Research Article
VANSec: Attack-Resistant VANET Security Algorithm in Terms of Trust Computation Error and Normalized Routing Overhead
| Input: V1, V2, V3, RSUs. | | Output: Only authorized node (vehicle/RSU) Broadcast information. | | 1: Nodes participating in communication session are {V1, V2, V3, and RSU} | | 2: V3 ← broadcasts an alert ← {V1 not in range while V2 and RSU receive the broadcast} | | 3: V1 in range of V2 ← Receives broadcast from V2 | | 4: V1 ← receives an alert from RSU and Local sensors | | 5: V1 compares ← Alert {V2, RSU and Sensors} | | 6: V1← Verifies authenticity {V2, V3 and RSU} | | 7: If vehicle/RSU not registered | | 8: then | | 9: Mismatch | | 10: Notify ← ConVai exchanged and verification Server {Discard the alert message} | | 11: Also Notify ← V3 Trustiness degraded {V3 are black listed} | | 12: else | | 13: Match ← Registered and Authentic {V3, V2, RSU} | | 14: Update ← ConVai exchange {Satisfied basic security goals} | | 15: Enlist ← Endorse V3/RSU trustiness | | 16: Allow ← V3 V2 and RSU | | 17: Broadcast ← Alert if any | | 18: end if |
|