SCOOL: A Secure Traffic Congestion Control Protocol for VANETs

被引:0
|
作者
Younes, Maram Bani [1 ]
Boukerche, Azzedine [1 ]
机构
[1] Univ Ottawa, SITE, PARADISE Res Lab, DIVA Strateg Res Ctr, Ottawa, ON K1N 6N5, Canada
来源
2015 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC) | 2015年
关键词
Traffic Efficiency; Congestion Control; Authentication; Integrity; Privacy; Attacker;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Traffic efficiency applications are becoming increasingly popular over the road networks in the last few years. This type of applications aims mainly at increasing the traffic fluency over the road network, which minimizes the travel time of each vehicle towards its targeted destinations. The Vehicular Ad-Hoc Networks (VANETs) technology has been utilized to design these applications. Communications between vehicles, V2V, and between vehicles and installed Road Side Units (RSUs), V2I, helped designing these applications. Malicious, selfish and intruder drivers can take advantages of other cooperative drivers and use their trust. This paper introduces a Secure COngestion contrOL (SCOOL) protocol. This protocol aims to guarantee integrity and authenticity of transmitted data. It is designed to provide the security requirements of traffic efficiency protocols that have been proposed using the technology of VANETs. SCOOL also aims to preserve the privacy of the cooperative vehicles and drivers. From the experimental results we can infer that SCOOL detects the malicious nodes over the road network which enhances the correctness of the traffic efficiency applications.
引用
收藏
页码:1960 / 1965
页数:6
相关论文
共 50 条
  • [21] A Distributed Congestion Control Routing Protocol Based on Traffic Classification in LEO Satellite Networks
    Dai, Shiyue
    Rui, LanLan
    Chen, Shiyou
    Qiu, Xuesong
    2021 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM 2021), 2021, : 523 - 529
  • [22] Blockchain-Based Traffic Accident Handling Protocol Without Third Party for VANETs
    Xie, Qi
    Ding, Zixuan
    Xie, Qingyun
    Tan, Xiao
    He, Debiao
    Tang, Wen
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (19): : 31068 - 31079
  • [23] Information Congestion Control on Intersections in VANETs: A Bargaining Game Approach
    Chen, Chen
    Hu, Jinna
    Zhang, Jianfeng
    Sun, Canding
    Zhao, Liqiang
    Ren, Zhiyuan
    2016 IEEE 83RD VEHICULAR TECHNOLOGY CONFERENCE (VTC SPRING), 2016,
  • [24] TRCCTP: a Traffic Redirection based Congestion Control Transport Protocol for Wireless Sensor Networks
    Chand, Trilok
    Sharma, Bhisham
    Kour, Manpreet
    2015 IEEE SENSORS, 2015, : 1074 - 1077
  • [25] Communication Based Accident Avoidance and Congestion Control Mechanism in VANETs
    Roy, Alak
    Chakraborty, Jayasree
    2015 INTERNATIONAL SYMPOSIUM ON ADVANCED COMPUTING AND COMMUNICATION (ISACC), 2015, : 320 - 327
  • [26] Intelligent DoS Attack Detection with Congestion Control Technique for VANETs
    Gopi, R.
    Mathapati, Mahantesh
    Prasad, B.
    Ahmad, Sultan
    Al-Wesabi, Fahd N.
    Alohali, Manal Abdullah
    Hilal, Anwer Mustafa
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (01): : 141 - 156
  • [27] Troubleshooting solution for traffic congestion control
    Tong, Van
    Souihi, Sami
    Tran, Hai Anh
    Mellouk, Abdelhamid
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2024, 229
  • [28] Dual-Layer Congestion Control for Transmission Control Protocol Carried by Optical Packet Switching With User Data Protocol Background Traffic
    Lu, Zheng
    Hunter, David K.
    JOURNAL OF OPTICAL COMMUNICATIONS AND NETWORKING, 2009, 1 (02) : A1 - A16
  • [29] Improvement of congestion control for burst traffic
    Park, HW
    Chung, JW
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS I-V, 2000, : 1029 - 1033
  • [30] CRAFT: A New Secure Congestion Control Architecture
    Kim, Dongho
    Chiang, Jerry T.
    Hu, Yih-Chun
    Perrig, Adrian
    Kumar, P. R.
    PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 705 - 707