CFP last date
20 January 2025
Reseach Article

Security Enhancement in IoV using User and Vehicle Certification

by Akansha Singh, Shiva Prakash
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 183 - Number 21
Year of Publication: 2021
Authors: Akansha Singh, Shiva Prakash
10.5120/ijca2021921586

Akansha Singh, Shiva Prakash . Security Enhancement in IoV using User and Vehicle Certification. International Journal of Computer Applications. 183, 21 ( Aug 2021), 49-54. DOI=10.5120/ijca2021921586

@article{ 10.5120/ijca2021921586,
author = { Akansha Singh, Shiva Prakash },
title = { Security Enhancement in IoV using User and Vehicle Certification },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2021 },
volume = { 183 },
number = { 21 },
month = { Aug },
year = { 2021 },
issn = { 0975-8887 },
pages = { 49-54 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume183/number21/32053-2021921586/ },
doi = { 10.5120/ijca2021921586 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:17:28.941086+05:30
%A Akansha Singh
%A Shiva Prakash
%T Security Enhancement in IoV using User and Vehicle Certification
%J International Journal of Computer Applications
%@ 0975-8887
%V 183
%N 21
%P 49-54
%D 2021
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Internet of Vehicles (IoV) provides new opportunities for the coordination of vehicles for enhancing and improving safety and transformation performance because many accidents occur in road. So, safety plays an important role. To prevent the vehicle from hijacked this proposed model is designed. If it was discussed about the authentication of vehicles, then there are protocols proposed by another author, but does not work of authentication of the vehicular user in the network. so, to remove this drawback this proposed model is discussed. This ASC protocol is used for vehicular user authentication and certificate used for vehicle authentication and also to avoid collision due to unnecessary delivery of messages. Both ASC protocol and certificate are combined for the authenticity of vehicular user and vehicle. To verify this protocol working condition Example, flowchart and algorithms are discussed for the authenticity of vehicle and user. This proposed approach is verified by using the SUMO (Simulator for Urban Mobility) simulator and NETEDIT ID. Result and analysis has also discussed this dissertation.

References
  1. Patel, K.K., Patel, S.M., and Scholar, P.G. ,” Internet of Things-IOT: Definition, Characteristics, Architecture, Enabling Technologies, Application & Future Challenges”. International Journal of Engineering Science and Computing 6, 1–10,2016.
  2. Hegyi, A., De Schutter, B., & Hellendoorn, J. (2005). Optimal coordination of variable speed limits to suppress shock waves. Intelligent Transportation Systems, IEEE Transactions on, 6, 102-112.
  3. T. Schmidt, R. Philipsen, P. Themann, and M. Ziefle, “Public perception of V2X-technology - evaluation of general advantages, disadvantages and reasons for data sharing with connected vehicles,” in IEEE Intelligent Vehicles Symposium, Jun. 2016, pp. 1344 – 1349.
  4. Z. H. Gu, G. Han, H. B. Zeng, and Q. L. Zhao, “Securityaware mapping and scheduling with hardware co-processors for flexray-based distributed embedded systems,” IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 10, pp. 3044–3057, Oct. 2016.
  5. O. Kaiwartya, A. H. Abdullah, Y. Cao, A. Altameem, M. Prasad, C.-T. Lin, and X. Liu, “Internet of vehicles: Motivation, layered architecture, network model, challenges, and future aspects,” IEEE Access, vol. 4, pp. 5356–5373, 2016.
  6. Aliedani and S. W. Loke, “Cooperative car parking using vehicle-to-vehicle communication: An agent-based analysis,” Computers, Environment and Urban Systems, p. https://doi.org/10.1016/j.compenvurbsys.2018.06.002, 2018.
  7. K. Grover, A. Lim, S. Lee, and Q. Yang, “Privacy-enabled probabilistic verification in broadcast authentication for vehicular Networks,” Ad Hoc and Sensor Wireless Networks, vol. 32, no. 3–4, pp. 239–274, 2016.
  8. García-Magariño, G. Palacios-Navarro, R. Lacuesta, and J. Lloret, “ABSCEV: An agent-based simulation framework about smart transportation for reducing waiting times in charging electric vehicles,” Computer Networks, vol. 138, pp. 119–135, 2018.
  9. Chaogang Tang, Xianglin Wei, Chunsheng Zhi, Wei Chen,Joel J. P. C. Rodrigues,” Towards Smart Parking Based on Fog Computing” ,IEEEAccess, 2018.
  10. Joonsang Yoo and Jeong Hyun Yi,” Code-Based Authentication Scheme for Lightweight Integrity Checking of Smart Vehicles “, IEEE Journal, 2018.
  11. CHIEN-MING CHEN, BIN XIANG, YINING LIU and KING-HANG WANG, “A Secure Authentication Protocol for internet of vehicle”, IEEE Access, Volume 7, January 2019, page number 12047-12056.
  12. Bidi Ying, Amiya Nayak, “Ananymous and lightweight authentication for secure vehicular network”, IEEE TRANSACTION ON VEHICULAR TECHNOLOGY, VOL 66, DECEMBER 2017.
Index Terms

Computer Science
Information Sciences

Keywords

Internet of vehicle Vehicular user Vehicles Roadside Unit Trust Authorities