Vehicular Ad-Hoc Networks, or VANETs, are meant to facilitate communication and information exchange between cars. Another important method through which this is done is vehicle-to-vehicle (V2V) communication. We also utilize vehicle-to-roadside (V2R) and roadside-to-roadside (R2R) communication in this project in order to form a stronger and more versatile network. VANETs are also known to be Intelligent Transportation Networks. Over time, the idea has developed into what is currently referred to as the \"Internet of Vehicles\" an expanding system that may someday become a significant component of the larger internet. As vehicle technology continues to evolve, particularly with the emergence of autonomous vehicles, we can look forward to the creation of an \"Internet of Autonomous Vehicles.\"In order to facilitate communication, VANETs are based on wireless networking technology. This includes conventional wireless systems and contemporary standards such as LTE and 5G, providing quick and reliable connectivity.We are concentrating in this project on developing a secure communication protocol for VANETs. It is aimed at intrusion detection and avoidance of malicious activities within the network. To simulate and test the protocol, we are utilizing the NS2 network simulator that allows us to analyze the system\'s performance and reliability in a controlled virtual setting
Introduction
Vehicle-to-Vehicle (V2V) communication is crucial for Intelligent Transportation Systems (ITS), enhancing road safety, traffic flow, and autonomous driving. However, wireless V2V networks are vulnerable to attacks like eavesdropping and spoofing. This paper proposes a modified secure protocol designed to strengthen security while minimizing latency and resource use, ensuring confidentiality, integrity, and authenticity of exchanged data.
The protocol is vital for preventing malicious attacks and maintaining trust, enabling applications such as collision avoidance, hazard warnings, platooning, and emergency vehicle prioritization. It enhances data integrity and confidentiality while optimizing network performance.
The literature review highlights advances in V2X technologies, AI integration for pedestrian safety, hybrid vehicular networks combining DSRC and LTE, and methods to reduce authentication overhead for real-time applications.
Methodologically, the paper uses Dynamic Source Routing (DSR) with NS-2 simulations to model urban and highway VANET environments. The system integrates encryption (AES/RSA) and secure routing with certificate-based authentication to protect data transmission. The simulation includes mobility models, wireless parameters, and attack scenarios to test security robustness.
Results show the proposed Dominant Optimization System (DOS) achieves higher throughput (up to 100,000 units vs. 65,000), lower end-to-end delay (about 10–15% less than existing protocols), and improved energy efficiency by routing through nodes with higher residual energy. Compared to existing models like EMAP and OSPF, the new protocol significantly reduces delay (65% vs. 90%) and increases throughput (100% vs. 65%), making it highly suitable for real-time VANET applications.
Conclusion
Briefly, the performance test identifies that the new DSR model outperforms existing models, EMAP and OSPF, in a number of aspects. Of particular interest is that the DSR model experienced the lowest delay at 65%, as compared to 87% for EMAP and 90% for OSPF, which suggests a more efficient process of data transmission. Further, at the level of throughput, the DSR model was found to have more successful results at 80% rate of performance when compared with EMAP at 70% as well as OSPF at 65%. Such results categorically show that the proposed DSR model has an improved solution such that it significantly reduces delay and enhances throughput and thus demonstrates improvement over the previous models.
In conclusion, the suggested solution achieves a successful balance between security and speed and is very well-fitted to be applied in real-world VANET usage like collision avoidance, emergency messages, and autonomous vehicle coordination. The future direction would involve its scalability with increased traffic density and with 5G and edge computing to further increase its usability
References
[1] S. SEHRAWAT, Y. SHAH, V. K. CHOYI, A. BRUSILOVSKY, AND S. FERDI, “CERTIFICATE AND SIGNATURE FREE ANONYMITY FOR V2V COMMUNICATIONS,” 2020. [ONLINE]. AVAILABLE: HTTPS://DOI.ORG/10.48550/ARXIV.2008.07076.
[2] M. M. A. MUSLAM, “ENHANCING SECURITY IN VEHICLE-TO-VEHICLE COMMUNICATION: A COMPREHENSIVE REVIEW OF PROTOCOLS AND TECHNIQUES,” VEHICLES, VOL. 6, NO. 1, PP. 450–467, FEB. 2024. HTTPS://DOI.ORG/10.3390/VEHICLES6010020.
[3] M. GUPTA, J. BENSON, F. PATWA, AND R. SANDHU, “SECURE V2V AND V2I COMMUNICATION IN INTELLIGENT TRANSPORTATION USING CLOUDLETS,” 2020. [ONLINE]. AVAILABLE: HTTPS://DOI.ORG/10.48550/ARXIV.2001.04041.
[4] Q. DU, J. ZHOU, AND M. MA, “EAIA: AN EFFICIENT AND ANONYMOUS IDENTITY AUTHENTICATION SCHEME IN 5G-V2V,” 2024. [ONLINE]. AVAILABLE: HTTPS://DOI.ORG/10.48550/ARXIV.2406.04705.
[5] M. ALAWIEH, W. FAHS, J. HAYDAR, F. CHBIB, AND A. FADLALLAH, “A SECURE SCHEME FOR VEHICLE-TO-VEHICLE (V2V) ROUTING PROTOCOL,” IN 2022 5TH CONFERENCE ON CLOUD AND INTERNET OF THINGS (CIOT), IEEE, MAR. 2022, PP. 1–8. HTTPS://DOI.ORG/10.1109/CIOT53061.2022.9766544.
[6] M. A. NAEEM, S. CHAUDHARY, AND Y. MENG, “ROAD TO EFFICIENCY: V2V ENABLED INTELLIGENT TRANSPORTATION SYSTEM,” ELECTRONICS, VOL. 13, NO. 13, P. 2673, JUL. 2024. HTTPS://DOI.ORG/10.3390/ELECTRONICS13132673.
[7] K. B. Y. BINTORO, S. PERMANA, A. SYAHPUTRA, YADDARABULLAH, AND B. ARIFITAMA, “V2V COMMUNICATION IN SMART TRAFFIC SYSTEMS: CURRENT STATUS, CHALLENGES AND FUTURE PERSPECTIVES,” J. PROCESS., VOL. 19, NO. 1, MAY 2024. HTTPS://DOI.ORG/10.33998/PROCESSOR.2024.19.1.1524.
[8] GIANNAROS ET AL., “AUTONOMOUS VEHICLES: SOPHISTICATED ATTACKS, SAFETY ISSUES, CHALLENGES, OPEN TOPICS, BLOCKCHAIN, AND FUTURE DIRECTIONS,” J. CYBERSECURITY PRIVACY, VOL. 3, NO. 3, PP. 493–543, AUG. 2023. HTTPS://DOI.ORG/10.3390/JCP3030025.
[9] B. RABIAH, A. ALSOLIMAN, Y. SHASHWAT, S. RICHELSON, AND N. ABU-GHAZALEH, “TOKEN-BASED VEHICULAR SECURITY SYSTEM (TVSS): SCALABLE, SECURE, LOW-LATENCY PUBLIC KEY INFRASTRUCTURE FOR CONNECTED VEHICLES,” 2024. [ONLINE]. AVAILABLE: HTTPS://DOI.ORG/10.48550/ARXIV.2402.18365.
[10] S. A. YUSUF, A. KHAN, AND R. SOUISSI, “VEHICLE-TO-EVERYTHING (V2X) IN THE AUTONOMOUS VEHICLES DOMAIN – A TECHNICAL REVIEW OF COMMUNICATION, SENSOR, AND AI TECHNOLOGIES FOR ROAD USER SAFETY,” TRANSP. RES. INTERDISCIP. PERSPECT.,VOL.23,P.100980,JAN.2024. HTTPS://DOI.ORG/10.1016/J.TRIP.2023.100980.