Adaptive security mechanisms for safety applications in Internet of Vehicles
Author | Javed, Muhammad Awais |
Author | Ben Hamida, Elyes |
Available date | 2024-11-21T09:24:44Z |
Publication Date | 2016 |
Publication Name | International Conference on Wireless and Mobile Computing, Networking and Communications |
Resource | Scopus |
Identifier | http://dx.doi.org/10.1109/WiMOB.2016.7763268 |
ISSN | 21619646 |
Abstract | Internet of Vehicles (IoV) is an important constituent of next generation smart cities that enables city wide connectivity of vehicles for traffic management applications. A secure and reliable communications is an important ingredient of safety applications in IoV. While the use of a more robust security algorithm makes communications for safety applications secure, it could reduce application QoS due to increased packet overhead and security processing delays. Particularly, in high density scenarios where vehicles receive large number of safety packets from neighborhood, timely signature verification of these packets could not be guaranteed. As a result, critical safety packets remain unverified resulting in cryptographic loss. In this paper, we propose two security mechanisms that aim to reduce cryptographic loss rate. The first mechanism is random transmitter security level section whereas the second one is adaptive scheme that iteratively selects the best possible security level at the transmitter depending on the current cryptographic loss rate. Simulation results show the effectiveness of the proposed mechanisms in comparison with the static security technique recommended by the ETSI standard. |
Sponsor | This article was made possible by NPRP grant #[7-1113-1-199] from the Qatar National Research Fund (a member of Qatar Foundation). The statements made herein are solely the responsibility of the authors. |
Language | en |
Publisher | IEEE |
Subject | Cryptography Iterative methods Mobile computing Smart city Transmitters Vehicles Adaptive security Processing delay Reliable communication Robust security Safety applications Security mechanism Signature verification Traffic management Network security |
Type | Conference Paper |
Pagination | 1-6 |
Files in this item
This item appears in the following Collection(s)
-
QMIC Research [219 items ]