Submitted:
09 May 2023
Posted:
10 May 2023
You are already at the latest version
Abstract
Keywords:
1. Introduction
- Authentication and registration using third-party Certification Authority
- V2I & V2I Communication Channel
- Graph-Based Resource Sharing in Vehicular Communication
2. Literature Review
3. Methodology
3.1. Explanation of Notations
- The range of in varies from 1 to n-1, i.e., , but in other notations, it varies from to i.e.,
- MD5-based secure hash function 128-bit hash value ranges from
- such that is presents a set of random numbers generated using the LCG algorithm
- Linear congruential generators can be defined through recurrence relation as:
- will generate a 6-digit code.
- is generated using the Fisher-Yates shuffle algorithm. Here is the pseudo representation of this algorithm:
- and are two extractor functions that extract latitude and longitude from the input location.
-
contains message templates. These messages might contain the following commands:
- ○
- Please give me the way. I am on your back!
- ○
- Speed up!
- ○
- Danger ahead!
- ○
- Traffic is jammed on the road. Please adopt an alternative way.
- ○
- I run short of fuel. Please help!
- ○
- I need a mechanic.
- ○
- Tire is punctured.
- ○
- There is an accident on the road near my location.
- ○
- There is a crowd protesting on the way.
- ○
- Please give way to the ambulance!
- ○
- Stop on the way. There is a check post.
- ○
- The weather condition is bad.
- contains three values, including 0, 1, and 2. (0) means the priority of this message is nothing. It might be an informative message. 1 means normal priority, while 2 means a very high priority.
4. Proposed Scheme
4.1. Registration Phase
- e-mail
- Password
- Vehicle Registration Number
| OBU | CA Server | |
| Registration: Selects , , and Computes Insert inside vehicle OBU |
|
Store Generates |
4.2. Authentication Phase
| Vehicle OBU | CA Server | |
| Login and authentication: Inputs OR Computes |
|
Checks Compares with DB Updates logs table compares and with DB Updates logs table |
4.3. V2I Communication
| Vehicle | CA Server | |
| V2I Communication: Computes Parsing |
|
Updating logs |
4.4. V2V Communication
| Vehicle A | Vehicle B | |
| V2V Communication: Selects , and Computes Acknowledgement of |
|
Acknowledgement of Replies: = Selects and Computes |
4.5. Vehicle Clustering and Monitoring

4.6. Cluster Head Selection Algorithm
- Each vehicle inside a cluster announces itself as a “Cluster Head” and displays the broadcast signal: .
- Every vehicle displays the list of closest vehicles () after getting from .
- is estimated by .
-
Weighted sum is calculated by :The vehicle calculates the above equation’s arguments, and the range of weighted constants varies from 0 to 1. Since the weighted sum is derived from these arguments, the Cluster Head based on this sum will be the most efficient and trustworthy.
- In the end, the with the lowest is selected as the Cluster Head.

| Notations | |
| a Vehicle | |
| Vehicle Unique Identity | |
| Closest Vehicle | |
| Vehicle-ID | |
| Closest Vehicles List | |
| Distance Between Vi and Vj | |
| Number of Closest Vehicles to Vj | |
| Range of Dynamic Transmission | |
| Moving Vehicle Direction | |
| Vehicle Speed | |
| Assumed Weights | |
5. Simulation Setup and Experiments
5.1. Varying the Attackers
5.2. Transmission Range
5.3. Baseline Graph-Based Resource Allocation
5.4. Greedy Resource Allocation
5.5. V2I and V2V Communications
5.6. Performance Evaluation of V2V and V2I Communications
6. Conclusions
References
- Jithendra, H. and D. Rekha, Secured Trusted Authentication with Trust-Based Congestion Scheme for V2V Communication, in Cloud and Fog Computing Platforms for Internet of Things. 2022, Chapman and Hall/CRC. p. 157-168.
- !!! INVALID CITATION !!!
- Cui, J., et al., Edge computing in VANETs-an efficient and privacy-preserving cooperative downloading scheme. IEEE Journal on Selected Areas in Communications, 2020. 38(6): p. 1191-1204. [CrossRef]
- Hamzah, M., et al., Distributed Control of Cyber Physical System on Various Domains: A Critical Review. Systems, 2023. 11(4): p. 208. [CrossRef]
- Goyal, A.K., et al., Systematic Study of VANET: Applications, Challenges, Threats, Attacks, Schemes and Issues in Research. Green Computing in Network Security. 2022. 33-52.
- Singh, M., C. Kumar, and P. Nath, P2P Applications in 4G/5G Networks Using D2D Communication Based on Social Attributes of Users. 2020 Fourth World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4), 2020: p. 730-738.
- Hamdi, M.M., et al. A review of applications, characteristics and challenges in vehicular ad hoc networks (VANETs). in 2020 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA). 2020. IEEE.
- Hsieh, F.-S., Improving Acceptability of Cost Savings Allocation in Ridesharing Systems Based on Analysis of Proportional Methods. Systems, 2023. 11(4): p. 187. [CrossRef]
- Shen, X., et al., An Innovative Data Integrity Verification Scheme in the Internet of Things assisted information exchange in transportation systems. Cluster Computing, 2022. 25(3): p. 1791-1803. [CrossRef]
- Sharma, S.K., et al., Evaluation of VANETs routing protocols for data-based smart health monitoring in intelligent transportation systems. International Journal of Mathematical, Engineering and Management Sciences, 2022. 7(2): p. 211. [CrossRef]
- Gao, Z., et al., Based on Improved NSGA-II Algorithm for Solving Time-Dependent Green Vehicle Routing Problem of Urban Waste Removal with the Consideration of Traffic Congestion: A Case Study in China. Systems, 2023. 11(4): p. 173. [CrossRef]
- Lim, K., K.M. Tuladhar, and H. Kim. Detecting location spoofing using ADAS sensors in VANETs. in 2019 16th IEEE annual consumer communications & networking conference (CCNC). 2019. IEEE.
- Hussein, A., et al. SDN VANETs in 5G: An architecture for resilient security services. in 2017 Fourth International Conference on Software Defined Systems (SDS). 2017. IEEE.
- Balamurugan, M., et al., Anonymous Location-Support and Self-Reliance Routing Protocol For Manet. Indian Journal of Public Health Research & Development, 2018. 9(2): p. 323-326. [CrossRef]
- Edge, S.W., H. Cheng, and H. Zisimopoulos, Systems and methods for 5g location support using service based interfaces, US Patent App. 17/478, Editor. 2022, Google Patents.
- Foundation, O.C. Unlocking the Massive Opportunity in the Internet of Things. [cited 2020 25 January]; Available from: https://openconnectivity.org/technology/iotivity/.
- Hu, Q., et al., Tangible security: Survey of methods supporting secure ad-hoc connects of edge devices with physical context. Computers & Security, 2018. 78: p. 281-300. [CrossRef]
- Appiahene, P., et al. Application of Wireless Ad-Hoc Networks Model to provide Education to rural Communities in Ghana. in International Conference on Applied Science and Technology Conference Proceedings. 2019.
- Yang, L. and H.J.I.I.T.S. Li, Vehicle-to-vehicle communication based on a peer-to-peer network with graph theory and consensus algorithm. IET Intelligent Transport Systems, 2018. 13(2): p. 280-285. [CrossRef]
- Bossauer, P., et al. Trust versus Privacy: Using Connected Car Data in Peer-to-Peer Carsharing. in Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 2020.
- Shah, S.A.A., et al., 5G for vehicular communications. IEEE Communications Magazine, 2018. 56(1): p. 111-117. [CrossRef]
- Meneguette, R.I. and A. Boukerche. Peer-to-peer protocol for allocated resources in vehicular cloud based on V2V communication. in 2017 IEEE Wireless Communications and Networking Conference (WCNC). 2017. IEEE.
- Singh, P.K., S.K. Nandi, and S.J.V.C. Nandi, A tutorial survey on vehicular communication state of the art, and future research directions. Vehicular Communications, 2019. 18: p. 100164. [CrossRef]
- Salem, F.M. and A.S.J.I.J.o.C.S. Ali, SOS: Self-organized secure framework for VANET. International Journal of Communication Systems, 2020. 33(7): p. e4317. [CrossRef]
- Takashi, T., et al. Performance Evaluation of Multi-Hop Communication on Inter-vehicular P2P Network. in IEICE Technical Report;. 2020.
- Zhang, R., Y. Lu, and B. Liu, Pricing Decisions and Game Analysis on Advanced Delivery and Cross-Channel Return in a Dual-Channel Supply Chain System. Systems, 2023. 11(3): p. 155. [CrossRef]
- Mondal, A. and S. Mitra, Security Issues in Vehicular Ad Hoc Networks for Evolution Towards Internet of Vehicles, in Connected Vehicles in the Internet of Things. 2020, Springer. p. 253-307.
- Zhong, S., et al., Connecting things to things in physical-world: Security and privacy issues in vehicular ad-hoc networks, in Security and Privacy for Next-Generation Wireless Networks. 2019, Springer. p. 101-134.
- Stepień, K. and A. Poniszewska-Marańda. Towards the security measures of the vehicular ad-hoc networks. in International Conference on Internet of Vehicles. 2018. Springer.
- Ayaz, S.B., et al., Proactive route choice with real-time information: Learning and effects of network complexity and cognitive load. Transportation Research Part C: Emerging Technologies, 2023. 149: p. 104035. [CrossRef]
- Zhang, K., et al., Artificial intelligence inspired transmission scheduling in cognitive vehicular communications and networks. IEEE Internet of Things Journal, 2018. 6(2): p. 1987-1997. [CrossRef]
- Liang, L., G.Y. Li, and W.J.I.T.o.C. Xu, Resource allocation for D2D-enabled vehicular communications. IEEE Transactions on Communications, 2017. 65(7): p. 3186-3197. [CrossRef]
- Zhang, K., et al., Mobile-edge computing for vehicular networks: A promising network paradigm with predictive off-loading. IEEE Vehicular Technology Magazine, 2017. 12(2): p. 36-44. [CrossRef]
- Burg, A., A. Chattopadhyay, and K.-Y.J.P.o.t.I. Lam, Wireless communication and security issues for cyber–physical systems and the Internet-of-Things. Proceedings of the IEEE, 2017. 106(1): p. 38-60. [CrossRef]
- Al-Kinani, A., et al., Optical wireless communication channel measurements and models. IEEE Communications Surveys & Tutorials, 2018. 20(3): p. 1939-1962. [CrossRef]
- Rahman, M.S., M.J.A.A. Abdel-Aty, and Prevention, Longitudinal safety evaluation of connected vehicles’ platooning on expressways. Accident Analysis & Prevention, 2018. 117: p. 381-391. [CrossRef]
- Masini, B.M., A. Bazzi, and A.J.S. Zanella, A survey on the roadmap to mandate on board connectivity and enable V2V-based vehicular sensor networks. Sensors, 2018. 18(7): p. 2207. [CrossRef]
- Liang, L., et al., Vehicular communications: A physical layer perspective. IEEE Transactions on Vehicular Technology, 2017. 66(12): p. 10647-10659. [CrossRef]
- Yan, G. and D.B.J.A.H.N. Rawat, Vehicle-to-vehicle connectivity analysis for vehicular ad-hoc networks. Ad Hoc Networks, 2017. 58: p. 25-35. [CrossRef]
- Liu, G., et al., Enhancing clustering stability in VANET: A spectral clustering based approach. China Communications, 2020. 17(4): p. 140-151. [CrossRef]
- Abdelatif, S., et al., VANET: A novel service for predicting and disseminating vehicle traffic information. International Journal of Communication Systems, 2020. 33(6): p. e4288. [CrossRef]
- Al-Shareeda, M.A., et al., Vppcs: Vanet-based privacy-preserving communication scheme. IEEE Access, 2020. 8: p. 150914-150928. [CrossRef]
- Xiao, H., et al., Connectivity probability analysis for VANET freeway traffic using a cell transmission model. IEEE Systems Journal, 2020. [CrossRef]
- Ali, Z.H., et al., A novel geographically distributed architecture based on fog technology for improving Vehicular Ad hoc Network (VANET) performance. Peer-to-Peer Networking and Applications, 2020. 13(5): p. 1539-1566. [CrossRef]
- Khatri, S., et al., Machine learning models and techniques for VANET based traffic management: Implementation issues and challenges. Peer-to-Peer Networking and Applications, 2021. 14: p. 1778-1805. [CrossRef]
- Alaya, B., L.J.J.o.I.S. Sellami, and Applications, Clustering method and symmetric/asymmetric cryptography scheme adapted to securing urban VANET networks. Journal of Information Security and Applications, 2021. 58: p. 102779. [CrossRef]
- Mirsadeghi, F., et al., A trust infrastructure based authentication method for clustered vehicular ad hoc networks. Peer-to-Peer Networking and Applications, 2021. 14: p. 2537-2553. [CrossRef]
- Alkhalidy, M., et al., A new scheme for detecting malicious nodes in vehicular ad hoc networks based on monitoring node behavior. Future Internet, 2022. 14(8): p. 223. [CrossRef]
- Bijalwan, A., et al., A Self-Adaptable Angular Based K-Medoid Clustering Scheme (SAACS) for Dynamic VANETs. Electronics, 2022. 11(19): p. 3071. [CrossRef]
- Ouallane, A.A., et al., Fusion of engineering insights and emerging trends: Intelligent urban traffic management system. Information Fusion, 2022. [CrossRef]
- Rajeswari, R., S.J.C. Rajesh, and Systems, Enhance Security and Privacy in VANET Based Sensor Monitoring and Emergency Services. Cybernetics and Systems, 2023: p. 1-22. [CrossRef]
- Hireche, S., A. Dennai, and B.J.T.C.J. Kadri, Toward a Novel RESTFUL Big Data-Based Urban Traffic Incident Data Web Service for Connected Vehicles. The Computer Journal, 2023: p. bxad001. [CrossRef]
- Narayanan, K.L., R.J.S.E.T. Naresh, and Assessments, An efficient key validation mechanism with VANET in real-time cloud monitoring metrics to enhance cloud storage and security. Sustainable Energy Technologies and Assessments, 2023. 56: p. 102970. [CrossRef]
- Nazib, R.A. and S.J.I.A. Moh, Routing Protocols for Unmanned Aerial Vehicle-Aided Vehicular Ad Hoc Networks: A Survey. IEEE Access, 2020. 8: p. 77535-77560. [CrossRef]
- Qureshi, K.N., et al., Distance and signal quality aware next hop selection routing protocol for vehicular ad hoc networks. Neural Computing and Applications, 2020. 32(7): p. 2351-2364. [CrossRef]
- Jaiswal, R.K.J.C. and E. Engineering, Position-based routing protocol using Kalman filter as a prediction module for vehicular ad hoc networks. Computers & Electrical Engineering, 2020. 83: p. 106599. [CrossRef]
- Eldin, K.Y.E. and A.A.J.J.H.e.b.e.e. Ahwal, A Comparative Study On Vehicular Ad-Hoc Networks Topology Based Routing Protocols. Engineering Research Journal (ERJ), 2020. 1(44): p. 111-117.
- Obaidat, M., et al., Security and privacy challenges in vehicular ad hoc networks, in Connected Vehicles in the Internet of Things. 2020, Springer. p. 223-251.
- Sugumar, R., A. Rengarajan, and C.J.W.N. Jayakumar, Trust based authentication technique for cluster based vehicular ad hoc networks (VANET). Wireless Networks, 2018. 24(2): p. 373-382. [CrossRef]
- Kolandaisamy, R., et al., A stream position performance analysis model based on DDoS attack detection for cluster-based routing in VANET. Journal of Ambient Intelligence and Humanized Computing, 2020: p. 1-14. [CrossRef]
- Deshmukh, A.R., S.A. Dhawale, and S. Dorle. Analysis of Cluster Based Routing Protocol (CBRP) for Vehicular Adhoc Network (VANet) in Real Geographic Scenario. in 2020 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT). 2020. IEEE.
- Yogarayan, S., et al., A Review of Routing Protocols for Vehicular Ad-Hoc Networks (VANETs). 2020 8th International Conference on Information and Communication Technology (ICoICT), 2020: p. 1-7.
- Srivastava, A., A. Prakash, and R. Tripathi, Location based routing protocols in VANET: Issues and existing solutions. Vehicular Communications, 2020. 23: p. 100231. [CrossRef]
- Liang, L., et al., Graph-based resource sharing in vehicular communication. IEEE Transactions on Wireless Communications, 2018. 17(7): p. 4579-4592. [CrossRef]
















| Keyword | Meanings |
|---|---|
| ITS | Intelligent Transportation System |
| VANETs | Vehicular AdHoc Networks |
| V2V | Vehicle-to-Vehicle |
| V2I | Vehicle-to-Infrastructure |
| V2X | Vehicle-to-Everything |
| RSU | Road Side Units |
| E2E | End-to-End |
| PDR | Packet Delivery Ratio |
| RR | Route Reliability |
| P2P | Peer-to-Peer |
| TRPs | Topological Routing Protocols |
| GRPs | Geographic Routing Protocols |
| 5G | Fifth Generation |
| SDN | Software-Defined Network |
| DDoS | Distributed Denial of Services |
| MANETs | Mobile AdHoc Networks |
| CA | Certification Authority |
| LCG | Linear Congruential Generator |
| FYS | Fisher-Yates Shuffle |
| API | Application Programming Interface |
| OTP | One-Time Password |
| HTTP | Hypertext Transfer Protocol |
| UR | Ultra-Reliability |
| IoT | Internet of Things |
| AI | Artificial Intelligence |
| MD5 | Media-Digest Algorithm for encryption |
| SUMO | Simulation of Urban Mobility |
| API | Application Program Interface |
| TCP | Transfer Control Protocol |
| Ref No. | Key Contribution | V2V | V2X |
|---|---|---|---|
| [31] |
|
✔ | ✔ |
| [32] |
|
✔ | ✔ |
| [33] |
|
✔ | ✔ |
| [34] |
|
✽ | ✽ |
| [35] |
|
✽ | ✽ |
| [36] |
|
✔ | ✽ |
| [37] |
|
✔ | ✽ |
| [38] |
|
✽ | ✔ |
| [39] |
|
✔ | ✗ |
| [40] |
|
✽ | ✽ |
| [41] |
|
✽ | ✽ |
| [42] |
|
✽ | ✔ |
| [43] |
|
✽ | ✔ |
| [44] |
|
✗ | ✔ |
| [42] |
|
✔ | ✔ |
| [45] |
|
✔ | ✔ |
| [46] |
|
✔ | ✽ |
| [47] |
|
✔ | ✔ |
| [48] |
|
✔ | ✽ |
| [49] |
|
✔ | ✔ |
| [50] |
|
✔ | ✽ |
| [51] |
|
✔ | ✽ |
| [52] |
|
✔ | ✔ |
| [53] |
|
✔ | ✽ |
| Notation | Description |
|---|---|
| a Vehicle | |
| Certification Authority Server | |
| Vehicle ID | |
| Vehicle Registration Number | |
| Extract Numeric Values from a String | |
| Vehicle Numeric Code extracted from the Registration Number | |
| Vehicle e-mail | |
| Vehicle Password | |
| Concatenation | |
| One-Way Hash Function | |
| Vehicle Timestamp | |
| Server-Side Timestamp | |
| LCG-Based Random Numbers | |
| Vehicle Code generated by the server | |
| Shuffled Vehicle Code using the FYS algorithm | |
| The Result computed on the Server-Side | |
| Secured Password for Vehicle | |
| Updated Vehicle Code | |
| Updated Vehicle Code generated by the server | |
| Vehicle Reference | |
| Shuffling of Updated Vehicle Code generated by the server | |
| Vehicle Code for Authentication generated by the server | |
| OTP-Like Vehicle Code generated by the server | |
| Vehicle Session Key generated by the server | |
| Vehicle Authentication Method | |
| Vehicle Authentication Status | |
| Server Response Against HTTP Request | |
| Not Equal Operator | |
| Latitude | |
| Longitude | |
| Current Location of the vehicle moving on the road | |
| Vehicle Threshold Location Interval | |
| Server Interval Table | |
| Server Log Table | |
| The function that will extract latitude from the location | |
| The function that will extract longitude from the location | |
| Message Priority | |
| Message Template | |
| Receiver ID | |
| Sender ID |
| Baseline Graph-Based Resource Allocation Algorithm |
|---|
|
| Greedy Resource Allocation Algorithm |
|---|
|
| Vehicle-to-Infrastructure (V2I) | |||||
|---|---|---|---|---|---|
| Attributes | 1st Request | 2nd Request | 3rd Request | 4th Request | 5th Request |
| Status (status code) | 200 | 200 | 200 | 200 | 200 |
| Response Size (bytes) | 289 | 289 | 289 | 289 | 289 |
| Socket Initialization (milliseconds) | 2.18 | 2.07 | 1.77 | 2.12 | 1.40 |
| DNS Lookup (milliseconds) | 4.11 | 3.19 | 2.95 | 2.17 | 1.62 |
| TCP Handshake (milliseconds) | 1.47 | 1.25 | 1.06 | 0.92 | 0.76 |
| Transfer Start (milliseconds) | 91.38 | 98.18 | 88.02 | 82.33 | 80.91 |
| Download (milliseconds) | 20.24 | 4.19 | 3.35 | 4.81 | 3.73 |
| Vehicle-to-Vehicle (V2V) | |||||
| Status (status code) | 200 | 200 | 200 | 200 | 200 |
| Response Size (bytes) | 289 | 289 | 289 | 289 | 289 |
| Socket Initialization (milliseconds) | 11.24 | 4.22 | 1.68 | 1.36 | 1.04 |
| DNS Lookup (milliseconds) | 1.19 | 0.48 | 0.77 | 0.47 | 0.89 |
| TCP Handshake (milliseconds) | 3.03 | 1.48 | 2.49 | 2.63 | 2.41 |
| Transfer Start (milliseconds) | 91.75 | 93.56 | 83.26 | 62.03 | 58.95 |
| Download (milliseconds) | 12.61 | 4.49 | 2.89 | 3.32 | 3.45 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
