Research Article
Named Data Networking-Based On-Demand Secure Vehicle-To-Vehicle Communications
Table 1
Different symbols used in algorithms.
| S. No | Legend | Description |
| 1 | VPreviousT | Previous trust value of the vehicle | 2 | RSUPOL | Check for RSU’s proof of location (POL) certificate | 3 | VRSUSess ID | Session ID assigned by RSU to vehicle | 4 | TVrespond | Response time of the vehicle assigned by RSU | 5 | BNewi | New blockchain | 6 | H# | Hash of all under event messages | 7 | Bi-1 | Hash of the previous blockchain | 8 | | Target difficulty | 9 | MVNDN | Messages in the VNDN environment | 10 | VLOC | Vehicle location | 11 | MIDsg | Instructions/second (job/task execution speed) | 12 | VcurrentT | Current trust of the vehicle | 13 | R | RAM required on memory (in bytes) | 14 | Vinfo | Vehicle information | 15 | V | Vehicle velocity threshold: average speed: 30 km/h, urban trunk road: 60 km/h, urban secondary roads: 40 km/h | 16 | VCID | Vehicular cluster identification | 17 | VCacheS | Storage of the vehicular caching | 18 | CH | Cluster head | 19 | V_d | Vehicle direction | 20 | V(Clusters)n | Vehicular clusters | 21 | BS | Base station | 22 | Threshold | Range (0.1–1.0) | 23 | trustable-Node | 0.5 | 24 | malicious-Node | 5 | 25 | M(N)v | Malicious node | 26 | V(New)Trust | Trustable nodes | 27 | VNODE | Vehicular node | 28 | CHDATA | Data on the cluster head | 29 | PSignPK | Matches the signature of the public key | 30 | PRR | Previous request rate threshold: 10 interest/sec | 31 | CHj | Number of times selected as cluster head |
|
|