Repository logo
  • English
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Log In
    or
    New user? Click here to register.Have you forgotten your password?
Repository logo
  • Communities & Collections
  • Research Outputs
  • Projects
  • People
  • Statistics
  • English
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Log In
    or
    New user? Click here to register.Have you forgotten your password?
  1. Home
  2. Scholalry Output
  3. Publications
  4. VCom: Secure and Efficient Vehicle-to-Vehicle Message Communication Protocol
 
  • Details
Options

VCom: Secure and Efficient Vehicle-to-Vehicle Message Communication Protocol

Date Issued
2021-06-01
Author(s)
Limbasiya, Trupil
Das, Debasis
DOI
10.1109/TNSM.2020.3042526
Abstract
Vehicles are especially capable of exchanging pertinent information with nearby vehicles. However, there are multiple challenges like secure data exchange, fast message transmission, dynamic topology, and user data protection while transmitting relevant information between moving vehicles on the road. Therefore, researchers suggested different vehicle-to-vehicle (V2V) message communication and verification mechanisms, but they are vulnerable to crucial security attacks. Furthermore, the existing V2V communication schemes relatively require high operational costs for the implementation, taking more time and computational resources for road safety and traffic data exchanges. In this article, we propose a secure and efficient V2V message communication protocol (named as VCom) for vehicle users using a low-cost function (i.e., SHA-256) while preserving user anonymity. The security proof and analysis are discussed for the VCom to confirm its security and user privacy strengths against different security attributes and attacks. The test-bed implementation results show that the VCom is comparatively efficient in the computational cost, communication overhead, storage cost, and energy consumption.
Subjects
  • Attack

  • communication protoco...

  • operational efficienc...

  • security

  • user anonymity

Copyright © 2016-2025  Indian Institute of Technology Jodhpur

Developed and Maintaining by S. R. Ranganathan Learning Hub, IIT Jodhpur.

Built with DSpace-CRIS software - Extension maintained and optimized by 4Science

  • Cookie settings
  • Privacy policy
  • End User Agreement
  • Send Feedback