Pub Date : 2024-06-28DOI: 10.1016/j.vehcom.2024.100822
Praneetha Surapaneni , Sriramulu Bojjagani , Muhammad Khurram Khan
The Intelligent Transportation Systems (ITS) is a leading-edge, developing idea that seeks to revolutionize how people and things move inside and outside cities. Internet of Vehicles (IoV) forms a networked environment that joins infrastructure, pedestrians, fog, cloud, and vehicles to develop ITS. The IoV has the potential to improve transportation systems significantly, but as it is networked and data-driven, it poses several security issues. Numerous solutions to these IoV issues have recently been put forth. However, significant computing overhead and security concerns afflict the majority of them. Moreover, malicious vehicles may be injected into the network to access or use unauthorized services. To improve the security of the IoV network, the Mayfly algorithm is used to optimize the private keys continuously. To address these difficulties, we propose a novel VESecure system that provides secure communication, mutual authentication, and key management between vehicles, roadside units (RSU), and cloud servers. The scheme undergoes extensive scrutiny for security and privacy using the Real-or-Random (ROR) oracle model, Tamarin, and Scyther tools, along with the informal security analysis. An Objective Modular Network Testbed in OMNet++ is used to simulate the scheme. We prove our scheme's efficiency by comparing it with other existing methods regarding communication and computation costs.
{"title":"VESecure: Verifiable authentication and efficient key exchange for secure intelligent transport systems deployment","authors":"Praneetha Surapaneni , Sriramulu Bojjagani , Muhammad Khurram Khan","doi":"10.1016/j.vehcom.2024.100822","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100822","url":null,"abstract":"<div><p>The Intelligent Transportation Systems (ITS) is a leading-edge, developing idea that seeks to revolutionize how people and things move inside and outside cities. Internet of Vehicles (IoV) forms a networked environment that joins infrastructure, pedestrians, fog, cloud, and vehicles to develop ITS. The IoV has the potential to improve transportation systems significantly, but as it is networked and data-driven, it poses several security issues. Numerous solutions to these IoV issues have recently been put forth. However, significant computing overhead and security concerns afflict the majority of them. Moreover, malicious vehicles may be injected into the network to access or use unauthorized services. To improve the security of the IoV network, the Mayfly algorithm is used to optimize the private keys continuously. To address these difficulties, we propose a novel VESecure system that provides secure communication, mutual authentication, and key management between vehicles, roadside units (RSU), and cloud servers. The scheme undergoes extensive scrutiny for security and privacy using the Real-or-Random (ROR) oracle model, Tamarin, and Scyther tools, along with the informal security analysis. An Objective Modular Network Testbed in OMNet++ is used to simulate the scheme. We prove our scheme's efficiency by comparing it with other existing methods regarding communication and computation costs.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"49 ","pages":"Article 100822"},"PeriodicalIF":5.8,"publicationDate":"2024-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141594196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-26DOI: 10.1016/j.vehcom.2024.100821
Na Fan , Chase Wu , Slimane Benabdallah , Jialong Li , Yuxin Gao , Qinglong Wang
Vehicular Ad Hoc Networks (VANETs) offer a promising solution to bring drivers comfortable driving experiences and also improve road safety in intelligent transportation systems, but also faces many security issues. Collusive attack is one of the most challenging threats in VANETs because it violates the fundamental assumption made by VANET-based applications that all received information be correct and trustworthy. Collusive attackers can not only generate and send false or forged messages, but also purposely manipulate the reputation value of normal or malicious vehicular nodes. To address these issues, we analyze the behaviors characteristics of collusive attacks and propose a generic, lightweight, and fully distributed detection scheme against collusive attacks in VANETs. This scheme integrates two methods to identify different collusive attacks for fraud reputation and fraud message, respectively, as well as an incentive method to restrain collusive nodes. Simulation-based experiments are conducted and the results illustrate the superiority of the proposed security scheme over state-of-the-art methods.
车载 Ad Hoc 网络(VANET)为驾驶员带来舒适的驾驶体验和提高智能交通系统的道路安全性提供了一种前景广阔的解决方案,但同时也面临着许多安全问题。串通攻击是 VANET 中最具挑战性的威胁之一,因为它违反了基于 VANET 的应用所做的基本假设,即所有接收到的信息都是正确可信的。串通攻击者不仅可以生成和发送虚假或伪造信息,还可以故意操纵正常或恶意车辆节点的信誉值。针对这些问题,我们分析了串通攻击的行为特征,并提出了一种通用、轻量级和全分布式的检测方案,以对抗 VANET 中的串通攻击。该方案集成了两种方法,分别用于识别欺诈声誉和欺诈信息的不同合谋攻击,以及一种抑制合谋节点的激励方法。我们进行了基于仿真的实验,结果表明所提出的安全方案优于最先进的方法。
{"title":"On a security scheme against collusive attacks in vehicular ad hoc networks","authors":"Na Fan , Chase Wu , Slimane Benabdallah , Jialong Li , Yuxin Gao , Qinglong Wang","doi":"10.1016/j.vehcom.2024.100821","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100821","url":null,"abstract":"<div><p>Vehicular Ad Hoc Networks (VANETs) offer a promising solution to bring drivers comfortable driving experiences and also improve road safety in intelligent transportation systems, but also faces many security issues. Collusive attack is one of the most challenging threats in VANETs because it violates the fundamental assumption made by VANET-based applications that all received information be correct and trustworthy. Collusive attackers can not only generate and send false or forged messages, but also purposely manipulate the reputation value of normal or malicious vehicular nodes. To address these issues, we analyze the behaviors characteristics of collusive attacks and propose a generic, lightweight, and fully distributed detection scheme against collusive attacks in VANETs. This scheme integrates two methods to identify different collusive attacks for fraud reputation and fraud message, respectively, as well as an incentive method to restrain collusive nodes. Simulation-based experiments are conducted and the results illustrate the superiority of the proposed security scheme over state-of-the-art methods.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"49 ","pages":"Article 100821"},"PeriodicalIF":5.8,"publicationDate":"2024-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141541723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-26DOI: 10.1016/j.vehcom.2024.100820
Shufen Niu, Runyuan Dong, Wei Liu, Peng Ge, Qi Liu
With the generation of massive traffic information in the smart transportation system, the traffic control center efficiently utilizes broadcast communication to send multiple messages to multiple vehicles. Besides, diversified privacy disclosure and security attack issues also emerged spontaneously. To achieve secure communication between the traffic control center and vehicles in the smart transportation system, we design a broadcast signcryption scheme with equality test in the smart transportation system based on the certificateless cryptosystem and equality test. The scheme realizes message confidentiality and vehicle privacy by using the Lagrange interpolation theorem to encrypt messages and vehicle identities, while also achieving classify ciphertext by using the equality test and facilitate road traffic information management. Through numerical experiment analysis, the proposed work has higher operation efficiency and is more suitable for application in smart transportation systems.
{"title":"Broadcast signcryption scheme with equality test in smart transportation system","authors":"Shufen Niu, Runyuan Dong, Wei Liu, Peng Ge, Qi Liu","doi":"10.1016/j.vehcom.2024.100820","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100820","url":null,"abstract":"<div><p>With the generation of massive traffic information in the smart transportation system, the traffic control center efficiently utilizes broadcast communication to send multiple messages to multiple vehicles. Besides, diversified privacy disclosure and security attack issues also emerged spontaneously. To achieve secure communication between the traffic control center and vehicles in the smart transportation system, we design a broadcast signcryption scheme with equality test in the smart transportation system based on the certificateless cryptosystem and equality test. The scheme realizes message confidentiality and vehicle privacy by using the Lagrange interpolation theorem to encrypt messages and vehicle identities, while also achieving classify ciphertext by using the equality test and facilitate road traffic information management. Through numerical experiment analysis, the proposed work has higher operation efficiency and is more suitable for application in smart transportation systems.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"49 ","pages":"Article 100820"},"PeriodicalIF":5.8,"publicationDate":"2024-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141541721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-25DOI: 10.1016/j.vehcom.2024.100823
Isabel V. Martin-Faus , Leticia Lemus Cárdenas , Ahmad Mohamad Mezher , Mónica Aguilar Igartua
Analyzing vehicular ad hoc networks (VANETs) poses a considerable challenge due to their constantly changing network topology and scarce network resources. Furthermore, defining suitable routing metrics for adaptive algorithms is a particularly hard task since these adaptive decisions should be taken according to the current conditions of the VANET. The literature contains different approaches aimed at optimizing the usage of wireless network resources. In a previous study, we introduced an analytical model based on a straightforward Markov reward chain (MRC) to capture transient measurements of the idle time of the link formed between two VANET nodes, which we denote as . This current study focuses on modeling and analyzing the influence of on adaptive decision mechanisms. Leveraging our MRC models, we have derived a concise equation to compute . This equation provides a quick evaluation of , facilitating quick adaptive routing decisions that align with the current VANET conditions. We have integrated our evaluation into multihop routing protocols. We specifically compare performance results of the 3MRP protocol with an enhanced version, I3MRP, which incorporates our metric. Simulation results demonstrate that integrating as a decision metric in the routing protocol enhances the performance of VANETs in terms of packet losses, packet delay, and throughput. The findings consistently indicate that I3MRP outperforms 3MRP by up to 50% in various scenarios across high, medium, and low vehicular densities.
{"title":"Markov-reward based estimation of the idle-time in vehicular networks to improve multimetric routing protocols","authors":"Isabel V. Martin-Faus , Leticia Lemus Cárdenas , Ahmad Mohamad Mezher , Mónica Aguilar Igartua","doi":"10.1016/j.vehcom.2024.100823","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100823","url":null,"abstract":"<div><p>Analyzing vehicular ad hoc networks (VANETs) poses a considerable challenge due to their constantly changing network topology and scarce network resources. Furthermore, defining suitable routing metrics for adaptive algorithms is a particularly hard task since these adaptive decisions should be taken according to the current conditions of the VANET. The literature contains different approaches aimed at optimizing the usage of wireless network resources. In a previous study, we introduced an analytical model based on a straightforward Markov reward chain (MRC) to capture transient measurements of the idle time of the link formed between two VANET nodes, which we denote as <span><math><msub><mrow><mi>T</mi></mrow><mrow><mi>i</mi><mi>d</mi><mi>l</mi><mi>e</mi></mrow></msub></math></span>. This current study focuses on modeling and analyzing the influence of <span><math><msub><mrow><mi>T</mi></mrow><mrow><mi>i</mi><mi>d</mi><mi>l</mi><mi>e</mi></mrow></msub></math></span> on adaptive decision mechanisms. Leveraging our MRC models, we have derived a concise equation to compute <span><math><msub><mrow><mi>T</mi></mrow><mrow><mi>i</mi><mi>d</mi><mi>l</mi><mi>e</mi></mrow></msub></math></span>. This equation provides a quick evaluation of <span><math><msub><mrow><mi>T</mi></mrow><mrow><mi>i</mi><mi>d</mi><mi>l</mi><mi>e</mi></mrow></msub></math></span>, facilitating quick adaptive routing decisions that align with the current VANET conditions. We have integrated our <span><math><msub><mrow><mi>T</mi></mrow><mrow><mi>i</mi><mi>d</mi><mi>l</mi><mi>e</mi></mrow></msub></math></span> evaluation into multihop routing protocols. We specifically compare performance results of the 3MRP protocol with an enhanced version, I3MRP, which incorporates our <span><math><msub><mrow><mi>T</mi></mrow><mrow><mi>i</mi><mi>d</mi><mi>l</mi><mi>e</mi></mrow></msub></math></span> metric. Simulation results demonstrate that integrating <span><math><msub><mrow><mi>T</mi></mrow><mrow><mi>i</mi><mi>d</mi><mi>l</mi><mi>e</mi></mrow></msub></math></span> as a decision metric in the routing protocol enhances the performance of VANETs in terms of packet losses, packet delay, and throughput. The findings consistently indicate that I3MRP outperforms 3MRP by up to 50% in various scenarios across high, medium, and low vehicular densities.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"49 ","pages":"Article 100823"},"PeriodicalIF":5.8,"publicationDate":"2024-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2214209624000986/pdfft?md5=316bc8cce7c744317806874319ecfaac&pid=1-s2.0-S2214209624000986-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141481657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-25DOI: 10.1016/j.vehcom.2024.100819
C.M. Risma Carletti , F. Raviglione , C. Casetti , F. Stoffella , G.M. Yilma , F. Visintainer
The automotive field is undergoing significant technological advances, which includes making the next generation of autonomous vehicles smarter, greener and safer through vehicular networks, which are often referred to as Vehicle-to-Everything (V2X) communications. Together with V2X, centralized maneuver management services for autonomous vehicles are increasingly gaining importance, as, thanks to their complete view over the road, they can optimally manage even the most complex maneuvers targeting L4 driving and beyond. These services face the challenge of strictly requiring a high reliability and low latency, which are tackled with the deployment at orchestrated Multi-Access Edge Computing (MEC) platforms. In order to properly manage safety-critical maneuvers, these services need to receive a large amount of data from vehicles, even though the useful subset of data is often related to a specific context on the road (e.g., to specific road users or geographical areas). Decoding and post-processing a large amount of raw messages, which are then for the most part filtered, increases the load on safety-critical services, which should instead focus on meeting the deadlines for the actual control and management operations. On this basis, we present an innovative open-source, 5G & MEC enabled service, called Server Local Dynamic Map (S-LDM). The S-LDM is a service that collects information about vehicles and other non-connected road objects using standard-compliant messages. Its primary purpose is to create a centralized dynamic map of the road that can be shared efficiently with other services managing L4 automation, when needed. By doing so, the S-LDM enables these services to widely and precisely understand the current situation of sections of the road, offloading them from the need of quickly processing a large number of messages. After a detailed description of the service architecture, we validate it through extensive laboratory and pilot trials, involving the MEC platforms and production 5G networks of three major European network operations and two Stellantis vehicles equipped with V2X On-Board Units (OBUs). We show how it can efficiently handle high update rates and process each messages in less than few tenths of microseconds. We also provide a complete scalability analysis with details on deployment options, providing insights on where new instances should be created in practical 5G-based V2X scenarios.
{"title":"S-LDM: Server local dynamic map for 5G-based centralized enhanced collective perception","authors":"C.M. Risma Carletti , F. Raviglione , C. Casetti , F. Stoffella , G.M. Yilma , F. Visintainer","doi":"10.1016/j.vehcom.2024.100819","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100819","url":null,"abstract":"<div><p>The automotive field is undergoing significant technological advances, which includes making the next generation of autonomous vehicles smarter, greener and safer through vehicular networks, which are often referred to as Vehicle-to-Everything (V2X) communications. Together with V2X, centralized maneuver management services for autonomous vehicles are increasingly gaining importance, as, thanks to their complete view over the road, they can optimally manage even the most complex maneuvers targeting L4 driving and beyond. These services face the challenge of strictly requiring a high reliability and low latency, which are tackled with the deployment at orchestrated Multi-Access Edge Computing (MEC) platforms. In order to properly manage safety-critical maneuvers, these services need to receive a large amount of data from vehicles, even though the useful subset of data is often related to a specific context on the road (e.g., to specific road users or geographical areas). Decoding and post-processing a large amount of raw messages, which are then for the most part filtered, increases the load on safety-critical services, which should instead focus on meeting the deadlines for the actual control and management operations. On this basis, we present an innovative open-source, 5G & MEC enabled service, called Server Local Dynamic Map (S-LDM). The S-LDM is a service that collects information about vehicles and other non-connected road objects using standard-compliant messages. Its primary purpose is to create a centralized dynamic map of the road that can be shared efficiently with other services managing L4 automation, when needed. By doing so, the S-LDM enables these services to widely and precisely understand the current situation of sections of the road, offloading them from the need of quickly processing a large number of messages. After a detailed description of the service architecture, we validate it through extensive laboratory and pilot trials, involving the MEC platforms and production 5G networks of three major European network operations and two Stellantis vehicles equipped with V2X On-Board Units (OBUs). We show how it can efficiently handle high update rates and process each messages in less than few tenths of microseconds. We also provide a complete scalability analysis with details on deployment options, providing insights on where new instances should be created in practical 5G-based V2X scenarios.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"49 ","pages":"Article 100819"},"PeriodicalIF":5.8,"publicationDate":"2024-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2214209624000949/pdfft?md5=150e5c867ceac116888efba68e0e6ff3&pid=1-s2.0-S2214209624000949-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141481658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-22DOI: 10.1016/j.vehcom.2024.100824
C Kumara Narayana Swamy, T Velmurugan
The Internet of Vehicles (IoV) for fog computing (FC) addresses issues such as traffic congestion, transportation efficiency, and privacy. Non-orthogonal multiple access (NOMA) is a popular technology that enhances spectral efficiency and increases the network's access capability. The synchronisation between NOMA and FC radio access networks extends the application of augmented or vehicular networking and other promising uses. However, with the rapid increase in user vehicles and mobile data, the existing IoV has not succeeded in meeting the real-world and dependable communication needs of modern intelligent transportation due to its limited flexibility. To overcome this, we propose a user grouping-based hybrid optimistic framework for resource allocation in NOMA-based FC vehicular networks (FCVR), named the gradient average subtraction-based optimisation (GASBO). Initially, the NOMA-based FCVR is simulated. User grouping is performed based on GASBO using the signal-to-interference-plus-noise ratio and user distance. Finally, resource allocation is achieved using the proposed GASBO, which combines gradient descent optimisation and average subtraction-based optimisation. The analytic measures obtained for energy efficiency, throughput, sub-channel utility, capacity, and penalty function are 5,366,844,362.870 bits/joule, 883.411 Mbps, 82.031, 2316.337, and 0.011, respectively.
{"title":"GASBO: User grouping–based gradient average subtraction–based optimisation for NOMA-based fog computing vehicular network","authors":"C Kumara Narayana Swamy, T Velmurugan","doi":"10.1016/j.vehcom.2024.100824","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100824","url":null,"abstract":"<div><p>The Internet of Vehicles (IoV) for fog computing (FC) addresses issues such as traffic congestion, transportation efficiency, and privacy. Non-orthogonal multiple access (NOMA) is a popular technology that enhances spectral efficiency and increases the network's access capability. The synchronisation between NOMA and FC radio access networks extends the application of augmented or vehicular networking and other promising uses. However, with the rapid increase in user vehicles and mobile data, the existing IoV has not succeeded in meeting the real-world and dependable communication needs of modern intelligent transportation due to its limited flexibility. To overcome this, we propose a user grouping-based hybrid optimistic framework for resource allocation in NOMA-based FC vehicular networks (FCVR), named the gradient average subtraction-based optimisation (GASBO). Initially, the NOMA-based FCVR is simulated. User grouping is performed based on GASBO using the signal-to-interference-plus-noise ratio and user distance. Finally, resource allocation is achieved using the proposed GASBO, which combines gradient descent optimisation and average subtraction-based optimisation. The analytic measures obtained for energy efficiency, throughput, sub-channel utility, capacity, and penalty function are 5,366,844,362.870 bits/joule, 883.411 Mbps, 82.031, 2316.337, and 0.011, respectively.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"49 ","pages":"Article 100824"},"PeriodicalIF":5.8,"publicationDate":"2024-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141541722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-22DOI: 10.1016/j.vehcom.2024.100825
Jun-feng Tian , Rui Ni
The continuous progression in cloud computing, edge computing, and associated technologies has notably hastened the progress of vehicle networking technology. This advancement is increasingly assuming a crucial role in enhancing driving safety, optimizing traffic management, and revolutionizing traffic control methodologies. The principal aim of Internet of Vehicles (IoV) technology is to establish a secure, convenient, and efficient novel driving paradigm, enabling intelligent transportation through wireless communication connecting roadside units and vehicles. Nevertheless, this wireless communication method is susceptible to potential attacks, including remote control, information monitoring, and identity simulation. Given this situation, effective authentication is required to address this security concern. Thus, this study proposes an identity authentication and key negotiation protocol grounded in a trusted cloud-edge-terminal architecture. This protocol facilitates mutual authentication, generates secure session keys for communication, guarantees the security of vehicle communication, and supports functionalities including privacy protection and password alteration for vehicle users. Time tree technology is employed for managing the edge nodes, facilitating the sharing of vehicle certification information among these nodes, and enhancing certification efficiency. Formal security analysis and informal security analysis are conducted to demonstrate the security of the proposed protocol, evaluating its security and practicality. Theoretical comparisons and experimental results demonstrate the outstanding computational and communication performance of the proposed protocol.
{"title":"An identity authentication and key agreement protocol for the internet of vehicles based on trusted cloud-edge-terminal architecture","authors":"Jun-feng Tian , Rui Ni","doi":"10.1016/j.vehcom.2024.100825","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100825","url":null,"abstract":"<div><p>The continuous progression in cloud computing, edge computing, and associated technologies has notably hastened the progress of vehicle networking technology. This advancement is increasingly assuming a crucial role in enhancing driving safety, optimizing traffic management, and revolutionizing traffic control methodologies. The principal aim of Internet of Vehicles (IoV) technology is to establish a secure, convenient, and efficient novel driving paradigm, enabling intelligent transportation through wireless communication connecting roadside units and vehicles. Nevertheless, this wireless communication method is susceptible to potential attacks, including remote control, information monitoring, and identity simulation. Given this situation, effective authentication is required to address this security concern. Thus, this study proposes an identity authentication and key negotiation protocol grounded in a trusted cloud-edge-terminal architecture. This protocol facilitates mutual authentication, generates secure session keys for communication, guarantees the security of vehicle communication, and supports functionalities including privacy protection and password alteration for vehicle users. Time tree technology is employed for managing the edge nodes, facilitating the sharing of vehicle certification information among these nodes, and enhancing certification efficiency. Formal security analysis and informal security analysis are conducted to demonstrate the security of the proposed protocol, evaluating its security and practicality. Theoretical comparisons and experimental results demonstrate the outstanding computational and communication performance of the proposed protocol.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"49 ","pages":"Article 100825"},"PeriodicalIF":5.8,"publicationDate":"2024-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141541720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-07DOI: 10.1016/j.vehcom.2024.100805
Mehdi Hosseinzadeh , Jawad Tanveer , Faisal Alanazi , Khursheed Aurangzeb , Mohammad Sadegh Yousefpoor , Efat Yousefpoor , Aso Darwesh , Sang-Woong Lee , Amir Masoud Rahmani
Due to the progress of unmanned aerial vehicles (UAVs), this new technology is widely applied in military and civilian areas. Multi-UAV networks are often known as flying ad hoc networks (FANETs). Due to these applications, FANET must ensure communication stability and have high scalability. These goals are achieved by presenting clustering techniques in FANETs. However, the characteristics of these networks, like high-mobility nodes, limited energy, and dynamic topology, have created great challenges in two important processes of clustering protocols, namely cluster construction and the selection of cluster heads. In this paper, an intelligent clustering scheme based on the whale optimization algorithm called ICW is suggested in flying ad hoc networks. Firstly, each UAV specifies its hello interval based on the lifespan of adjacent links to guarantee the adaptability of ICW to FANET. Then, a centralized clustering process is done using a whale optimization algorithm (WOA) to find the best cluster centers on the network. To determine the membership of each UAV in a cluster, ICW employs a new criterion, i.e. closeness ratio, so that each UAV joins a cluster with the best closeness ratio. In addition, the evaluation of each whale is carried out based on a fitness function, consisting of three components, namely the number of isolated clusters, the ratio of inter-cluster distance to intra-cluster distance, and cluster size. Then, a cluster head is selected for each cluster based on a score value. This score is dependent on the weighted sum of four metrics, namely remaining energy, the average link lifespan between each UAV and its neighbors, neighbor degree, and the average distance between each UAV and its neighbors. In the last step, two routing processes, namely intra-cluster routing and inter-cluster routing, are introduced in FANET. Then, the evaluation and implementation of ICW is performed through the NS2 simulator. After completing the simulation process, ICW is compared to MWCRSF, DCM, and GWO, and the evaluation results are presented in two scenarios, namely network evaluation in the clustering process and network evaluation in the routing process. Accordingly, in the first scenario, ICW has low clustering time and a high cluster lifetime. In the second scenario, ICW optimizes energy consumption, network longevity, packet delivery rate, routing overhead, and delay compared to other approaches. However, throughput in ICW is about 3.9% lower than that in MWCRSF.
{"title":"An intelligent clustering scheme based on whale optimization algorithm in flying ad hoc networks","authors":"Mehdi Hosseinzadeh , Jawad Tanveer , Faisal Alanazi , Khursheed Aurangzeb , Mohammad Sadegh Yousefpoor , Efat Yousefpoor , Aso Darwesh , Sang-Woong Lee , Amir Masoud Rahmani","doi":"10.1016/j.vehcom.2024.100805","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100805","url":null,"abstract":"<div><p>Due to the progress of unmanned aerial vehicles (UAVs), this new technology is widely applied in military and civilian areas. Multi-UAV networks are often known as flying ad hoc networks (FANETs). Due to these applications, FANET must ensure communication stability and have high scalability. These goals are achieved by presenting clustering techniques in FANETs. However, the characteristics of these networks, like high-mobility nodes, limited energy, and dynamic topology, have created great challenges in two important processes of clustering protocols, namely cluster construction and the selection of cluster heads. In this paper, an intelligent clustering scheme based on the whale optimization algorithm called ICW is suggested in flying ad hoc networks. Firstly, each UAV specifies its hello interval based on the lifespan of adjacent links to guarantee the adaptability of ICW to FANET. Then, a centralized clustering process is done using a whale optimization algorithm (WOA) to find the best cluster centers on the network. To determine the membership of each UAV in a cluster, ICW employs a new criterion, i.e. closeness ratio, so that each UAV joins a cluster with the best closeness ratio. In addition, the evaluation of each whale is carried out based on a fitness function, consisting of three components, namely the number of isolated clusters, the ratio of inter-cluster distance to intra-cluster distance, and cluster size. Then, a cluster head is selected for each cluster based on a score value. This score is dependent on the weighted sum of four metrics, namely remaining energy, the average link lifespan between each UAV and its neighbors, neighbor degree, and the average distance between each UAV and its neighbors. In the last step, two routing processes, namely intra-cluster routing and inter-cluster routing, are introduced in FANET. Then, the evaluation and implementation of ICW is performed through the NS2 simulator. After completing the simulation process, ICW is compared to MWCRSF, DCM, and GWO, and the evaluation results are presented in two scenarios, namely network evaluation in the clustering process and network evaluation in the routing process. Accordingly, in the first scenario, ICW has low clustering time and a high cluster lifetime. In the second scenario, ICW optimizes energy consumption, network longevity, packet delivery rate, routing overhead, and delay compared to other approaches. However, throughput in ICW is about 3.9% lower than that in MWCRSF.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"49 ","pages":"Article 100805"},"PeriodicalIF":6.7,"publicationDate":"2024-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141325587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vehicular Ad Hoc Networks (VANETs) provide various benefits and play a crucial role in improving efficiency and ensuring human safety across different applications. However, these advantages also give rise to security challenges and privacy concerns, necessitating a thorough examination of security attacks. Current key generation schemes, particularly those based on the Physical-Layer Model (PLM), face limitations such as low key generation rates and inadequate randomness. This paper introduces an innovative key generation method that utilizes adaptive physical-layer techniques and lossless quantization. The method involves an eight-level quantization process, which enables precise granularity and adaptive selection of quantization thresholds to tailor the computation of Received Signal Strength (RSS) measurements to individual needs. The adaptive approach ensures the retention of information within RSS measurements, resulting in reduced bit disagreement rates and enhanced randomness of the generated keys. Simulated evaluations demonstrate the effectiveness of the proposed method, showing superior performance in terms of bit generation, entropy, and secrecy rates, while also minimizing the occurrence of unnecessary measurements. This advancement holds significant promise for strengthening the security framework within VANETs.
车载 Ad Hoc 网络(VANET)具有多种优势,在提高效率和确保不同应用中的人类安全方面发挥着至关重要的作用。然而,这些优势也带来了安全挑战和隐私问题,因此有必要对安全攻击进行深入研究。当前的密钥生成方案,尤其是基于物理层模型(PLM)的方案,面临着密钥生成率低和随机性不足等限制。本文介绍了一种利用自适应物理层技术和无损量化的创新密钥生成方法。该方法涉及一个八级量化过程,可实现精确的粒度和量化阈值的自适应选择,从而根据个人需求定制接收信号强度(RSS)测量的计算。自适应方法可确保保留 RSS 测量值中的信息,从而降低比特分歧率,并增强所生成密钥的随机性。模拟评估证明了所提方法的有效性,在比特生成、熵和保密率方面表现出卓越的性能,同时还最大限度地减少了不必要的测量。这一进步为加强 VANET 的安全框架带来了重大希望。
{"title":"A lossless quantization approach for physical-layer key generation in vehicular ad hoc networks based on received signal strength","authors":"Ibraheem Abdelazeem , Weibin Zhang , Abdeldime Mohamedsalih , Mohamed Abdalwohab , Ahmedalmansour Abuobida","doi":"10.1016/j.vehcom.2024.100809","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100809","url":null,"abstract":"<div><p>Vehicular Ad Hoc Networks (VANETs) provide various benefits and play a crucial role in improving efficiency and ensuring human safety across different applications. However, these advantages also give rise to security challenges and privacy concerns, necessitating a thorough examination of security attacks. Current key generation schemes, particularly those based on the Physical-Layer Model (PLM), face limitations such as low key generation rates and inadequate randomness. This paper introduces an innovative key generation method that utilizes adaptive physical-layer techniques and lossless quantization. The method involves an eight-level quantization process, which enables precise granularity and adaptive selection of quantization thresholds to tailor the computation of Received Signal Strength (RSS) measurements to individual needs. The adaptive approach ensures the retention of information within RSS measurements, resulting in reduced bit disagreement rates and enhanced randomness of the generated keys. Simulated evaluations demonstrate the effectiveness of the proposed method, showing superior performance in terms of bit generation, entropy, and secrecy rates, while also minimizing the occurrence of unnecessary measurements. This advancement holds significant promise for strengthening the security framework within VANETs.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"49 ","pages":"Article 100809"},"PeriodicalIF":6.7,"publicationDate":"2024-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141303831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-04DOI: 10.1016/j.vehcom.2024.100806
Vladimir R. de Lima, Marcello L.R. de Campos
This work explores distributed processing techniques, together with recent advances in multi-agent reinforcement learning (MARL) to implement a fully decentralized reward and decision-making scheme to efficiently allocate resources (spectrum and power). The method targets processes with strong dynamics and stringent requirements such as cellular vehicle-to-everything networks (C-V2X). In our approach, the C-V2X is seen as a strongly connected network of intelligent agents which adopt a distributed reward scheme in a cooperative and decentralized manner, taking into consideration their channel conditions and selected actions in order to achieve their goals cooperatively. The simulation results demonstrate the effectiveness of the developed algorithm, named Distributed Multi-Agent Reinforcement Learning (DMARL), achieving performances very close to that of a centralized reward design, with the advantage of not having the limitations and vulnerabilities inherent to a fully or partially centralized solution.
{"title":"Fully distributed multi-agent processing strategy applied to vehicular networks","authors":"Vladimir R. de Lima, Marcello L.R. de Campos","doi":"10.1016/j.vehcom.2024.100806","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100806","url":null,"abstract":"<div><p>This work explores distributed processing techniques, together with recent advances in multi-agent reinforcement learning (MARL) to implement a fully decentralized reward and decision-making scheme to efficiently allocate resources (spectrum and power). The method targets processes with strong dynamics and stringent requirements such as cellular vehicle-to-everything networks (C-V2X). In our approach, the C-V2X is seen as a strongly connected network of intelligent agents which adopt a distributed reward scheme in a cooperative and decentralized manner, taking into consideration their channel conditions and selected actions in order to achieve their goals cooperatively. The simulation results demonstrate the effectiveness of the developed algorithm, named Distributed Multi-Agent Reinforcement Learning (DMARL), achieving performances very close to that of a centralized reward design, with the advantage of not having the limitations and vulnerabilities inherent to a fully or partially centralized solution.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"49 ","pages":"Article 100806"},"PeriodicalIF":6.7,"publicationDate":"2024-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141303833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}