Relaying Vehicle Selection Protocol for a Road Intersection

Avishek Paul,Subhasish Dhal,Neenu Mary
DOI: https://doi.org/10.1109/tnet.2024.3354970
2024-01-01
IEEE/ACM Transactions on Networking
Abstract:An autonomous Vehicle to Vehicle (V2V) communication mode, which allows V2V communication in out of eNB (Evolved Node B) coverage areas, has been recently introduced into the Long Term Evolution (LTE) standard. Recent research has studied the performance of this LTE V2V autonomous mode for an urban intersection use case, where non-line-of-sight (NLOS) communication links are present and it is observed that the overall message transmission performance in LTE V2V is found to degrade drastically in NLOS link conditions. To improve the performance, a vehicle-assisted relaying strategy was proposed. In this scheme, at each time instance, distance of each vehicle from intersection point is computed. Then the vehicle close to the intersection point is nominated as relaying vehicle and will rebroadcast the BSMs (Basic Safety Message) in a selective manner. However, security aspects while relaying the BSM is not being addressed in the suggested model. We cannot reject the possibility that a vehicle can be malicious. A malicious vehicle can manipulate its distance from the intersection point, thereby nominating itself as the relaying vehicle with malicious motives such as to use extra infrastructural faciltiy, curiosity in the messages sent by other vehicles, etc. This work proposes a secure algorithm for finding the most appropriate relaying vehicle to address this security vulnerability so that a vehicle can no longer falsify its location information.
telecommunications,computer science, theory & methods,engineering, electrical & electronic, hardware & architecture
What problem does this paper attempt to address?