scholarly journals Security-aware dual-hop communication for amplify-and-forward relay networks

2019 ◽  
Vol 15 (9) ◽  
pp. 155014771987807
Author(s):  
Fei Ding ◽  
Xiaojun Sun ◽  
Xiaojin Ding ◽  
Ruoyu Su ◽  
Dengyin Zhang ◽  
...  

The authentication scheme for vehicular ad hoc networks aims to improve the security and integrity of message delivery. The base station manages a large number of vehicular nodes, so the security communications are non-trivial. In this article, we propose an amplify-and-forward strategy for a dual-hop cooperative network in order to improve secure communications for vehicular ad hoc networks. We assume that each vehicular node equipped with a single antenna and derive closed-form expressions for the secure communication rate calculation. Moreover, we propose a cooperative strategy by jointly considering average power scaling and instantaneous power scaling, which are proved to be able to achieve information security. The simulation result shows that the proposed scheme can achieve better performance in scenarios with different signal-to-noise ratio.

2016 ◽  
pp. 105-108
Author(s):  
Chia-Ho Ou ◽  
Chih-Feng Chao ◽  
Wei-Pu He ◽  
Chong-Min Gao

Sensors ◽  
2022 ◽  
Vol 22 (2) ◽  
pp. 643
Author(s):  
Muhammad Bilal Latif ◽  
Feng Liu ◽  
Kai Liu

An autonomous driving environment poses a very stringent requirement for the timely delivery of safety messages in vehicular ad hoc networks (VANETs). Time division multiple access (TDMA)-based medium access control (MAC) protocols are considered a promising solution because of their time-bound message delivery. However, in the event of mobility-caused packet collisions, they may experience an unpredicted and extended delay in delivering messages, which can cause catastrophic accidents. To solve this problem, a distributed TDMA-based MAC protocol with mobility-caused collision mitigation (MCCM-MAC) is presented in this paper. The protocol uses a novel mechanism to detect merging collisions and mitigates them by avoiding subsequent access collisions. One vehicle in the merging collisions retains the time slot, and the others release the slot. The common neighboring vehicles can timely suggest a suitable new time slot for the vacating vehicles, which can avoid access collisions between their packet transmissions. A tie-breakup mechanism is employed to avoid further access collisions. Simulation results show that the proposed protocol reduces packet loss more than the existing methods. Consequently, the average delay between the successfully delivered periodic messages is also reduced.


2021 ◽  
Vol 7 (2) ◽  
Author(s):  
Akshay Kumar MV ◽  
Amogh C ◽  
Bhuvan S Kashyap ◽  
Drupad N Maharaj ◽  
Shazia Sultana

India accounts for the highest road accidents and traffic congestion globally. The necessity for a canny vehicle framework is of great importance. VANET, abbreviated as Vehicular ad hoc networks is a network created in an ad hoc manner where different vehicles can exchange useful information among each other with dedicated servers ensuring safe travel. Security in VANET has always been a challenge in implementing a real time intelligent transport system. VANET is a type of mobile ad-hoc, to give correspondences among close by vehicles and among vehicles and close by fixed hardware. Vehicular ad hoc networks are highly dynamic in nature and suffer from frequent path breakage due to the high velocity of the moving vehicle. Hence, there are many security challenges and different types of attacks that makes VANETs less secure. Therefore, providing secure dedicated short-range communication (DSRC) easefully with any loss of data or malicious nodes has been a major research area. The major concern being addressed in the paper is to provide secure communication and save lives in road accidents. The role of security is high and messages in DSRC send warning messages to other vehicles. If attackers change these messages, then accidents become a part of the network and users’ lives can be at risk. Different classes of attacks include monitoring attack, social attack, timing attack, application attack and network attack to name a few. Advanced encryption standard is a symmetric block encryption algorithm. There is no evidence to crack this algorithm till date. This paper will provide a detailed overview of VANET architecture, types of attacks on VANET, AES algorithm and its salient features and how this algorithm could be utilized to make intelligent transport systems secure.


Author(s):  
Amira Kchaou ◽  
Ryma Abassi ◽  
Sihem Guemara El Fatmi

Vehicular ad-hoc networks (VANETs) allow communication among vehicles using some fixed equipment on roads called roads side units. Vehicular communications are used for sharing different kinds of information between vehicles and RSUs in order to improve road safety and provide travelers comfort using exchanged messages. However, falsified or modified messages can be transmitted that affect the performance of the whole network and cause bad situations in roads. To mitigate this problem, trust management can be used in VANET and can be distributive for ensuring safe and secure communication between vehicles. Trust is a security concept that has attracted the interest of many researchers and used to build confident relations among vehicles. Hence, the authors propose a secured clustering mechanism for messages exchange in VANET in order to organize vehicles into clusters based on vehicles velocity, then CH computes the credibility of message using the reputation of vehicles and the miner controls the vehicle's behavior for verifying the correctness of the message.


Electronics ◽  
2020 ◽  
Vol 9 (12) ◽  
pp. 2010
Author(s):  
Daniel Domingos Adriano ◽  
Carlos Montez ◽  
Antonio G. N. Novaes ◽  
Michelle Wangham

Milk-run tours with time windows are an essential strategy to collect goods to minimize production and transportation costs. Due to unexpected events at the supplier production or traffic congestion, delays can occur during the vehicle route execution, causing non-compliance between the logistics operator and the company. This paper describes the DMRVR (Dynamic Milk-Run Vehicle Routing) solution that uses a dynamic routing algorithm along with fog-based vehicular ad hoc networks for implementing the collection of goods in milk-run operations that respect the company’s time window. When a production delay occurs, the supplier sends a message through the vehicular network to alert the pickup vehicle, forcing it to make dynamic route changes to satisfy the constraints. We have implemented a queue with a timeout and retransmission features to improve the vehicular network’s message delivery. To assess the DMRVR solution, we analyzed the efficiency of the dynamic vehicle routing and the vehicular network impacts. In the experiments, we used an event-based network simulator OMNeT++ bidirectionally coupled with SUMO (Simulation of Urban Mobility), aiming to make the most realistic simulations. Simulation results show the average route time was lower than the time limit imposed by the company with the DMRVR solution. In dense vehicular network scenarios, the message delivery success rate is higher. Conversely, when the vehicular network scenario is sparse, it is necessary to balance network coverage and distribute more RSUs in specific places.


Vehicular Ad Hoc Networks (VANETs) are the newest for of Ad Hoc Networks in which moving vehicles act as routers and nodes to form a network. VANETs use many cryptographic approaches like symmetric key approaches, public key approaches, certificate revocation, pseudonym based approaches, identity-based cryptography, identity-based signature, Elliptical Curve Cryptography (ECC) etc. for secure communication. These techniques use public and private keys for enhancing the security of messages and all these keys are stored on hardware devices like TPDs (Temper Proof Devices) in VANETs. TPDs are protected by the cryptographic algorithms. In this present era of technology these algorithms and their online simulators are freely available on internet and can be easily intruded. There is a potential need to enhance the security of these keys. In this paper we worked on enhancing the security of ECC keys stored in TPDs of VANETs using a specific network of Artificial Neural Networks.


2008 ◽  
Vol 31 (12) ◽  
pp. 2827-2837 ◽  
Author(s):  
Neng-Wen Wang ◽  
Yueh-Min Huang ◽  
Wei-Ming Chen

Sign in / Sign up

Export Citation Format

Share Document