On secure, privacy-aware, and efficient beacon broadcasting among one-hop neighbors in VANETs
- Authors
- Rasheed Hussain; Zeinab Rezaeifar; Kim, Donghyun; Alade O. Tokuta; Oh, Heekuck
- Issue Date
- Oct-2014
- Publisher
- Institute of Electrical and Electronics Engineers Inc.
- Keywords
- beacons; Cooperative comm; Effective transmission range; Nonline-of-sight; VANET
- Citation
- Proceedings - IEEE Military Communications Conference MILCOM, pp 1427 - 1434
- Pages
- 8
- Indexed
- SCIE
SCOPUS
- Journal Title
- Proceedings - IEEE Military Communications Conference MILCOM
- Start Page
- 1427
- End Page
- 1434
- URI
- https://scholarworks.bwise.kr/erica/handle/2021.sw.erica/25437
- DOI
- 10.1109/MILCOM.2014.236
- ISSN
- 2155-7578
2155-7586
- Abstract
- Many Vehicular Ad Hoc Network (VANET) applications achieve a decent packet delivery ratio using mobility information in the beacon messages broadcasted to the single hop neighbours. Recently it has been found that if two VANET nodes are not within a line of sight (LoS), the performance of the employed VANET applications can be significantly degraded. Most of the existing VANET researches assume the ideal effective transmission range which does not consider Non-LoS (NLoS) scenario. To fill this gap, this paper provides a new mechanism: (a) to keep the track of the LoS status of individual vehicles on the road (b) to make sure that even in case of NLoS, vehicles maintain their communication with neighbors, and (c) to preserve the location confidentiality and privacy of the users conditionally at all times during communication. We propose a beacons-assisted plausibility-based technique to figure out NLoS status and a cooperative mechanism to guarantee a smooth communication between vehicles in case of NLoS. In case of NLoS, the affected vehicles raise alarms through their beacons and the neighbors with clear LoS to the target vehicles provide the affected vehicle with desired information. Moreover we maintain privacy-aware neighbor lists and location-based encryption for the aforementioned purpose and take the security of privacy of the whole system into account. © 2014 IEEE.
- Files in This Item
-
Go to Link
- Appears in
Collections - COLLEGE OF COMPUTING > ERICA 컴퓨터학부 > 1. Journal Articles

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.