Secure Protocol For Inter-Vehicle Communication Networks
نویسندگان
چکیده
Security is the main concern in wireless communications. Future vehicles may use wireless Inter-Vehicle Communication (IVC) networks to exchange data among each other. IVC networks provide drivers with updated information on traffic and road conditions for efficient and safe driving. The main challenges in designing secure IVC networks are vehicle authentication and data integrity. Vehicle authentication requires IVC networks to verify that the information is sent and received by trusted vehicles. Data integrity requires IVC networks to verify that the safety-critical information will be exchanged among vehicles without illegitimate changes to their contents. In this paper, we propose a secure protocol for IVC networks. The protocol is based on the public key cryptography. Our protocol provides mutual authentication of vehicles and data integrity to IVC networks. The paper presents a detailed description of our protocol and its feasibility study in terms of processing time and latency.
منابع مشابه
Network Setup for Secure Routing in Inter-Vehicle Communication Networks
In Inter-Vehicle Communication (IVC) networks, the high mobility and lack of infrastructure pose major challenges in designing secure routing protocols. In this work, we present a new secure routing protocol called SERVEN (SEcure Routing in VEhicular Networks) that can achieve near-instantaneous secure communication in IVC networks. In particular, we concentrate on the design of the network set...
متن کاملAn Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks
Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the capacity of cellular networks and alleviate the heavy burden on backhaul links. However, dir...
متن کاملThird-order Decentralized Safe Consensus Protocol for Inter-connected Heterogeneous Vehicular Platoons
In this paper, the stability analysis and control design of heterogeneous traffic flow is considered. It is assumed that the traffic flow consists of infinite number of cooperative non-identical vehicular platoons. Two different networks are investigated in stability analysis of heterogeneous traffic flow: 1) inter-platoon network which deals with the communication topology of lead vehicles and...
متن کاملGSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملA Survey on User Authentication Services in Vehicular ad hoc Networks
Vehicular ad hoc networks(VANET) is the most widely used realization of mobile ad hoc networks (MANET). Vehicular communication was safety on roads, because million of lives were lost and much more injuries have been incurred due to car crashes. Safety messages which are of highest priority need to be delivered to the destination node on time to prevent from accidents. VANET have wide applicati...
متن کامل