Published in

Hindawi, Wireless Communications and Mobile Computing, (2021), p. 1-15, 2021

DOI: 10.1155/2021/1615015

Links

Tools

Export citation

Search in Google Scholar

Named Data Networking-Based On-Demand Secure Vehicle-To-Vehicle Communications

This paper is made freely available by the publisher.
This paper is made freely available by the publisher.

Full text: Download

Orange circle
Preprint: archiving restricted
Orange circle
Postprint: archiving restricted
Green circle
Published version: archiving allowed
Data provided by SHERPA/RoMEO

Abstract

The detection of secure vehicles for content placement in vehicle to vehicle (V2V) communications makes a challenging situation for a well-organized dynamic nature of vehicular ad hoc networks (VANET). With the increase in the demand of efficient and adoptable content delivery, information-centric networking (ICN) can be a promising solution for the future needs of the network. ICN provides a direct retrieval of content through its unique name, which is independent of locations. It also performs better in content retrieval with its in-network caching and named-based routing capabilities. Since vehicles are mobile devices, it is very crucial to select a caching node, which is secure and reliable. The security of data is quite important in the vehicular named data networking (VNDN) environment due to its vital importance in saving the life of drivers and pedestrians. To overcome the issue of security and reduce network load in addition to detect a malicious activity, we define a blockchain-based distributive trust model to achieve security, trust, and privacy of the communicating entities in VNDN, named secure vehicle communication caching (SVC-caching) mechanism for the placement of on-demand data. The proposed trust management mechanism is decentralized in nature, which is used to select a trustworthy node for cluster-based V2V communications in the VNDN environment. The SVC-caching strategy is simulated in the NS-2 simulator. The results are evaluated based on one-hop count, delivery ratio, cache hit ratio, and malicious node detection. The results demonstrate that the proposed technique improves the performance based on the selected parameters.