VABLOCK: A blockchain-based secure communication in V2V network using icn network support technology
نویسندگان
چکیده
Vehicular Ad hoc Network (VANET) provides efficient communication among vehicles (V2V). The all the complies with on-demand, which contains a secure and trustable mechanism to ensure communication. modification in information may result falsified information. Secure data is very important V2V save lives of pedestrians drives by delivering accurate To address problem achieve V2V, we proposed new blockchain-based message dissemination technique With passive need for adaptable sufficient content delivery, information-centric networking (ICN) adopted enhance trustworthiness VANET. We used Cluster-based through ICN-based VANETs. As VANET open, ICN direct requests responses without location dependency. enhances caching abilities. security protocol implemented altering messages. achieves privacy, security, trust detecting malicious nodes Additionally, Clustering applied adopt in-range Proposed-Caching framework on-demand vehicles. NS-2 simulator simulate Proposed VABLOCK approach. Experimental results are performed compared relevant techniques, show enhanced based on cache hit ratio, one hop count, node detection, delivery ratio. demonstrate that improves selected parameters results.
منابع مشابه
V2V communication survey wireless technology
This paper presents the specific application of wireless communication, Automotive Wireless Communication_ also called as Vehicle-to-Vehicle Communication. The paper first gives an introduction to the Automotive Wireless Communication. It explains the technology used for Automotive Wireless Communication along with the various automotive applications relying on wireless communication. Automotiv...
متن کاملNew High Secure Network Steganography Method Based on Packet Length
In network steganography methods based on packet length, the length of the packets is used as a carrier for exchanging secret messages. Existing methods in this area are vulnerable against detections due to abnormal network traffic behaviors. The main goal of this paper is to propose a method which has great resistance to network traffic detections. In the first proposed method, the sender embe...
متن کاملA Secure Shopping Experience Based on Blockchain and Beacon Technology
The present work proposes a novel approach for a future shopping system. Customers’ personal data are protected by a blockchainbased storage network. Based on the bitcoin protocol, the system transacts encrypted data in a tamper-proof way and is able to run secure multiparty computations while no one but the data owner has access to the input data. Thus, a potential customer is able to allow a ...
متن کاملAutonomous Certification with List-Based Revocation for Secure V2V Communication
Privacy and authenticity are two essential security attributes of secure Vehicle-to-Vehicle communications. Pseudonymous Public Key Infrastructure (PPKI), an extension of standard PKI, has been proposed to achieve these security attributes. In Pseudonymous PKI, a user needs certificates or pseudonyms periodically from the Certificate Authority (CA) to authenticate messages anonymously. But the ...
متن کاملSecure Communication System over a GSM Network
As standard GSM protection methods are now well-known to be insecure, we have designed a new secure communication system over GSM network which is developed using the Symbian OS platform. It uses standard cryptographic methods such as key generators, key exchange protocols and public and private key cipher algorithms. This system allows communicating text, voice and any kind of data securely ov...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Microprocessors and Microsystems
سال: 2022
ISSN: ['0141-9331', '1872-9436']
DOI: https://doi.org/10.1016/j.micpro.2022.104569