A Secure Scheme for Vehicle-to-Vehicle (V2V) Routing Protocol

被引:1
作者
Alawieh, Mostafa [1 ]
Fahs, Walid [1 ]
Haydar, Jamal [1 ]
Chbib, Fadlallah [2 ]
Fadlallah, Ahmad [2 ]
机构
[1] Islam Univ Lebanon, Fac Engn, Lebanon, NH USA
[2] Inst Polytech Paris, Telecom Paris INFRES, LTCI, Paris, France
来源
2022 5TH CONFERENCE ON CLOUD AND INTERNET OF THINGS, CIOT | 2022年
关键词
Vehicle-to-Vehicle Communication; Ad-hoc On-demand Distance Vector; Security; Fabrication Attack;
D O I
10.1109/CIOT53061.2022.9766544
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Intelligent Transportation System (ITS) has witnessed some great advancements in the recent years increasing the drivers' safety and comfort. ITS offers for types of wireless communications: vehicle to vehicle (V2V), vehicle to Road-Side Unit (V2R), Vehicle to everything (V2X) and Vehicle to Infrastructure (V2I). The highly dynamic connections and the time sensitivity of ITS make it an eye-catching field for attackers. Moreover, Security dangers and vulnerabilities have increased as V2V communications have evolved. Vehicular communications are exposed to several vulnerabilities such as Denial of Service attacks (DOS), Black hole and fabrication attacks. Fabrication attacks involve a malicious vehicle that alters the packet's information, causing serious network damage such as congestion and high delay. We propose a new secure routing scheme aims at detecting malicious vehicles and eliminating them from the network. Each vehicle is monitored by its neighbors. We identify a malicious vehicle by detecting an asymmetric average between its inputs and outputs routing packets, and a delete message is sent throughout the network to eliminate the malicious car from the routing table. Simulations show that the proposed scheme has improved the performance and efficiency of the Ad-hoc On-demand Distance Vector (AODV) protocol with respect to end-to-end delay, throughput and packet delivery ratio.
引用
收藏
页码:1 / 8
页数:8
相关论文
共 50 条
  • [21] RMCCS: RSSI-based Message Consistency Checking Scheme for V2V Communications
    Muhammad, Mujahid
    Kearney, Paul
    Aneiba, Adel
    Arshad, Junaid
    Kunz, Andreas
    SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 722 - 727
  • [22] V2V Energy Trading Scheme Based on Collaborative Edge Computing and Lightning Network
    Jiang, Wenxian
    Guan, Zhenglei
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2024, 25 (11) : 18252 - 18263
  • [23] Secure V2V Communication with Identity-based Cryptography from License Plate Recognition
    Andreica, Tudor
    Groza, Bogdan
    2019 SIXTH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS: SYSTEMS, MANAGEMENT AND SECURITY (IOTSMS), 2019, : 366 - 373
  • [24] EAIA: An Efficient and Anonymous Identity Authentication Protocol for V2V Communications in Internet of Vehicles
    Du, Qianmin
    Zhou, Jianhong
    Ma, Maode
    2024 IEEE 5TH ANNUAL WORLD AI IOT CONGRESS, AIIOT 2024, 2024, : 0591 - 0597
  • [25] Secure Privacy-Preserving V2V Communication in 5G-V2X Supporting Network Slicing
    Mun, Hyeran
    Seo, Minhye
    Lee, Dong Hoon
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (09) : 14439 - 14455
  • [26] Dual-Signature Blockchain-Based Key Sharing Protocol for Secure V2V Communications in Multi-Domain IoV Environments
    Abbasinezhad-Mood, Dariush
    Ghaemi, Hadi
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2024, 25 (10) : 13407 - 13416
  • [27] Proven Secure Tree-Based Authenticated Key Agreement for Securing V2V and V2I Communications in VANETs
    Wei, Lu
    Cui, Jie
    Zhong, Hong
    Xu, Yan
    Liu, Lu
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2022, 21 (09) : 3280 - 3297
  • [28] A Novel Low-Latency V2V Resource Allocation Scheme Based on Cellular V2X Communications
    Abbas, Fakhar
    Fan, Pingzhi
    Khan, Zahid
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2019, 20 (06) : 2185 - 2197
  • [29] Secure V2V Communications in Relay-Assisted Cognitive Radio Vehicular Networks With Imperfect CSI
    Zhang, Yang
    Hou, Jun
    Zhao, Xiangmo
    IEEE TRANSACTIONS ON INTELLIGENT VEHICLES, 2024, 9 (01): : 2129 - 2138
  • [30] NextGenV2V: Authenticated V2V communication for next generation vehicular network using (2, n)-threshold scheme
    Kumar, Pankaj
    Om, Hari
    COMPUTER COMMUNICATIONS, 2024, 213 : 296 - 308