VABLOCK: A blockchain-based secure communication in V2V network using icn network support technology

نویسندگان

چکیده

Vehicular Ad hoc Network (VANET) provides efficient communication among vehicles (V2V). The all the complies with on-demand, which contains a secure and trustable mechanism to ensure communication. modification in information may result falsified information. Secure data is very important V2V save lives of pedestrians drives by delivering accurate To address problem achieve V2V, we proposed new blockchain-based message dissemination technique With passive need for adaptable sufficient content delivery, information-centric networking (ICN) adopted enhance trustworthiness VANET. We used Cluster-based through ICN-based VANETs. As VANET open, ICN direct requests responses without location dependency. enhances caching abilities. security protocol implemented altering messages. achieves privacy, security, trust detecting malicious nodes Additionally, Clustering applied adopt in-range Proposed-Caching framework on-demand vehicles. NS-2 simulator simulate Proposed VABLOCK approach. Experimental results are performed compared relevant techniques, show enhanced based on cache hit ratio, one hop count, node detection, delivery ratio. demonstrate that improves selected parameters results.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

V2V communication survey wireless technology

This paper presents the specific application of wireless communication, Automotive Wireless Communication_ also called as Vehicle-to-Vehicle Communication. The paper first gives an introduction to the Automotive Wireless Communication. It explains the technology used for Automotive Wireless Communication along with the various automotive applications relying on wireless communication. Automotiv...

متن کامل

New High Secure Network Steganography Method Based on Packet Length

In network steganography methods based on packet length, the length of the packets is used as a carrier for exchanging secret messages. Existing methods in this area are vulnerable against detections due to abnormal network traffic behaviors. The main goal of this paper is to propose a method which has great resistance to network traffic detections. In the first proposed method, the sender embe...

متن کامل

A Secure Shopping Experience Based on Blockchain and Beacon Technology

The present work proposes a novel approach for a future shopping system. Customers’ personal data are protected by a blockchainbased storage network. Based on the bitcoin protocol, the system transacts encrypted data in a tamper-proof way and is able to run secure multiparty computations while no one but the data owner has access to the input data. Thus, a potential customer is able to allow a ...

متن کامل

Autonomous Certification with List-Based Revocation for Secure V2V Communication

Privacy and authenticity are two essential security attributes of secure Vehicle-to-Vehicle communications. Pseudonymous Public Key Infrastructure (PPKI), an extension of standard PKI, has been proposed to achieve these security attributes. In Pseudonymous PKI, a user needs certificates or pseudonyms periodically from the Certificate Authority (CA) to authenticate messages anonymously. But the ...

متن کامل

Secure Communication System over a GSM Network

As standard GSM protection methods are now well-known to be insecure, we have designed a new secure communication system over GSM network which is developed using the Symbian OS platform. It uses standard cryptographic methods such as key generators, key exchange protocols and public and private key cipher algorithms. This system allows communicating text, voice and any kind of data securely ov...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Microprocessors and Microsystems

سال: 2022

ISSN: ['0141-9331', '1872-9436']

DOI: https://doi.org/10.1016/j.micpro.2022.104569