Abstract

Intelligent Transportation System (ITS) and Internet of Vehicles (IoV) allows the vehicles to disseminate and exchange various messages among nearby vehicles in the network. It includes road safety, road accidents, location sharing, driver assistance, navigation, collision warning, traffic data, and toll payment. Moreover, the exchange of these messages is carried out in an insecure channel. Hence, it leads to several issues during transmission of these messages in resource constrained IoV networks. It includes reliable data dissemination, dynamic topology, mobility of the vehicles, vehicle user’s privacy, and lightweight authentication mechanism. The existing Vehicle to Vehicle (V2V) data dissemination techniques have limitations in security attacks such as side channel, device stolen, cloning attacks, high computational overhead, throughput, and high communication cost. In this article, we propose P <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</sup> IoV: Privacy Preserving Lightweight Secure (V2V) Data Dissemination Scheme for IoV environment using lightweight cryptographic primitives such as SHA-256, concatenation and XoR operation. We evaluate P <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</sup> IoV in terms of security and vehicle user’s privacy against several security attacks. We do an in-depth security analysis of the P <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</sup> IoV by using informal security analysis and provides security proofs. We also perform a comparative analysis of P <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</sup> IoV with the existing state-of-the-art IoV environment using various performance parameters. The test-bed experimental result shows that P <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</sup> IoV outperforms the existing V2V data dissemination technique in terms of computational cost, communication overhead, and energy consumption.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call