Secure Opportunistic Vehicle-to-Vehicle Communication

Alexandra Elena Mihaita, Ciprian Dobre, Florin Pop, Constandinos X. Mavromoustakis, George Mastorakis

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    5 Citations (Scopus)


    How much time do you spend stuck in traffic? Well, the average person spends around 43 hours a year stuck just because of the over-populated streets. The road infrastructure is something that cannot be easily improved, which is why the field of Intelligent Transportation Systems (ITS) has emerged. The most common example of such systems is the navigators which integrate the location monitoring of drivers with the services that help predict faster(or at least, most pleasant) alternative route(s). But, since everyone tries to find the optimal route, conflict of interest between the drivers can appear: one driver can choose to send bad data in order to give a false image of the map and gain advantages. The present chapter describes a solution to create a security mechanism in the context of ITS. The solution is a heterogeneous solution in which both symmetrical and asymmetrical encryption are used. Section 1 makes a short introduction into the field of ITS with its main challenges. The related work is then presented in Sect. 2. A theoretical approach (see Sect. 3) over the security mechanism proposed in the chapter is then made, followed by the practical description of the implementation (Sect. 4) and the constructive details (Sect. 5). Section 6 presents the experimental evaluation and the results of the security proposal. Finally, the conclusion are presented in the final Sect. 7 and some future work is mentioned.

    Original languageEnglish
    Title of host publicationStudies in Big Data
    PublisherSpringer Science and Business Media Deutschland GmbH
    Number of pages40
    Publication statusPublished - 2017

    Publication series

    NameStudies in Big Data
    ISSN (Print)2197-6503
    ISSN (Electronic)2197-6511


    • Advance Encryption Standard
    • Certificate Authority
    • Intelligent Transportation System
    • Malicious Node
    • Security Mechanism


    Dive into the research topics of 'Secure Opportunistic Vehicle-to-Vehicle Communication'. Together they form a unique fingerprint.

    Cite this