Table of Contents Author Guidelines Submit a Manuscript
Journal of Computer Networks and Communications
Volume 2019, Article ID 8568912, 14 pages
https://doi.org/10.1155/2019/8568912
Research Article

Safety Message Verification Using History-Based Relative-Time Zone Priority Scheme

1School of Information, Computer, and Communication Technology, Sirindhorn International Institute of Technology, Thammasat University, Pathum Thani, Thailand
2National Electronics and Computer Technology Center, Pathum Thani, Thailand
3School of Engineering and Technology CQUniversity, Cairns, Australia

Correspondence should be addressed to Somsak Kittipiyakul; ht.ca.ut.tiis@kasmos

Received 25 December 2018; Accepted 18 February 2019; Published 12 March 2019

Academic Editor: Youyun Xu

Copyright © 2019 Sam Banani et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. WHO, Global status report on road safety 2015, 2015, http://www.who.int/violence_injury_prevention/road_safety_status/2015/en/.
  2. DOT HS 812 115, Critical Reasons for Crashes Investigated in the National Motor Vehicle Crash Causation Survey, 2015.
  3. M. Risto and M. H. Martens, “Time and Space: the difference between following time headway and distance headway instructions,” Transportation Research Part F: Traffic Psychology and Behaviour, vol. 17, pp. 45–51, 2013. View at Publisher · View at Google Scholar · View at Scopus
  4. P. G. Michael, F. C. Leeming, and W. O. Dwyer, “Headway on urban streets: observational data and an intervention to decrease tailgating,” Transportation Research Part F: Traffic Psychology and Behaviour, vol. 3, no. 2, pp. 55–64, 2000. View at Publisher · View at Google Scholar · View at Scopus
  5. IVTS, “IEEE guide for wireless access in vehicular environments (WAVE)-architecture,” in IEEE Std 1609.0-2013, IEEE, New York, NY, USA, 2014. View at Google Scholar
  6. DoT, Vehicle Safety Communications-Applications (VSC-A) Final Report (DOT HS 811 492A), 2011, DOT HS 811 492A.
  7. NHTSA, DOT HS 812 014, Vehicle-to-Vehicle Communications: Readiness of V2V Technology for Application, 2014.
  8. NHTSA, The CAMP Vehicle Safety Communications Consortium, Vehicle Safety Communications Project, Task 3 Final Report, Identify Intelligent Vehicle Safety Applications Enabled by DSRC, US Department of Transportation, Washington, DC, USA, 2005, Tech. Rep. DOT HS 809 859.
  9. C. L. Robinson, L. Caminiti, D. Caveney, and K. Laberteaux, “Efficient coordination and transmission of data for cooperative vehicular safety applications,” in Proceedings of the 3rd International Workshop on Vehicular Ad Hoc Networks, pp. 10–19, New York, NY, USA, 2006.
  10. S. Biswas and J. Misic, “A cross-layer approach to privacy-preserving authentication in WAVE-enabled VANETs,” IEEE Transactions on Vehicular Technology, vol. 62, no. 5, pp. 2182–2192, 2013. View at Publisher · View at Google Scholar · View at Scopus
  11. S. Biswas and J. Misic, “Relevance-based verification of VANET safety messages,” in Proceedings of the International Conference on Communications, pp. 5124–5128, Xi’an, China, January 2012.
  12. Z. Li and C. Chigan, “On resource-aware message verification in VANETs,” in Proceedings of the International Conference on Communications, pp. 1–6, Cape Town, South Africa, May 2010.
  13. E. B. Hamida, M. Javed, and W. Znaidi, “Adaptive security provisioning for vehicular safety applications,” Space-Based and Situated Computing, vol. 1, 2017. View at Google Scholar
  14. E. B. Hamida and M. A. Javed, “Channel-aware ECDSA signature verification of basic safety messages with K-means clustering in VANETs,” in Proceedings of the Advanced Information Networking and Applications, pp. 603–610, Crans-Montana, Switzerland, March 2016.
  15. S. Banani, S. Gordon, S. Thiemjarus, and K. Somsak, “Verifying safety messages using relative-time and zone priority in vehicular Ad hoc networks,” Sensors, vol. 18, 2018. View at Publisher · View at Google Scholar · View at Scopus
  16. J. Petit, “Analysis of ECDSA authentication processing in VANETs,” in Proceedings of the 3rd International Conference on New Technologies, Mobility and Security, pp. 1–5, Cairo, Egypt, December 2009.
  17. J. Petit and Z. Mammeri, “Authentication and consensus overhead in vehicular Ad hoc networks,” Telecommunication Systems, vol. 52, no. 4, pp. 2699–2712, 2013. View at Publisher · View at Google Scholar · View at Scopus
  18. M. Raya, P. Papadimitratos, and J.-p. Hubaux, “Securing vehicular communications,” IEEE Wireless Communications, vol. 13, no. 5, pp. 8–15, 2006. View at Publisher · View at Google Scholar · View at Scopus
  19. C. Zhang, X. Lin, R. Lu, P.-H. Ho, and X. Shen, “An efficient message authentication scheme for vehicular communications,” IEEE Transactions on Vehicular Technology, vol. 57, no. 6, pp. 3357–3368, 2008. View at Publisher · View at Google Scholar · View at Scopus
  20. Y. Jiang, M. Shi, X. Shen, and C. Lin, “BAT: a robust signature scheme for vehicular networks using binary authentication tree,” IEEE Transactions on Wireless Communications, vol. 8, pp. 1974–1983, 2009. View at Publisher · View at Google Scholar · View at Scopus
  21. J. H. Cheon and J. H. Yi, “Fast batch verification of multiple signatures,” in Proceedings of the 10th International Conference on Practice and Theory in Public-Key Cryptography, pp. 442–457, Beijing, China, April 2007.
  22. Z. S. Khan, A. Alaraj, S. N. Rekha, F. Azam, and M. Zubair, “Weighted priority based signatures' batch verification scheme in vehicular ad-hoc networks,” in Proceedings of the Engineers and Computer Scientists, Hong Kong, China, 2017.
  23. IEEE, “Wireless LAN medium access control (MAC) and physical layer (PHY) specifications-amendment 8: medium access control (MAC) quality of service enhancements,” IEEE Std 802.11e, 2005. View at Google Scholar
  24. M. V. Eenennaam, L. Hendriks, G. Karagiannis, and G. Heijenk, “Oldest packet drop (OPD): a buffering mechanism for beaconing in IEEE 802.11p VANETs (poster),” in Proceedings of the Vehicular Networking Conference, pp. 252–259, Amsterdam, Netherlands, 2011.
  25. H. Lv, X. Ye, L. An, and Y. Wang, “Distributed beacon frequency control algorithm for VANETs (DBFC),” in Proceedings of the Intelligent System Design and Engineering Application, pp. 243–246, Shanghai, China, 2012.
  26. C. Thaina, K. N. Nakorn, and K. Rojviboonchai, “A study of adaptive beacon transmission on Vehicular Ad-Hoc Networks,” in Proceedings of the International Conference on Communication Technology, pp. 597–602, Jinan, China, September 2011.
  27. N. Gupta, A. Prakash, and R. Tripathi, “Adaptive beaconing in mobility aware clustering based MAC protocol for safety message dissemination in VANET,” Wireless Communications and Mobile Computing, vol. 2017, 2017. View at Publisher · View at Google Scholar · View at Scopus
  28. C. Chigan and J. Li, “A delay-bounded dynamic interactive power control algorithm for VANETs,” in Proceedings of the International Conference on Communications, pp. 5849–5855, Glasgow, Scotland, UK, June 2007.
  29. H. Lu and C. Poellabauer, “Balancing broadcast reliability and transmission range in VANETs,” in Proceedings of the Vehicular Networking Conference, pp. 247–254, Jersey City, New Jersey, USA, December 2010.
  30. K. A. Hafeez, L. Zhao, Z. Liao, and B. N. W. Ma, “A new broadcast protocol for vehicular Ad hoc networks safety applications,” in Proceedings of the Global Telecommunications Conference, pp. 1–5, Miami, FL, USA, December 2010.
  31. IEEE, “Wireless LAN medium access control (MAC) and physical layer (PHY) specifications amendment 6: wireless access in vehicular environments,” IEEE Std 802.11p, 2010. View at Google Scholar
  32. M. V. Eenennaam, G. Karagiannis, and G. Heijenk, “Towards scalable beaconing in VANETs,” in Proceedings of the Fourth ERCIM workshop on eMobility, pp. 103–108, 2010.
  33. R. Stanica, E. Chaput, and A. L. Beylot, “Broadcast communication in vehicular ad-hoc network safety applications,” in Proceedings of the Consumer Communications and Networking Conference, pp. 462–466, Las Vegas, NV, USA, January 2011.
  34. D. B. Rawat, D. C. Popescu, G. Yan, and S. Olariu, “Enhancing VANET performance by joint adaptation of transmission power and contention window size,” IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 9, pp. 1528–1535, 2011. View at Publisher · View at Google Scholar · View at Scopus
  35. D. B. Rawat, G. Yan, D. C. Popescu, M. C. Weigle, and S. Olariu, “Dynamic adaptation of joint transmission power and contention window in VANET,” in Proceedings of the Vehicular Technology Conference Fall, pp. 1–5, Anchorage, AK, USA, September 2009.
  36. L. Le, R. Baldessari, P. Salvador, A. Festag, and W. Zhang, “Performance evaluation of beacon congestion control algorithms for VANETs,” in Proceedings of the Global Telecommunications Conference - GLOBECOM, Houston, TX, USA, December 2011.
  37. R. Stanica, E. Chaput, and A. L. Beylot, “Congestion control in CSMA-based vehicular networks: do not forget the carrier sensing,” in Proceedings of the Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), pp. 650–658, Seoul, South Korea, 2012.
  38. J. Guo, P. Baugh, and S. Wang, “A group signature based secure and privacy-preserving vehicular communication framework,” in Proceedings of the Mobile Networking for Vehicular Environments, pp. 103–108, Anchorage, AK, USA, 2007.
  39. S. Biswas and J. Misic, “Location-based anonymous authentication for vehicular communications,” in Proceedings of the 22nd International Symposium on Personal Indoor and Mobile Radio Communications, pp. 1213–1217, Istanbul, Turkey, September 2011.
  40. S. D. Galbraith, K. G. Paterson, and N. P. Smart, “Pairings for cryptographers,” Discrete Applied Mathematics, vol. 156, pp. 113–3121, 2008. View at Publisher · View at Google Scholar · View at Scopus
  41. P. Wang, F. Wang, Y. Ji, F. Liu, and X. Wang, “Performance analysis of EDCA with strict priorities broadcast in IEEE 802.11p VANETs,” in Proceedings of the International Conference on Computing, Networking and Communications, pp. 403–407, Honolulu, Hawaii, USA, February 2014.
  42. Y. Zou and P. E. Black, “Perfect binary tree,” in Dictionary of Algorithms and Data Structures, 2008, https://xlinux.nist.gov/dads/HTML/perfectBinaryTree.html. View at Google Scholar
  43. B. H. Bloom, “Space/time Trade-offs in Hash Coding with allowable Errors,” Communications of the ACM, vol. 13, no. 7, pp. 422–426, 1970. View at Publisher · View at Google Scholar · View at Scopus
  44. S. Dharmapurikar, H. Song, J. Turner, and J. Lockwood, “Fast packet classification using bloom filters,” in Proceedings of the Architecture for Networking and Communications Systems, pp. 61–70, San Jose, CA, USA, 2006.
  45. M. Sichitiu and M. Kihl, “Inter-vehicle communication systems: a survey,” IEEE Communications Surveys & Tutorials, vol. 10, no. 2, pp. 88–105, 2008. View at Publisher · View at Google Scholar · View at Scopus
  46. C2C-CC, “Car to car communication consortium manifesto: overview overview of the C2C-CC system, car to car communication consortium,” 2007, Tech. Rep. Version 1.1. View at Google Scholar
  47. ETSI, ETSI TR 102 638 V1.1.1, Vehicular Communications; Basic Set of Applications; Definitions, 2009.
  48. SAFESPOT, “Coopreative systems for road safety, safespot integrated project-IST-4-026963-IP deliverable,” 2010, Final Report D8.1.1. View at Google Scholar
  49. SAE, DSRC Implementation Guide, A Guide to Users of SAE J2735 Message Sets over DSRC, 2010, https://www.sae.org/standards/.
  50. “The NS3 network simulation,” 2018, https://www.nsnam.org/.
  51. H. Arbabi and M. C. Weigle, “Highway mobility and vehicular ad-hoc networks in Ns-3,” in Proceedings of the 10th Winter Simulation Conference, pp. 2991–3003, Baltimore, MD, USA, 2010.
  52. D. Jiang, Q. Chen, and L. Delgrossi, “Optimal data rate selection for vehicle safety communications,” in Proceedings of the International Workshop on VehiculAr Inter-NETworking, pp. 30–38, San Francisco, CA, USA, 2008.
  53. M. Torrent-Moreno, “Inter-vehicle communications: assessing information dissemination under safety constraints,” in Proceedings of the Wireless on Demand Network Systems and Services, pp. 59–64, Oberguyrgl, Austria, 2007.
  54. Y. Fan and S. Biswas, “A self-organizing MAC protocol for DSRC based vehicular Ad hoc networks,” in Proceedings of the Distributed Computing Systems Workshops, Vancouver, BC, Canada, 2007.
  55. V. Kukshya and H. Krishnan, “Experimental measurements and modeling for vehicle-to-vehicle dedicated short range communication (DSRC) wireless channels,” in Proceedings of the IEEE Vehicular Technology Conference, pp. 1–5, Montreal, QC, Canada, September 2006.
  56. L. Cheng, B. Henty, D. Stancil, F. Bai, and P. Mudalige, “Mobile vehicle-to-vehicle narrow-band channel measurement and characterization of the 5.9 GHz dedicated short range communication (DSRC) frequency Band,” IEEE Journal on Selected Areas in Communications, vol. 25, no. 8, pp. 1501–1516, 2007. View at Publisher · View at Google Scholar · View at Scopus
  57. F. Bai, D. D. Stancil, and H. Krishnan, “Toward understanding characteristics of dedicated short range communications (DSRC) from a perspective of vehicular network engineers,” in Proceedings of the Mobile Computing and Networking, pp. 329–340, Chicago, Illinois, USA, 2010.
  58. M. A. Javed and E. B. Hamida, “Measuring safety awareness in cooperative ITS applications,” in Proceedings of the IEEE Wireless Communications and Networking, pp. 1–7, Doha, Qatar, 2016.
  59. M. A. Javed, D. T. Ngo, and J. Y. Khan, “Distributed spatial reuse distance control for basic safety messages in SDMA-based VANETs,” Vehicular Communications, vol. 2, no. 1, pp. 27–35, 2015. View at Publisher · View at Google Scholar · View at Scopus
  60. M. Feiri, J. Petit, R. K. Schmidt, and F. Kargl, “The impact of security on cooperative awareness in VANET,” in Proceedings of the IEEE Vehicular Networking Conference, pp. 127–134, Boston, MA, USA, December 2013.