Premium
Enhancing the security and performance of nodes in Internet of Vehicles
Author(s) -
Vijayarangam S.,
Chandra Babu Gokulnath,
Ananda Murugan S.,
Kalpa.,
Malarvizhi Kumar Priyan
Publication year - 2018
Publication title -
concurrency and computation: practice and experience
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.309
H-Index - 67
eISSN - 1532-0634
pISSN - 1532-0626
DOI - 10.1002/cpe.5080
Subject(s) - the internet , computer science , vehicle information and communication system , vehicular ad hoc network , computer security , computer network , floating car data , transfer (computing) , wireless ad hoc network , transport engineering , traffic congestion , engineering , telecommunications , road traffic , wireless , world wide web , parallel computing
Summary Internet of Vehicles is recorded as an ever growing area for connected vehicles to exchange their information with other vehicles using vehicle‐to‐vehicle communication. Vehicle‐to‐vehicle communication is possible by forming vehicular ad hoc networks, with the help of roadside units using vehicle‐to‐roadside communications in the network. Internet of networks has many advantages such as road safety, traffic management, and sharing information on daily traffic and updating traffic information. For example, the Internet of Vehicles can be used to reduce traffic and deaths occurring due to road accidents, to reduce the fuel needed, and to reduce travel time. Interconnected vehicles rapidly learn about road conditions and traffic and respond to the driver; thus, necessary actions are taken. However, the attacker can modify the information in the connected vehicles and, thus, creates problem on the road. Data fascination is one of the main attacks on connected vehicles where connected vehicles take action based on information from the other vehicle. In this paper, first, a model has been proposed to detect the data fascination attack using the hashing technique to enhance the security in the interconnected vehicles by adjusting the size of the contention window to transfer original information to other interconnected vehicles at the correct time. Second, a model has been suggested to reduce the travel time in case of traffic congestion. The efficiency of the proposed model is checked using numerical methods obtained from the simulation results. From the obtained results, the proposed approach prevents data fascination attacks in interconnected vehicles and provides high throughput with lower delay.