iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://doi.org/10.1007/s11227-016-1932-3
A secret push messaging service in VANET clouds | The Journal of Supercomputing Skip to main content

Advertisement

Log in

A secret push messaging service in VANET clouds

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

The vehicular ad hoc network (VANET) is related to the very nature of wireless communications and the rapid movement of the vehicles; therefore, network security is a critical concern for designers of VANET clouds. The main issues to be addressed in this paper are how to provide future VANET clouds with more safety, more effectiveness and more correct messaging services—especially when there is traffic congestion and accidents, message effectiveness and correct transfer. Even though tens of kilometers away from the accident, other vehicles are informed of situations with road traffic accidents through the on-board unit devices and then given recommended travel routes and related suggestions. This will significantly improve traffic flow and provide better quality of traffic. Cryptography in this paper will be discussed to meet the vehicle privacy and information security needs, as well as bilinear pairing function to solve security problems. In performance, it is expected to reduce more than 25% of the message delivery times, and when the vehicle passes through more roadside units, more than half of the message can reduce delivery times if the number of RSUs is more than 50. In security, the key is effective protection, with only authorized vehicles verified to get the message and meet forward secrecy, backward security and avoid replay attack, Sybil attack and other threats.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Cseh C (1998) Architecture of the dedicated short-range communications (DSRC) protocol. In: Vehicular Technology Conference, IEEE 48th, vol 3, pp 2095–2099

  2. Torrent-Moreno M, Mittag J, Santi P, Hartenstein H (2009) Vehicle-to-vehicle communication: fair transmit power control for safety-critical information. Veh Technol IEEE Trans 58(7):3684–3703

    Article  Google Scholar 

  3. Wang N-W, Huang Y-M, Chen W-M (2008) A novel secure communication scheme in vehicular ad hoc networks. Comput Commun 31(12):2827–2837

    Article  Google Scholar 

  4. Biswas S, Tatchikou R, Dion F (2006) Vehicle-to-vehicle wireless communication protocols for enhancing highway traffic safety. Commun Mag IEEE 44(1):74–82

    Article  Google Scholar 

  5. Bai F, Elbatt T, Hollan G, Krishnan H, Sadekar V (2006) Towards characterizing and classifying communication-based automotive applications from a wireless networking perspective. In: Proceedings of IEEE Workshop on Automotive Networking and Applications, pp 1–25

  6. Raya M, Hubaux J-P (2007) Securing vehicular ad hoc networks. J Comput Secur 15(1):39–68

    Article  Google Scholar 

  7. Blum JJ, Eskandarian A (2009) Avoiding timeslot boundary synchronization for multihop message broadcast in vehicular networks. In: Vehicular Technology Conference, IEEE 69th, pp 1–5

  8. Hussain R, Son J, Eun H, Kim S, Oh H (2012) Rethinking vehicular communications: Merging VANET with cloud computing. In Cloud Computing Technology and Science (CloudCom). In: IEEE 4th International Conference on (pp 606–609). IEEE

  9. Menezes AJ, Okamoto T, Vanstone SA (1993) Reducing elliptic curve logarithms to logarithms in a finite field. Inf Theory IEEE Trans 39(5):1639–1646

    Article  MathSciNet  MATH  Google Scholar 

  10. Boneh D, Franklin M (2001) Identity-based encryption from the Weil pairing. In: Advances in Cryptology—CRYPTO, pp 213–229

  11. Diffie W, Hellman M (1976) New directions in cryptography. Inf Theory IEEE Trans 22(6):644–654

    Article  MathSciNet  MATH  Google Scholar 

  12. Chen H-B, Hsueh S-C (2003) Light-weight authentication and billing in mobile communications. In: Security Technology, IEEE 37th Annual International Carnahan Conference on, pp 245–252

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wei-Chen Wu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wu, WC. A secret push messaging service in VANET clouds. J Supercomput 73, 3085–3097 (2017). https://doi.org/10.1007/s11227-016-1932-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-016-1932-3

Keywords

Navigation