Skip to main content

Improved Security Models in Mobile Wireless Vehicle Networks

  • Living reference work entry
  • First Online:
Handbook of Smart Materials, Technologies, and Devices
  • 27 Accesses

Abstract

The recent developments in technology are growing at a faster pace in numerous areas. The world’s first driverless public transport system in vehicles is on the schedule to be implemented in Dubai before EXPO 2020. The majority of research on data collection using wireless mobile vehicle network emphasizes the reliable delivery of information. So far various algorithms have been developed and implanted and different case studies have been conducted till date in the area of VANET. Various algorithms are analyzed such as TDMA, STDMA, and self-adaptive sensing model. The main purpose of the project is to enhance the self-adaptive sensing model. The main areas of concern in self-adaptive sensing model are the security issues. Performance requirements such as packet delivery ratio and delay are not given prime importance, thus making data collection ability of vehicular nodes in real application environment inferior. The security feature was added to self-adaptive sensing model and the performance analysis was carried out. A comparative study of the algorithms was carried and the results were analyzed and evaluated. The comparative analysis on throughput, delay, packet delivery ratio, and routing overhead shows the enhanced capability of secure data collection algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  • Chen LX, Zeng X, Cao Y (2006) Mobile Ad Hoc networking (MANET) – technology of MANET, pp 205–220

    Google Scholar 

  • Fengzhong Q, Wu Z, Wang F-Y, Cho W (2015) A security and privacy review of VANETs, IEEE Trans Intell Transp Syst 1–9

    Google Scholar 

  • He Z, He Y (2010) Study on key technologies of MANET. In: International conference of information science and management engineering, pp 112–115

    Google Scholar 

  • He Y, Yu FR, Wei Z, Leung V (2019) Trust management for secure cognitive radio vehicular ad hoc networks. AdHoc Netw 86:154–165

    Google Scholar 

  • Horng S, Tzeng S-F, Pan Y (2013) B-specs+: batch verification for secure pseudonymous authentication in Vanet. IEEE Tran Inf Forensics Secur 8(11):1860–1875

    Article  Google Scholar 

  • Hubaux J, Capkun S, Epfl J (2004) The security and privacy of smart vehicles. IEEE Secur Priv 2(3):49–55

    Article  Google Scholar 

  • Jiun H, Lo Y, Hung C (2011) ABAKA: an anonymous batch authenticated and key agreement scheme for value-added services in vehicular Ad Hoc networks. IEEE Trans Veh Technol 60(1):248–262

    Article  Google Scholar 

  • Johnson D, Menezes A, Vanstone S (2001) The elliptic curve digital signature algorithm (ECDSA). Int J Inf Secur 5:36–63

    Article  Google Scholar 

  • Liang W, Zhiqiang RUAN, Mingdong TANG, Peng LI (2016) A secure efficient data collection algorithm based on self-adaptive sensing model in mobile internet of vehicles. 52:121–129

    Google Scholar 

  • Lin X, Sun X, Ho P, Shen X (2007) GSIS: a secure and privacy preserving protocol for vehicular communications. IEEE Trans Veh Technol 56(6):3442–3456

    Article  Google Scholar 

  • Liu M, Li ZC, Guo XB, Dutkiewicz E, Zhang DK (2006) Performance evaluation of vertical handoff decision algorithms in heterogeneous wireless networks. IEEE Syst J 5:1–10

    Google Scholar 

  • Ming W, Dan L, Lie Z, Yong X, Fei W (2014) LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication. Computing 1:133–139

    Google Scholar 

  • Pal PK, Chatterjee P (2014) A survey on TDMA-based MAC protocols for wireless sensor network. Int J Emerg Technol Adv Eng 4(6):43–50

    Google Scholar 

  • Papadimitratos P, La Fortelle A, Evensen K, Brignolo R, Cosenza S (2009) Vehicular communication systems: enabling technologies, applications, and future outlook on intelligent transportation. IEEE Commun Magazine 47:553–559

    Article  Google Scholar 

  • Raya M, Hubaux J (2005) The security of vehicular ad hoc networks. Laboratory for computer Communications and Applications (LCA), pp. 11–21

    Google Scholar 

  • Samara G, Salihy W, Sures R(2010) Security analysis of vehicular ad hoc networks. In: Second international conference on network applications, protocols and services, pp 55–60

    Google Scholar 

  • Sato K, Sakata S (2013) A power-efficient distributed TDMA scheduling algorithm with distance-measurement for wireless sensor networks. Wireless Pers Commun 75:1012–1017

    Google Scholar 

  • Sheikh MS, Liang J, Wang W (2020) Security and privacy in vehicular Ad Hoc network and vehicle cloud computing: a survey. Wirel Commun Mob Comput 2020

    Google Scholar 

  • Studer A, Bai F, Bellur B, Perrig A (2009) Flexible, extensible, and efficient VANET authentication. J Commun Netw 11(6):574–588

    Article  Google Scholar 

  • Verenzuela D, Liu C, Lu W, Shi L (2014) Improving scalability of vehicle-to- vehicle communication with prediction-based STDMA. Vehic Technol Conf IEEE 58:1–5

    Google Scholar 

  • Verma A, Saha R, Kumar G (2021) The security perspectives of vehicular networks: a taxonomical analysis of attacks and solutions. Appl Sci 11:1–25

    Google Scholar 

  • Wang S, Fan C, Hsu C-H, Sun Q, Yang F (2014) A vertical handoff method via self-selection decision tree for internet of vehicles. IEEE Syst J 2:99–105

    Google Scholar 

  • Willke T, Tientrakool P, Maxemchukv N (2009) A survey of inter-vehicle communication protocols and their applications. IEEE Commun Surv Tutorial 11:1–6

    Article  Google Scholar 

  • Ylianttila M, Pande M, Makela J, Mahonen P (2001) Optimization scheme for mobile users performing vertical handoffs between IEEE 802.11 and GPRS/EDGE networks. Glob Telecommun Conf 50:120–125

    Google Scholar 

  • Younis O, Krunz M, Ramasubramanian S (2006) Node clustering in wireless sensor networks: recent developments and deployment challenges. IEEE Netw 20:20–25

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive licence to Springer Nature Switzerland AG

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Sheela K, G. (2021). Improved Security Models in Mobile Wireless Vehicle Networks. In: Hussain, C.M., Di Sia, P. (eds) Handbook of Smart Materials, Technologies, and Devices. Springer, Cham. https://doi.org/10.1007/978-3-030-58675-1_28-1

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-58675-1_28-1

  • Received:

  • Accepted:

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-58675-1

  • Online ISBN: 978-3-030-58675-1

  • eBook Packages: Springer Reference EngineeringReference Module Computer Science and Engineering

Publish with us

Policies and ethics