ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication
CoNEXT '08 Proceedings of the 2008 ACM CoNEXT Conference
IEEE Transactions on Wireless Communications
Outage behavior of selective relaying schemes
IEEE Transactions on Wireless Communications
A Hierarchical Identity Based Key Management Scheme in Tactical Mobile Ad Hoc Networks
IEEE Transactions on Network and Service Management
Cooperative communication in wireless networks
IEEE Communications Magazine
Hi-index | 0.00 |
In vehicular ad hoc networks, non-line-of-sight (NLOS) safety-critical conditions require careful attention. In this paper, we use recent advances in cooperative communication to enhance the performance of VANETs. Although cooperative communication provides significant benefits, it also raises a number of serious security issues as malicious nodes may impersonate and affect the integrity of the communication. In this paper, we propose a prevention-based security technique for cooperative communication taking into consideration authentication protocol, based on hash chains and Merkle trees. Based on this consideration, we derive the closed-form secured throughput equations for proactive relay selection in cooperative communication that provides both hop-by-hop and end-to-end authentication and integrity protection. The simulation results show the effectiveness of the proposed scheme.