Abstract

Intelligent Transportation System (ITS) and Internet of Vehicles (IoV) allows the vehicles to disseminate and exchange various messages among nearby vehicles in the network. It includes road safety, road accidents, location sharing, driver assistance, navigation, collision warning, traffic data, and toll payment. Moreover, the exchange of these messages is carried out in an insecure channel. Hence, it leads to several issues during transmission of these messages in resource constrained IoV networks. It includes reliable data dissemination, dynamic topology, mobility of the vehicles, vehicle user’s privacy, and lightweight authentication mechanism. The existing Vehicle to Vehicle (V2V) data dissemination techniques have limitations in security attacks such as side channel, device stolen, cloning attacks, high computational overhead, throughput, and high communication cost. In this article, we propose P <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</sup> IoV: Privacy Preserving Lightweight Secure (V2V) Data Dissemination Scheme for IoV environment using lightweight cryptographic primitives such as SHA-256, concatenation and XoR operation. We evaluate P <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</sup> IoV in terms of security and vehicle user’s privacy against several security attacks. We do an in-depth security analysis of the P <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</sup> IoV by using informal security analysis and provides security proofs. We also perform a comparative analysis of P <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</sup> IoV with the existing state-of-the-art IoV environment using various performance parameters. The test-bed experimental result shows that P <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</sup> IoV outperforms the existing V2V data dissemination technique in terms of computational cost, communication overhead, and energy consumption.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.