• Title/Summary/Keyword: vehicular Networks

Search Result 228, Processing Time 0.04 seconds

Cryptanalysis of an Identity-Based Message Authentication Scheme in VANETs (신원기반의 차량통신망 메시지 인증 스킴에 대한 안전성 분석)

  • Ryu, Eun-Kyung;Lee, Sung-Woon;Yoo, Kee-Young
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.6
    • /
    • pp.167-172
    • /
    • 2013
  • In a paper recently published in the International Journal of Parallel, Emergent and Distributed Systems, Biswas et al. proposed a VANET message authentication scheme which uses an identity-based proxy signature mechanism as an underlying primitive. The authors claimed that their scheme supports various security features including the security of proxy-key, the security against message forgery and the security against replay attack, with non-repudiation and resistance to proxy-key compromise. Here, we show how an active attacker, who has no knowledge of an original message sender's private key, can compute the proxy-signature key of the corresponding message sender, meaning that the scheme is completely insecure. We also suggest an enhanced version of the protocol capable of solving such serious security holes.

An Analysis of the Radio Interference in Wireless Vehicular Networks based on IEEE802.11b(WLAN) (IEEE802.11b(WLAN)기반의 차량 무선통신환경에서 전파간섭분석)

  • Lee, Myungsub;Park, Changhyeon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.6
    • /
    • pp.117-125
    • /
    • 2012
  • Recently, there has been a fast paradigm shift in the automotive market from the traditional machine-oriented technology into the technology for vehicle informatics and electronics. In particular, telematics market is accelerating the development of technologies for vehicle informatics through the close cooperation between the vehicle makers and mobile communication companies. However, there may be the degradation of the quality of service by the interference since the telematics uses the wireless communication infrastructure for the base station-to-vehicle communication and the vehicle-to-vehicle communication. This paper presents an analysis device to easily analyze the interference by the wireless communication in the vehicle wireless network environment. Using the analysis results by the presented device, this paper shows that the link quality can be improved through the simulation and the experiment in real environment both.

Reliability Verification of Secured V2X Communication for Cooperative Automated Driving (자율협력주행을 위한 V2X 보안통신의 신뢰성 검증)

  • Jung, Han-gyun;Lim, Ki-taeg;Shin, Dae-kyo;Yoon, Sang-hun;Jin, Seong-keun;Jang, Soo-hyun;Kwak, Jae-min
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.5
    • /
    • pp.391-399
    • /
    • 2018
  • V2X communication is a technology in which a vehicle exchanges information with various entities such as other vehicles, infrastructure, networks, pedestrians, etc. through a wired or wireless network. Recently, V2X communication technology has been steadily developed and recently it has played an important role in autonomous cooperation driving technology combined with autonomous vehicle technology. Autonomous vehicles can utilize the external information received via V2X communication to extend the recognition range of existing sensors and to support more safe and natural autonomous driving. In order to operate these autonomous cooperative vehicles on public roads, the security and reliability of autonomous V2X communication should be verified in advance. In this paper, we present test scenarios and test procedures of secure V2X communication for cooperative automated driving and present verification results.

An Efficient Optimization Technique for Node Clustering in VANETs Using Gray Wolf Optimization

  • Khan, Muhammad Fahad;Aadil, Farhan;Maqsood, Muazzam;Khan, Salabat;Bukhari, Bilal Haider
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4228-4247
    • /
    • 2018
  • Many methods have been developed for the vehicles to create clusters in vehicular ad hoc networks (VANETs). Usually, nodes are vehicles in the VANETs, and they are dynamic in nature. Clusters of vehicles are made for making the communication between the network nodes. Cluster Heads (CHs) are selected in each cluster for managing the whole cluster. This CH maintains the communication in the same cluster and with outside the other cluster. The lifetime of the cluster should be longer for increasing the performance of the network. Meanwhile, lesser the CH's in the network also lead to efficient communication in the VANETs. In this paper, a novel algorithm for clustering which is based on the social behavior of Gray Wolf Optimization (GWO) for VANET named as Intelligent Clustering using Gray Wolf Optimization (ICGWO) is proposed. This clustering based algorithm provides the optimized solution for smooth and robust communication in the VANETs. The key parameters of proposed algorithm are grid size, load balance factor (LBF), the speed of the nodes, directions and transmission range. The ICGWO is compared with the well-known meta-heuristics, Multi-Objective Particle Swarm Optimization (MOPSO) and Comprehensive Learning Particle Swarm Optimization (CLPSO) for clustering in VANETs. Experiments are performed by varying the key parameters of the ICGWO, for measuring the effectiveness of the proposed algorithm. These parameters include grid sizes, transmission ranges, and a number of nodes. The effectiveness of the proposed algorithm is evaluated in terms of optimization of number of cluster with respect to transmission range, grid size and number of nodes. ICGWO selects the 10% of the nodes as CHs where as CLPSO and MOPSO selects the 13% and 14% respectively.

Design of cellular, satellite, and integrated systems for 5G and beyond

  • Kim, Junhyeong;Casati, Guido;Cassiau, Nicolas;Pietrabissa, Antonio;Giuseppi, Alessandro;Yan, Dong;Strinati, Emilio Calvanese;Thary, Marjorie;He, Danping;Guan, Ke;Chung, Heesang;Kim, Ilgyu
    • ETRI Journal
    • /
    • v.42 no.5
    • /
    • pp.669-685
    • /
    • 2020
  • 5G AgiLe and fLexible integration of SaTellite And cellulaR (5G-ALLSTAR) is a Korea-Europe (KR-EU) collaborative project for developing multi-connectivity (MC) technologies that integrate cellular and satellite networks to provide seamless, reliable, and ubiquitous broadband communication services and improve service continuity for 5G and beyond. The main scope of this project entails the prototype development of a millimeter-wave 5G New Radio (NR)-based cellular system, an investigation of the feasibility of an NR-based satellite system and its integration with cellular systems, and a study of spectrum sharing and interference management techniques for MC. This article reviews recent research activities and presents preliminary results and a plan for the proof of concept (PoC) of three representative use cases (UCs) and one joint KR-EU UC. The feasibility of each UC and superiority of the developed technologies will be validated with key performance indicators using corresponding PoC platforms. The final achievements of the project are expected to eventually contribute to the technical evolution of 5G, which will pave the road for next-generation communications.

A Self-Organizing Angle-based Routing Protocol for Urban Environments (도심환경에서의 자율 군집적인 각도 기반 라우팅 프로토콜)

  • Oh, Seungyong;Cho, Keuchul;Kim, Junhyung;Yun, Jeongbae;Seong, Gihyuk;Han, Kijun
    • Journal of Digital Convergence
    • /
    • v.11 no.10
    • /
    • pp.379-385
    • /
    • 2013
  • MANET is not suitable to be applied to vehicle environments because of frequent path loss and path re-routing. To solve these problem, It is known that location-based routing protocol VANET is efficient. But, the VANET algorithm does not consider urban environments due to frequent vehicle movement and jamming by tall building. In this paper, we propose an efficient routing protocol to improve transfer efficiency and reduce transfer hop count. in urban networks.

Design and Evaluation of an Early Intelligent Alert Broadcasting Algorithm for VANETs (차량 네트워크를 위한 조기 지능형 경보 방송 알고리즘의 설계 및 평가)

  • Lee, Young-Ha;Kim, Sung-Tae;Kim, Guk-Boh
    • Journal of Internet Computing and Services
    • /
    • v.13 no.4
    • /
    • pp.95-102
    • /
    • 2012
  • The development of applications for vehicular ad hoc networks (VANETs) has very specific and clear goals such as providing intellectual safe transport systems. An emergency warning technic for public safety is one of the applications which requires an intelligent broadcast mechanism to transmit warning messages quickly and efficiently against the time restriction. The broadcast storm problem causing several packet collisions and extra delay has to be considered to design a broadcast protocol for VANETs, when multiple nodes attempt transmission simultaneously at the access control layer. In this paper, we propose an early intelligent alert broadcasting (EI-CAST) algorithm to resolve effectively the broadcast storm problem and meet time-critical requirement. The proposed algorithm uses not only the early alert technic on the basis of time to collision (TTC) but also the intelligent broadcasting technic on the basis of fuzzy logic, and the performance of the proposed algorithm was compared and evaluated through simulation with the existing broadcasting algorithms. It was demonstrated that the proposed algorithm shows a vehicle can receive the alert message before a collision and have no packet collision when the distance of alert region is less than 4 km.

A Secure Communication Scheme without Trusted RSU Setting for VANET (신뢰 RSU 세팅이 필요 없는 VANET 보안통신 기법)

  • Fei, He;Kun, Li;Kim, Bum-Han;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.75-87
    • /
    • 2010
  • Secure communication has been one of the main challenges in vehicular ad hoc networks(VANET) since broadcast messages from nearby vehicles contain life-critical information for drivers and passengers. So far various secure communication schemes have been proposed to secure the communication in VANET, and they satisfy most security requirements. However most of them need to put trust on roadside units(RSUs), which are usually deployed in unattended area and vulnerable to compromise. In this paper, we propose a secure communication scheme, which does not need to put trust on RSUs. And we adopt a grouping technique to averagely divide the huge burden in the server without jeopardizing the anonymity of users. Moreover we design a complete set of protocols to satisfy common security requirements with a relatively lower hardware requirement. At last, we evaluate the scheme with respect to security requirements, communication overhead, storage overhead and network performance.

Data Transmission Performance Study of Wireless Channels over CCN-based VANETs (CCN 기반의 VANET에서 무선 채널에 따른 전송 성능에 관한 연구)

  • Kang, Seung-Seok
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.4
    • /
    • pp.367-373
    • /
    • 2022
  • VANET (Vehicular Ad hoc NETwork) is one of the special cases of the ad hoc networks in which car nodes communicate with each other and/or with RSUs (Road Side Unit) in order for the drivers to receive nearby road traffic information as well as for the passengers to retrieve nearby gas price or hotel information. In case of constructing VANET over CCN, users do not need to specify a destination server address rather to input a key word such as nearby congestion in order to gather surrounding traffic congestion information. Furthermore, each car node caches its retrieved data for forwarding other nodes when requested. In addition, the data transmission is inherently multicast, which implies fast data propagation to the participating car nodes. This paper measures and evaluates the data transmission performance of the VCCN (VANET over CCN) in which nodes are equipped with diverse wireless communication channels. The simulation result indicates that 802.11a shows the best performance of the data transmission against other wireless channels. Moreover, it indicates that VCCN improves overall data transmission and provides benefit to the nodes that request the same traffic information by exploiting inherent multicast communication.

TCA: A Trusted Collaborative Anonymity Construction Scheme for Location Privacy Protection in VANETs

  • Zhang, Wenbo;Chen, Lin;Su, Hengtao;Wang, Yin;Feng, Jingyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.10
    • /
    • pp.3438-3457
    • /
    • 2022
  • As location-based services (LBS) are widely used in vehicular ad-hoc networks (VANETs), location privacy has become an utmost concern. Spatial cloaking is a popular location privacy protection approach, which uses a cloaking area containing k-1 collaborative vehicles (CVs) to replace the real location of the requested vehicle (RV). However, all CVs are assumed as honest in k-anonymity, and thus giving opportunities for dishonest CVs to submit false location information during the cloaking area construction. Attackers could exploit dishonest CVs' false location information to speculate the real location of RV. To suppress this threat, an edge-assisted Trusted Collaborative Anonymity construction scheme called TCA is proposed with trust mechanism. From the design idea of trusted observations within variable radius r, the trust value is not only utilized to select honest CVs to construct a cloaking area by restricting r's search range but also used to verify false location information from dishonest CVs. In order to obtain the variable radius r of searching CVs, a multiple linear regression model is established based on the privacy level and service quality of RV. By using the above approaches, the trust relationship among vehicles can be predicted, and the most suitable CVs can be selected according to RV's preference, so as to construct the trusted cloaking area. Moreover, to deal with the massive trust value calculation brought by large quantities of LBS requests, edge computing is employed during the trust evaluation. The performance analysis indicates that the malicious response of TCA is only 22% of the collaborative anonymity construction scheme without trust mechanism, and the location privacy leakage is about 32% of the traditional Enhanced Location Privacy Preserving (ELPP) scheme.