Research Article

Named Data Networking-Based On-Demand Secure Vehicle-To-Vehicle Communications

Table 1

Different symbols used in algorithms.

S. NoLegendDescription

1VPreviousTPrevious trust value of the vehicle
2RSUPOLCheck for RSU’s proof of location (POL) certificate
3VRSUSess IDSession ID assigned by RSU to vehicle
4TVrespondResponse time of the vehicle assigned by RSU
5BNewiNew blockchain
6H#Hash of all under event messages
7Bi-1Hash of the previous blockchain
8Target difficulty
9MVNDNMessages in the VNDN environment
10VLOCVehicle location
11MIDsgInstructions/second (job/task execution speed)
12VcurrentTCurrent trust of the vehicle
13RRAM required on memory (in bytes)
14VinfoVehicle information
15VVehicle velocity threshold: average speed: 30 km/h, urban trunk road: 60 km/h, urban secondary roads: 40 km/h
16VCIDVehicular cluster identification
17VCacheSStorage of the vehicular caching
18CHCluster head
19V_dVehicle direction
20V(Clusters)nVehicular clusters
21BSBase station
22ThresholdRange (0.1–1.0)
23trustable-Node0.5
24malicious-Node5
25M(N)vMalicious node
26V(New)TrustTrustable nodes
27VNODEVehicular node
28CHDATAData on the cluster head
29PSignPKMatches the signature of the public key
30PRRPrevious request rate threshold: 10 interest/sec
31CHjNumber of times selected as cluster head