scholarly journals Road Condition Monitoring with Source Authentication in VANET

In recent technologies, it has been said that, to improve the travel efficiency and safety of transportation systems, vehicular ad-hoc network (VANET) has been used as the promising technology where each vehicle is able to collect and communicate the information about current road or traffic condition at a particular location using an embedded on-board unit with the help of distributed roadside units. Examples are: While detection of some accident, congestion, jam, etc., vehicles broadcast warning signals to the nearby vehicles which would give a better awareness to every nearby vehicles about the driving environment and these nearby vehicles would change the driving plan if needed. The VANET technology has gained great attentions from both industry and academics in the recent days.

2019 ◽  
Vol 14 (7) ◽  
pp. 1779-1790 ◽  
Author(s):  
Yujue Wang ◽  
Yong Ding ◽  
Qianhong Wu ◽  
Yongzhuang Wei ◽  
Bo Qin ◽  
...  

2020 ◽  
Author(s):  
Vijay Kumar ◽  
Praveen Benjamine S. ◽  
Karthikeyan M. ◽  
Ragul Kuma M. ◽  
Ram Kishore A.

HardwareX ◽  
2018 ◽  
Vol 4 ◽  
pp. e00045 ◽  
Author(s):  
Tian Lei ◽  
Abduallah A. Mohamed ◽  
Christian Claudel

Author(s):  
Saravanakumar S

The connected vehicular ad-hoc network (VANET) and cloud computing technology allows entities in VANET to enjoy the advantageous storage and computing services offered by some cloud service provider. However, the advantages do not come free since their combination brings many new security and privacy requirements for VANET applications. In this article, we investigate the cloud-based road condition monitoring (RCoM) scenario, where the authority needs to monitor real-time road conditions with the help of a cloud server so that it could make sound responses to emergency cases timely. When some bad road condition is detected, e.g., some geologic hazard or accident happens, vehicles on site are able to report such information to a cloud server engaged by the authority. We focus on addressing three key issues in RCoM. First, the vehicles have to be authorized by some roadside unit before generating a road condition report in the domain and uploading it to the cloud server. Second, to guarantee the privacy against the cloud server, the road condition information should be reported in ciphertext format, which requires that the cloud server should be able to distinguish the reported data from different vehicles in ciphertext format for the same place without compromising their confidentiality. Third, the cloud server and authority should be able to validate the report source, i.e., to check whether the road conditions are reported by legitimate vehicles. To address these issues, we present an efficient RCoM scheme, analyze its efficiency theoretically, and demonstrate the practicality through experiments


Author(s):  
Felix Kortmann ◽  
Julin Horstkotter ◽  
Alexander Warnecke ◽  
Nicolas Meier ◽  
Jens Heger ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document