SASMF: Socially Aware Security Message Forwarding Mechanism in VANETs

  • Peng Yang
  • Lingli Deng
  • Jing Yang
  • Junjie YanEmail author


With the development of vehicle communication technologies, Vehicular Ad Hoc Networks (VANETs) through short distance communication technology achieve communication in Vehicle to Vehicular (V2V) and Vehicular to Infrastructure (V2I), which provides the basis for the implementation of application. However, the privacy and security of vehicle and message forwarding are vulnerably attacked by attacker due to the dynamic network topology. To address the problems, a Socially Aware Security Message Forwarding Mechanism (SASMF) based on trust assessment is proposed in this paper. Firstly, the pseudonym is used to protect the privacy of the vehicles, and the exchange entropy is as a measure to evaluate the exchange conditions of the pseudonym to avoid the continuous tracking of the vehicle by the attacker. Furthermore, according to the trust gradient, the message is forwarded in the form of multiple pieces of information to several relay vehicles and to the Application Provider (AP) through the Road Side Units (RSUs). Results show that the proposed mechanism can effectively improve the success rate of message forwarding and reduce the risk of message leakage and better protect the privacy of VANETs.


VANETs Privacy protection Trust assessment Message forwarding 



This work is partially supported by the National Natural Science Foundation of China (61771082, 61871062), Program for Innovation Team Building at Institutions of Higher Education in Chongqing (CXTDX201601020).


  1. 1.
    Li L, Wen D, Yao D (2014) A survey of traffic control with vehicular communications. IEEE Trans Intell Transp Syst 15(1):425–432MathSciNetGoogle Scholar
  2. 2.
    Su Z, Hui Y, Yang Q (2017) The next generation vehicular networks: a content-centric framework. IEEE Wirel Commun 24(1):60–66Google Scholar
  3. 3.
    Yang Q, Zhu B, Wu S (2016) An architecture of cloud-assisted information dissemination in vehicular networks. IEEE Access 4:2764–2770Google Scholar
  4. 4.
    Zhou L (2016) On data-driven delay estimation for media cloud. IEEE Trans Multimedia 18(5):905–915Google Scholar
  5. 5.
    Wu D, Liu Q, Wang H, Wu D, Wang R (2017) Socially aware energy efficient mobile edge collaboration for video distribution. IEEE Trans Multimedia PP(99):1–1Google Scholar
  6. 6.
    Wu D, Yan J, Wang H, Wu D, Wang R (2017) Social attribute aware incentive mechanism for device-to-device video distribution. IEEE Trans Multimedia 19(8):1908–1920Google Scholar
  7. 7.
    Zhang H, Ma Y, Yuan D, Chen HH (2011) Quality-of-service driven power and sub-carrier allocation policy for vehicular communication networks. IEEE J Sel Areas Commun 29(1):197–206Google Scholar
  8. 8.
    Dötzer F (2005) Privacy issues in vehicular ad hoc networks. International Workshop on Privacy Enhancing Technologies 3856:197–209Google Scholar
  9. 9.
    Zhang C, Lin X, Lu R, Ho PH, Shen X (2008) An efficient message authentication scheme for vehicular communications. IEEE Trans Veh Technol 57(6):3357–3368Google Scholar
  10. 10.
    Yang Q, Lim A, Li S, Fang J, Agrawal P (2010) Acar: Adaptive connectivity aware routing for vehicular ad hoc networks in city scenarios. Mobile Networks & Applications 15(1):36–60Google Scholar
  11. 11.
    Lei H, Gao C, Guo Y, Pan G (2015) On physical layer security over generalized gamma fading channels. IEEE Commun Lett 19(7):1257–1260Google Scholar
  12. 12.
    Luo T, Kanhere SS, Das SK, Tan HP (2016) Incentive mechanism design for heterogeneous crowdsourcing using all-pay contests. IEEE Trans Mob Comput 15(9):2234–2246Google Scholar
  13. 13.
    Bouksani W, Bensaber BA (2017) An efficient and dynamic pseudonyms change system for privacy in vanet. In: 2017 IEEE Symposium on computers and communications (ISCC), vol 00, pp 59-63.
  14. 14.
    Lu R, Lin X, Luan TH, Liang X, Shen X (2012) Pseudonym changing at social spots: an effective strategy for location privacy in vanets. IEEE Trans Veh Technol 61(1):86–96Google Scholar
  15. 15.
    Beresford AR, Stajano F (2004) Location privacy in pervasive computing. IEEE Pervasive Comput 2 (1):46–55Google Scholar
  16. 16.
    Buttyán L, Holczer T, Vajda I (2007) On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs. Springer, BerlinGoogle Scholar
  17. 17.
    Dahl M, Delaune S, Steel G (2010) Formal analysis of privacy for vehicular mix-zones. In: Computer Security - ESORICS 2010, European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings, pp 55–70Google Scholar
  18. 18.
    Shamir A (1979) How to share a secret, vol 22, pp 612–613Google Scholar
  19. 19.
    Tang D, Ren J (2016) A novel delay-aware and privacy-preserving data-forwarding scheme for urban sensing network. IEEE Trans Veh Technol 65(4):2578–2588Google Scholar
  20. 20.
    Xiong J, Zhang Y, Li X, Lin M, Yao Z, Liu G (2018) Rse-pow: a role symmetric encryption pow scheme with authorized deduplication for multimedia data. Mobile Networks & Applications 23(3):650–663Google Scholar
  21. 21.
    Xia Y, Chen W, Liu X, Zhang L, Li X, Xiang Y (2017) Adaptive multimedia data forwarding for privacy preservation in vehicular ad-hoc networks. IEEE Trans Intell Transp Syst 18(10):2629–2641Google Scholar
  22. 22.
    Peng M, Li Y, Jiang J, Li J, Wang C (2014) Heterogeneous cloud radio access networks: a new perspective for enhancing spectral and energy efficiencies. IEEE Wirel Commun 21(6):126–135Google Scholar
  23. 23.
    Luo C, Yang LT, Li P, Xie X (2015) A holistic energy optimization framework for cloud-assisted mobile computing. IEEE Wirel Commun 22(3):118–123Google Scholar
  24. 24.
    Zhang Z, Wang L, Liu D, Zhang Y (2016) Peer discovery for d2d communications based on social attribute and service attribute. Journal of Network & Computer Applications 86Google Scholar
  25. 25.
    Wu D, Zhang F, Wang H, Wang R (2018) Fundamental relationship between node dynamic and content cooperative transmission in mobile multimedia communications. Comput Commun 120Google Scholar
  26. 26.
    Wu D, Zhang P, Wang H, Wang C, Wang R (2016) Node service ability aware packet forwarding mechanism in intermittently connected wireless networks. IEEE Trans Wirel Commun 15(12):8169–8181Google Scholar
  27. 27.
    Wang R, Yang H, Wang H, Wu D (2016) Social overlapping community-aware neighbor discovery for d2d communications. IEEE Wirel Commun 23(4):28–34Google Scholar
  28. 28.
    Guo JJ, Ma JF, Guo XX, Li XH, Zhang JW, Zhang T (2018) Trust-based service composition and selection in service oriented architecture. Peer-to-Peer Networking and Applications 11(5):862–880Google Scholar
  29. 29.
    Wu D, Si S, Wu S, Wang R (2017a) Dynamic trust relationships aware data privacy protection in mobile crowd-sensing. IEEE Internet Things J PP(99):1–1Google Scholar
  30. 30.
    Wu D, Zhang F, Wang H, Wang R (2017) Security-oriented opportunistic data forwarding in mobile social networks. Future Generation Computer SystemsGoogle Scholar
  31. 31.
    Yan J, Wu D, Sanyal S, Wang R (2017) Trust-oriented partner selection in d2d cooperative communications. IEEE Access PP(99):1–1Google Scholar
  32. 32.
    Chen Y, Wei Y (2013) A beacon-based trust management system for enhancing user centric location privacy in vanets. J Commun Netw 15(2):153–163Google Scholar
  33. 33.
    Yang Q, Wang H (2015) Toward trustworthy vehicular social networks. IEEE Commun Mag 53(8):42–47Google Scholar
  34. 34.
    Elizabeth BL, Aaishwarya R, Kiruthika P, Shrada MN, Prakash AJ, Uthariaraj VR (2011) Bayesian based confidence model for trust inference in manets. In: International conference on recent trends in information technology, pp 402–406Google Scholar
  35. 35.
    Wang R, Yan J, Wu D, Wang H, Yang Q (2018) Knowledge-centric edge computing based on virtualized d2d communication systems. IEEE Commun Mag 56(5):32–38Google Scholar
  36. 36.
    Zhang Z, Zhang P, Liu D, Sun S (2017) Srsm-based adaptive relay selection for d2d communications. IEEE Internet Things J PP(99):1–1Google Scholar
  37. 37.
    Zhou L, Wu D, Chen J, Dong Z (2017a) When computation hugs intelligence: content-aware data processing for industrial iot. IEEE Internet Things J PP(99):1–1Google Scholar
  38. 38.
    Zhou L, Wu D, Dong Z, Li X (2017b) When collaboration hugs intelligence: content delivery over ultra-dense networks. IEEE Commun Mag 55(12):91–95Google Scholar
  39. 39.
    Jiang D, Huo L, Lv Z, Song H, Qin W (2018) A joint multi-criteria utility-based network selection approach for vehicle-to-infrastructure networking. IEEE Trans Intell Transp Syst PP(99):1–15Google Scholar
  40. 40.
    Rabieh K, Mahmoud MMEA, Younis M (2017) Privacy-preserving route reporting schemes for traffic management systems. In: IEEE international conference on communications, pp 7286–7291Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  • Peng Yang
    • 1
    • 2
  • Lingli Deng
    • 1
    • 3
  • Jing Yang
    • 1
    • 3
  • Junjie Yan
    • 1
    • 3
    Email author
  1. 1.School of Communication and Information EngineeringChongqing University of Posts and TelecommunicationsChongqingChina
  2. 2.China Academy of Information and Communications TechnologyBeijingChina
  3. 3.Key Laboratory of Optical Communications and NetworksChongqingChina

Personalised recommendations