Vehicle Ad-hoc Network (VANET) is a type of wireless network that enables communication between vehicles and Road Side Units (RSUs) to improve road safety, traffic efficiency, and service delivery. However, the widespread use of vehicular networks raises serious concerns about users’ privacy and security. Privacy in VANET refers to the protection of personal information and data exchanged between vehicles, RSUs, and other entities. Privacy issues in VANET include unauthorized access to location and speed information, driver and passenger identification, and vehicle tracking. To ensure privacy in VANET, various technologies such as pseudonymization, message authentication, and encryption are employed. When vehicles frequently change their identity to avoid tracking, message authentication ensures messages are received from trusted sources, and encryption is used to prevent unauthorized access to messages. Therefore, researchers have presented various schemes to improve and enhance the privacy efficiency of vehicle networks. This survey article provides an overview of privacy issues as well as an in-depth review of the current state-of-the-art pseudonym-changing tactics and methodologies proposed.
In recent years, Vehicular Ad-Hoc Networks (VANETs) innovation has been regarded as a significant research area. This is owing to the increasing popularity of vehicle to vehicle (V2V) and vehicle to infrastructure (V2I) communications in the area of Intelligent Transportation System (ITS) to improve traffic management, safety, CO2 emission mitigation, and other applications. A variety of routing protocols for VANETs are being recently developed. More specifically, geographic-based routing algorithms such as Greedy Perimeter Stateless Routing (GPSR) have provoked the most interest in VANETs due to their compatibility with a regularly changing network structure and the highly unsteady nature of automobile nodes. This paper proposes an efficient weight based mobility method in VANET to improve the mechanism of the GPSR protocol through optimizing the greedy forwarding strategy; which is so called O-Greedy Mode. Therefore, the key goal is to achieve the optimal data forwarding paths. The next hop is determined by estimating the neighbors’ mobility based on each neighbor’s Greedy Link Weight Factor (GLWF). The Weighted GPSR (W-GPSR) based on Mobility Prediction is then evaluated using OMNeT++ simulator with Inet, Veins and SUMO traffic simulator. The results demonstrate the efficiency of W-GPSR in contrast with the traditional existing protocols for essential metrics of Packet Delivery Ratio (PDR), throughput, End-to-End Delay (E2ED), Normalized Routing Load (NRL) and Packet Loss Ratio (PLR).
Vehicular Ad hoc Networks (VANETs), a subsection of Mobile Ad hoc Networks (MANETs), have strong future application prospects. Because topology structures are rapidly changing, determining a route that can guarantee a good Quality of Service (QoS) is a critical issue in VANETs. Routing is a critical component that must be addressed in order to utilize effective communication among vehicles. The purpose obtained from this study is to compare the AODV and GPSR performance in terms of Packet Delivery Ratio, Packet Drop Ratio, Throughput, and End-to-End Delay by applying three scenarios, the first scenario focuses on studying these protocols in terms of QoS while changing the number of vehicles at a constant speed of 40Km/h, and for the second scenario changing the speed value while keeping a constant number of vehicles which is 100, the third involves changing the communication range at a constant speed and vehicle number. This study represents a foundation for researchers to help elaborate on the strength and weaknesses of these two protocols. OMNeT++ in conjunction with SUMO is used for simulation.
Vehicular network security had spanned and covered a wide range of security related issues. However solar energy harvesting Road Side Unit (RSU) security was not defined clearly, it is this aspect that is considered in this paper. In this work, we will suggest an RSU security model to protect it against different internal and external threats. The main goal is to protect RSU specific data (needed for its operation) as well as its functionality and accessibility. The suggested RSU security model must responds to many objectives, it should ensure that the administrative information exchanged is correct and undiscoverable (information authenticity and privacy), the source (e.g., VANET server) is who he claims to be (message integrity and source authentication) and the system is robust and available (using Intrusion Detection System (IDS)). In this paper, we suggest many techniques to strength RSU security and they were prototyped using an experimental model based on Ubicom IP2022 network processor development kit .