. (2013) Artsense: Anonymous reputation and trust in participatory sensing. In Proceedings of the IEEE INFOCOM 2013, Turin, Italy, 14–19 April; pp. 2517–2525.
Zhu, X., Jiang, S., Wang, L., & Li, H. (2014). Efficient privacy-preserving authentication for vehicular ad hoc networks. IEEE Transactions on Vehicular Technology, 63, 907–919.
Jiang, S., Zhu, X., & Wang, L. (2016). An efficient anonymous batch authentication scheme based on hmac for vanets. IEEE Transactions on Intelligent Transportation Systems, 17, 2193–2204.
Xia, H., Jia, Z., & Sha, E. H. (2014). Research of trust model based on fuzzy theory in mobile ad hoc networks. Information Security Secure., 8, 88–103.
Cho, J. H., Swami, A., & Chen, I. R. (2011). A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys & Tutorials, 13, 562–583.
Govindan, K., & Mohapatra, P. (2012). Trust computations and trust dynamics in mobile Adhoc networks: A survey. IEEE Communications Surveys & Tutorials, 14, 279–298.
Liu, G., Yang, Q., Wang, H., Lin, X., Wittie, M. P. (2014) Assessment of multi-hop interpersonal trust in social networks by three-valued subjective logic. In Proceedings of the IEEE INFOCOM 2014—IEEE Conference on Computer Communications, Toronto, ON, Canada, April 27–May 2,; pp.1698–1706.
Hao, H., Lu, R., Cheng, H., & Zhang, Z. (2016). Tripsense: A trust-based vehicular platoon crowdsensing scheme with privacy preservation in vanets. Sensors, 16, 803–2016.
Hu, H., Lu, R., Zhang, Z., & Shao, J. (2017). Replace: A reliable trust-based platoon service recommendation scheme in vanet. IEEE Transactions on Vehicular Technology, 66, 1786–1797.
Hafez, A., Xu, Y., (2015) Exploiting the beta distribution- based reputation model in recommender system. In Proceedings of the Australasian joint conference on artificial intelligence, Canberra, ACT, Australia, November 30–December 4, 2015; Springer: Cham, Switzerland, pp. 1–13.
Zhang, C., Zhu, X., Song, Y., Fang, Y., (2010) A formalstudy of trust-based routing in wireless ad hoc networks. In Proceedings of the IEEE INFOCOM, San Diego, CA, USA. pp. 1–9.
Perkins, C.E., Royer, E. M. (1999) Ad-Hoc on-demand distance vector routing. In Proceedings of the IEEE workshop on mobile computing systems and applications WMCSA ’99, New Orleans, LA, USA, 25–26 February; pp. 90–100.
Xia, H., Jia, Z., Li, X., Ju, L., & Sha, E. H. (2013). Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Networks, 11, 2096–2114.
Morano, P., Tajani, F., & Locurcio, M. (2017). GIS application and econometric analysis for the verification of the financial feasibility of roof-top wind turbines in the city of Bari (Italy). Renewable and Sustainable Energy Reviews, 70, 999–1010.
Liu, Y., Ma, J., Niu, J., Zhang, Y., Wang, W (2013) Roadside unit’s deployment for content downloading in vehicular networks. In Proceedings of the IEEE international conference on communications (ICC), Budapest, Hungary, 9–13 June; pp. 6365–6370.
Trullols, O., Fiore, M., Casetti, C., Chiasserini, C., & Ordinas, J. B. (2010). Planning roadside infrastructure for information dissemination in intelligent transportation systems. Computer Communications, 33, 432–442.
Kim, D., Velasco, Y., Wang, W., Uma, R., Hussain, R., & Lee, S. (2017). A New comprehensive RSU installation strategy for cost-efficient VANET deployment. IEEE Transactions on Vehicular Technology, 66, 4200–4211.
Jo, Y., Jeong, J. (2016) RPA: Road-side units placement algorithm for multihop data delivery in vehicular networks. In Proceedings of the 30th international conference on advanced information networking and applicationsworkshops (WAINA), Crans-Montana, Switzerland pp. 262–266.
Zhang, B., Zhu, G., Xu, S., Zhang, N. (2015) Energyefficient roadside unit’s deployment in Vehicular Ad hoc Networks. In Proceedings of the 6th international conference on wireless, mobile, and multi-media (ICWMMN).
Palaniswamy, B., Camtepe, S., Foo, E., Simpson, L., Baee, M. A. R., & Pieprzyk, J. (2020). Continuous authentication for VANET. Vehicular Communications, 25, 100255.
Pournaghi, S. M., Zahednejad, B., Bayat, M., & Farjami, Y. (2018). NECPPA: A novel and efficient conditional privacy-preserving authentication scheme for VANET. Computer Networks, 134, 78–92.
de Sales, T., Bruno, M., Perkusich, A., Melo, L., de Sales, H., de Almeida, O., Soares, G., & de Sales, M. (2016). ASAP-V: A privacy-preserving authentication and sybil detection protocol for VANETs. Information Sciences, 372, 208–224.
Hussaina, R., Hussainb, F., & Zeadallyc, S., (2019). Integration of VANET and 5G security: A review of design and implementation issues. Future Generation Computer Systems, 101(2019), 843–864.
Sodhro, A. H., Pirbhulal, S., Sodhro, G. H., Muzammal, M., Zongwei, L., Gurtov, A., de Antônio-Roberto, L. M., Wang, L., Garcia, N. M., & de Albuquerque, V. H. C. (2020). Towards 5G-enabled self adaptive green and reliable communication in intelligent transportation system. IEEE Transactions on Intelligent Transportation Systems. https://doi.org/10.1109/TITS.2020.3019227.
Pirbhulal, S., Zhang, H., Alahi, M. E. E., Ghayvat, H., Mukhopadhyay, S. C., Zhang, Y.-T., & Wu, W. (2017). A novel secure IoT-based smart home automation system using a wireless sensor network. Sensors, 17(1), 69.
Pirbhulal, S., Wu, W., Muhammad, K., Mehmood, I., Li, G., & de Albuquerque, V. H. C. (2020). Mobility enabled security for optimizing IoT based intelligent applications. IEEE Network, 34(2), 72–77.
Funding
Not applicable.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendix
Appendix
Rights and permissions
About this article
Cite this article
Peter, M.N., Rani, M.P. V2V Communication and Authentication: The Internet of Things Vehicles(Iotv). Wireless Pers Commun 120, 231–247 (2021). https://doi.org/10.1007/s11277-021-08449-5
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-021-08449-5