A Data-Centric Approach to Taming the Message Dissemination in the Internet of Vehicles

The Internet of Vehicles (IoV) aims to establish a network of autonomous and connected vehicles that communicate with one another and with road-side units (RSUs) and a central trust authority (TA). Messages must be efficiently and securely disseminated to conserve resources and preserve network security. Currently, there is much research on the security schemes and methods of disseminating messages. Furthermore, there is a deficiency of information regarding resource optimization. This paper takes an interdisciplinary approach by merging both cybersecurity and data science to optimize and secure the network. The proposed method applies Prim's algorithm to an existing vehicular security scheme, Privacy-Preserving Dual Authentication Scheme (PPDAS), to further network efficiency in terms of time consumption. When a dual authentication security scheme is in place, the time taken for message dissemination follows a quadratic growth; applying Prim's algorithm to the security scheme reduces the time to disseminate messages to a linear growth. The number of messages sent was decreased by a magnitude of up to 44.57. Contemporary security schemes are compared with PPDAS to justify the overhead consumption. The usage of network resources, such as time, is reduced, which substantially enhances the performance of the vehicular network and allows for the scalability of the IoV.

[1]  Christoph Schmittner,et al.  Status of the Development of ISO/SAE 21434 , 2018, EuroSPI.

[2]  Marco Fiore,et al.  Worm Epidemics in Vehicular Networks , 2015, IEEE Transactions on Mobile Computing.

[3]  Haowen Tan,et al.  Comments on “Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks” , 2018, IEEE Transactions on Intelligent Transportation Systems.

[4]  Ivana Tomić,et al.  A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols , 2017, IEEE Internet of Things Journal.

[5]  Baruch Awerbuch,et al.  Approximate distributed Bellman-Ford algorithms , 1994, IEEE Trans. Commun..

[6]  Sherali Zeadally,et al.  Internet of Vehicles: Architecture, Protocols, and Security , 2018, IEEE Internet of Things Journal.

[7]  Hui Li,et al.  A Lightweight Anonymous Authentication Scheme for VANET Based on Bilinear Pairing , 2012, 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems.

[8]  Ping Wang,et al.  On the Challenges in Designing Identity-Based Privacy-Preserving Authentication Schemes for Mobile Devices , 2018, IEEE Systems Journal.

[9]  Changle Li,et al.  A Topological Approach to Secure Message Dissemination in Vehicular Networks , 2018, IEEE Transactions on Intelligent Transportation Systems.

[10]  Hamed Noori,et al.  Modeling the impact of VANET-enabled traffic lights control on the response time of emergency vehicles in realistic large-scale urban area , 2013, 2013 IEEE International Conference on Communications Workshops (ICC).

[11]  Shahram Latifi,et al.  Securing the positioning signals of autonomous vehicles , 2017, 2017 IEEE International Conference on Big Data (Big Data).

[12]  Ross Maciejewski,et al.  Visual Analytics of Mobility and Transportation: State of the Art and Further Research Directions , 2017, IEEE Transactions on Intelligent Transportation Systems.

[13]  Arputharaj Kannan,et al.  Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.

[14]  Yong Liang Guan,et al.  Performance Analysis of IEEE 802.11p Safety Message Broadcast With and Without Relaying at Road Intersection , 2018, IEEE Access.

[15]  Hui Li,et al.  PPAS: privacy protection authentication scheme for VANET , 2013, Cluster Computing.

[16]  Shahram Latifi,et al.  A Raspberry-Pi Prototype of Smart Transportation , 2017, 2017 25th International Conference on Systems Engineering (ICSEng).

[17]  Sanjit Krishnan Kaul,et al.  Minimizing age of information in vehicular networks , 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[18]  Yanbing Liu,et al.  Efficient Privacy-Preserving Dual Authentication and Key Agreement Scheme for Secure V2V Communications in an IoV Paradigm , 2017, IEEE Transactions on Intelligent Transportation Systems.

[19]  Yujun Kuang,et al.  VANET Cluster-on-Demand Minimum Spanning Tree (MST) Prim clustering algorithm , 2013, 2013 International Conference on Computational Problem-Solving (ICCP).

[20]  Zhang Huanguo,et al.  Toward an RSU-unavailable lightweight certificateless key agreement scheme for VANETs , 2014, China Communications.

[21]  Rafia Inam,et al.  A2CPS: A Vehicle-Centric Safety Conceptual Framework for Autonomous Transport Systems , 2018, IEEE Transactions on Intelligent Transportation Systems.

[22]  George Dimitrakopoulos,et al.  Intelligent transportation systems based on internet-connected vehicles: Fundamental research areas and challenges , 2011, 2011 11th International Conference on ITS Telecommunications.

[23]  Mauro Conti,et al.  A Survey of Man In The Middle Attacks , 2016, IEEE Communications Surveys & Tutorials.

[24]  Ozan K. Tonguz,et al.  Broadcast storm mitigation techniques in vehicular ad hoc networks , 2007, IEEE Wireless Communications.

[25]  Said Benkirane,et al.  Performance Evaluation of IEEE 802.11p and IEEE 802.16e for Vehicular Ad Hoc Networks Using Simulation Tools , 2018, 2018 IEEE 5th International Congress on Information Science and Technology (CiSt).

[26]  Kishwer Abdul Khaliq,et al.  Novel message dissemination mechanism and mathematical model for safety applications in VANET , 2017, 2017 11th International Conference on Software, Knowledge, Information Management and Applications (SKIMA).