Volume 20, Issue 1 (6-2023)                   JSDP 2023, 20(1): 3-24 | Back to browse issues page

XML Persian Abstract Print

Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

dorzadeh T, Balouchzahi N, Bakhtiyarishehri A. Improve the security of the platoon in vehicular networking. JSDP 2023; 20 (1) :3-24
URL: http://jsdp.rcisp.ac.ir/article-1-1192-en.html
Sistan and Baluchestan
Abstract:   (216 Views)
The growth of vehicles and the increase in urban traffic have led to the need for safe, secure and efficient Intelligent Transportation Systems (ITS). Improving the efficiency of ITS needs an efficient communication system. To this end, vehicular networks have been considered as a communication infrastructure in ITS. One of the mechanisms to manage vehicles in ITS is to categorize vehicles into platoon. Platoon is proposed as a way to increase road capacity, improve safety, minimize travel time, increase fuel efficiency, reduce environmental impact, lower-traffic jams and facilitate driving. To create a platoon through autonomous cooperative driving, vehicles must be able to communicate wirelessly, which is possible through vehicular networks. Wireless communications in vehicular networks suffer from three major problems, which are: limited range of radiofrequency, high data transmission over the wireless network, as well as security problems. Using omnidirectional antennas and utilizing DSRC channels in the lower layers are the base solutions to overcome these issues but, Omnidirectional antennas spread the vulnerability to all nodes within the signal propagation range and congestion challenges in the DSRC channel intensify the collision of packets. Such issues decrease the platoon's stability and security. Recent studies on vehicular networks security have focused on presenting solutions to reduce vulnerabilities at the level of communications. However, while the security of communications has been extensively explored in previous work, the security of platoons has recently been considered by researchers. In vehicular networks, an attack can pose a threat to the security and privacy of the platoon, so the security of the platoon has received a great deal of attention.  To improve the security of the platoon, the SP-VLC solution is proposed. This method uses asymmetric encryption and the transmission of information through Visible Light Communications (VLC) to overcome security challenges. In intra-platoon attacks, the attacker is a member of the platoon and has access to all keys and encrypted information, so this solution is not effective against platoon’s internal attacks. Moreover, the SP-VLC solution uses only the data flow topology of predecessor-following to transfer data. Another solution which fixes internal attack problem of SP-VLC solution is voting method. But this solution does not work well for the "predecessor-following" information flow topology because vehicles in the voting process need to receive information from at least two vehicles, while in the mentioned topology, vehicles receive information only from the vehicle in front.   Therefore, the voting solution does not have the required efficiency in "predecessor-following" topology.
To overcome the challenges of the voting method, a new solution has been proposed that takes advantage of changes in the distance of each vehicle from the leader vehicle and the best speed of the malicious vehicle compared to the leader speed before the attack. Also, in order to evaluate the efficiency of the proposed solution, evaluation in Bidirectional-leader (BDL) and Predecessor-leader following (PLF) topologies has been performed as a representative of other information flow topologies. The performance of the proposed solution has been evaluated using OMNeT ++, SUMO, and PLEXE tools. To measure the efficiency of the proposed method, the parameters of position error, speed error and control effort have been used. The simulation of the proposed solution shows that this study responds to spoofing attack in 0.43 seconds and to message falsification attack in 0.48 seconds.
Article number: 1
Full-Text [PDF 2176 kb]   (392 Downloads)    
Type of Study: Research | Subject: Paper
Received: 2020/11/24 | Accepted: 2021/12/20 | Published: 2023/08/13 | ePublished: 2023/08/13

Add your comments about this article : Your username or Email:

Send email to the article author

Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

© 2015 All Rights Reserved | Signal and Data Processing