Skip to main content

Advertisement

Log in

V2V Communication and Authentication: The Internet of Things Vehicles(Iotv)

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In this work concentrated confirmation security among the V2V correspondence. The paper anticipates an effectual RTSP protocol that combines the Internet of things, cloud with specialist innovation into one stage where it manages secure correspondence and interfaces between the huge measure of decentralized and heterogeneously conveyed devices in IoT. Subsequently our proposed work is for decreasing blockage, following articles, traffic the executives, directing, and keeping away from clog. This design starts the usage of Road Side Unit (RSU), Central Cloud Layer (CCL), and Vehicular Cloud Layer (VCL), with sensor innovations, IoT based vehicular data frameworks, Vehicular cloud-based Ad-hoc networks where the traffic objects are addressed, followed over the web. In recent years the vehicle AdHoc network plays a vital role in smart vehicles monitoring, tracking, and sharing of location-based information. The VANET communication occurs among the vehicles -to- vehicles(V2V) and Vehicles-to-infrastructure(V2I). The communication message provides information on traffic and critical road events for each vehicle's comfortable driving. Smart transport involves smart sensors and the internet of things vehicles (IoTV). The wide range of data has been outsourced from IoTV for efficient monitoring with a cloud environment adapted for vehicles cloud. There has been plenty of security issues among the VANET and IoTV due to multiuser and open access channel transmission there has been plenty of VANET protocol delivered for secure smart vehicles transmission technology. various security issues have been concentrated, the issues like authentication, integrity, non-reputation, confidentiality, and availability have been the major vulnerable security threads. In this work concentrated authentication security among the V2V communication. This examination offers a useful structure for checking appropriated directing for vehicles, blockage shirking, and traffic the executives, etc. Broad reenactment is done in MATLAB climate, which shows a superior compromise as opposed to traditional methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Code availability

The high weight piece of implementation as shown in Appendix 1.

References

  1. Biswas, S., Miˇsi'c, J., Miˇsi'c, V., (2012). DDoS attack on WAVEenabled VANET through synchronization. In Proceedings of the global communications conference (GLOBECOM), Anaheim, CA, USA. pp. 1079–1084.

  2. Wang, Y., Zhong, H., Xu, Y., & Cui, J. (2016). ECPB: Efficient conditional privacy-preserving authentication scheme supporting batch verification for VANETs. International Journal of Network Security, 18(2), 374–382.

    Google Scholar 

  3. Wang, Z., (2017) A privacy-preserving and accountable authentication protocol for IoT end-devices with weaker identity. Future Generation Computer Systems, in press.

  4. Shen, J., Chang, S., Shen, J., Liu, Q., & Sun, X. (2016). A lightweight multi-layer authentication protocol for wireless body area networks. Future Generation Computer Systems, 78(3), 956–963.

    Google Scholar 

  5. Lee, C. C., & Lai, Y. M. (2013). Toward a secure batch verification with group testing for VANET. Wireless Networks, 19(6), 1441–1449.

    Article  Google Scholar 

  6. Bayat, M., Barmshoory, M., Rahimi, M., & Aref, M. R. (2015). A secure authentication scheme for VANETs with batch verification. Wireless Networks, 21(5), 1733–1743.

    Article  Google Scholar 

  7. Jiang, S., Zhu, X., & Wang, L. (2016). An efficient anonymous batch authentication scheme based on HMAC for VANETs. IEEE Transactions on Intelligent Transportation Systems, 17(8), 2193–2204.

    Article  Google Scholar 

  8. Azees, M., Vijayakumar, P., & Deboarh, L. J. (2017). EAAP: Efficient anonymous authentication with a conditional privacy-preserving scheme for vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems, 18(9), 2467–2476.

    Article  Google Scholar 

  9. Xie, Y., Wu, L. B., Shen, J., & Alelaiwi, A. (2017). EIASCP: New efficient identity-based authentication scheme with conditional privacy-preserving for VANETs. Telecommunication Systems, 65(2), 229–240.

    Article  Google Scholar 

  10. Lo, N. W., & Tsai, J. L. (2016). An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings. IEEE Transactions on Intelligent Transportation Systems, 17(5), 1319–1328.

    Article  Google Scholar 

  11. Karagiannis, G., Altintas, O., Ekici, E., Heijenk, G., Jarupan, B., Lin, K., & Weil, T. (2011). Vehicular networking: A survey and tutorial on requirements, architectures, challenges, standards, and solutions. IEEE Communications Surveys & Tutorials, 13, 584–616.

    Article  Google Scholar 

  12. Wang, X.O, Cheng, W., Mohapatra, P., Abdelzaher, T.F. (2013) Artsense: Anonymous reputation and trust in participatory sensing. In Proceedings of the IEEE INFOCOM 2013, Turin, Italy, 14–19 April; pp. 2517–2525.

  13. Zhu, X., Jiang, S., Wang, L., & Li, H. (2014). Efficient privacy-preserving authentication for vehicular ad hoc networks. IEEE Transactions on Vehicular Technology, 63, 907–919.

    Article  Google Scholar 

  14. Jiang, S., Zhu, X., & Wang, L. (2016). An efficient anonymous batch authentication scheme based on hmac for vanets. IEEE Transactions on Intelligent Transportation Systems, 17, 2193–2204.

    Article  Google Scholar 

  15. Xia, H., Jia, Z., & Sha, E. H. (2014). Research of trust model based on fuzzy theory in mobile ad hoc networks. Information Security Secure., 8, 88–103.

    Google Scholar 

  16. Cho, J. H., Swami, A., & Chen, I. R. (2011). A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys & Tutorials, 13, 562–583.

    Article  Google Scholar 

  17. Govindan, K., & Mohapatra, P. (2012). Trust computations and trust dynamics in mobile Adhoc networks: A survey. IEEE Communications Surveys & Tutorials, 14, 279–298.

    Article  Google Scholar 

  18. Liu, G., Yang, Q., Wang, H., Lin, X., Wittie, M. P. (2014) Assessment of multi-hop interpersonal trust in social networks by three-valued subjective logic. In Proceedings of the IEEE INFOCOM 2014—IEEE Conference on Computer Communications, Toronto, ON, Canada, April 27–May 2,; pp.1698–1706.

  19. Hao, H., Lu, R., Cheng, H., & Zhang, Z. (2016). Tripsense: A trust-based vehicular platoon crowdsensing scheme with privacy preservation in vanets. Sensors, 16, 803–2016.

    Article  Google Scholar 

  20. Hu, H., Lu, R., Zhang, Z., & Shao, J. (2017). Replace: A reliable trust-based platoon service recommendation scheme in vanet. IEEE Transactions on Vehicular Technology, 66, 1786–1797.

    Article  Google Scholar 

  21. Hafez, A., Xu, Y., (2015) Exploiting the beta distribution- based reputation model in recommender system. In Proceedings of the Australasian joint conference on artificial intelligence, Canberra, ACT, Australia, November 30–December 4, 2015; Springer: Cham, Switzerland, pp. 1–13.

  22. Zhang, C., Zhu, X., Song, Y., Fang, Y., (2010) A formalstudy of trust-based routing in wireless ad hoc networks. In Proceedings of the IEEE INFOCOM, San Diego, CA, USA. pp. 1–9.

  23. Perkins, C.E., Royer, E. M. (1999) Ad-Hoc on-demand distance vector routing. In Proceedings of the IEEE workshop on mobile computing systems and applications WMCSA ’99, New Orleans, LA, USA, 25–26 February; pp. 90–100.

  24. Xia, H., Jia, Z., Li, X., Ju, L., & Sha, E. H. (2013). Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Networks, 11, 2096–2114.

    Article  Google Scholar 

  25. Morano, P., Tajani, F., & Locurcio, M. (2017). GIS application and econometric analysis for the verification of the financial feasibility of roof-top wind turbines in the city of Bari (Italy). Renewable and Sustainable Energy Reviews, 70, 999–1010.

    Article  Google Scholar 

  26. Liu, Y., Ma, J., Niu, J., Zhang, Y., Wang, W (2013) Roadside unit’s deployment for content downloading in vehicular networks. In Proceedings of the IEEE international conference on communications (ICC), Budapest, Hungary, 9–13 June; pp. 6365–6370.

  27. Trullols, O., Fiore, M., Casetti, C., Chiasserini, C., & Ordinas, J. B. (2010). Planning roadside infrastructure for information dissemination in intelligent transportation systems. Computer Communications, 33, 432–442.

    Article  Google Scholar 

  28. Kim, D., Velasco, Y., Wang, W., Uma, R., Hussain, R., & Lee, S. (2017). A New comprehensive RSU installation strategy for cost-efficient VANET deployment. IEEE Transactions on Vehicular Technology, 66, 4200–4211.

    Google Scholar 

  29. Jo, Y., Jeong, J. (2016) RPA: Road-side units placement algorithm for multihop data delivery in vehicular networks. In Proceedings of the 30th international conference on advanced information networking and applicationsworkshops (WAINA), Crans-Montana, Switzerland pp. 262–266.

  30. Zhang, B., Zhu, G., Xu, S., Zhang, N. (2015) Energyefficient roadside unit’s deployment in Vehicular Ad hoc Networks. In Proceedings of the 6th international conference on wireless, mobile, and multi-media (ICWMMN).

  31. Palaniswamy, B., Camtepe, S., Foo, E., Simpson, L., Baee, M. A. R., & Pieprzyk, J. (2020). Continuous authentication for VANET. Vehicular Communications, 25, 100255.

    Article  Google Scholar 

  32. Pournaghi, S. M., Zahednejad, B., Bayat, M., & Farjami, Y. (2018). NECPPA: A novel and efficient conditional privacy-preserving authentication scheme for VANET. Computer Networks, 134, 78–92.

    Article  Google Scholar 

  33. de Sales, T., Bruno, M., Perkusich, A., Melo, L., de Sales, H., de Almeida, O., Soares, G., & de Sales, M. (2016). ASAP-V: A privacy-preserving authentication and sybil detection protocol for VANETs. Information Sciences, 372, 208–224.

    Article  Google Scholar 

  34. Hussaina, R., Hussainb, F., & Zeadallyc, S., (2019). Integration of VANET and 5G security: A review of design and implementation issues. Future Generation Computer Systems, 101(2019), 843–864.

    Article  Google Scholar 

  35. Sodhro, A. H., Pirbhulal, S., Sodhro, G. H., Muzammal, M., Zongwei, L., Gurtov, A., de Antônio-Roberto, L. M., Wang, L., Garcia, N. M., & de Albuquerque, V. H. C. (2020). Towards 5G-enabled self adaptive green and reliable communication in intelligent transportation system. IEEE Transactions on Intelligent Transportation Systems. https://doi.org/10.1109/TITS.2020.3019227.

    Article  Google Scholar 

  36. Pirbhulal, S., Zhang, H., Alahi, M. E. E., Ghayvat, H., Mukhopadhyay, S. C., Zhang, Y.-T., & Wu, W. (2017). A novel secure IoT-based smart home automation system using a wireless sensor network. Sensors, 17(1), 69.

    Google Scholar 

  37. Pirbhulal, S., Wu, W., Muhammad, K., Mehmood, I., Li, G., & de Albuquerque, V. H. C. (2020). Mobility enabled security for optimizing IoT based intelligent applications. IEEE Network, 34(2), 72–77.

    Article  Google Scholar 

Download references

Funding

Not applicable.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mary N. Peter.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendix

Appendix

figure d

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Peter, M.N., Rani, M.P. V2V Communication and Authentication: The Internet of Things Vehicles(Iotv). Wireless Pers Commun 120, 231–247 (2021). https://doi.org/10.1007/s11277-021-08449-5

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-08449-5

Keywords

Navigation