Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

Security Enhancement in IoV using User and Vehicle Certification

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2021
Akansha Singh, Shiva Prakash

Akansha Singh and Shiva Prakash. Security Enhancement in IoV using User and Vehicle Certification. International Journal of Computer Applications 183(21):49-54, August 2021. BibTeX

	author = {Akansha Singh and Shiva Prakash},
	title = {Security Enhancement in IoV using User and Vehicle Certification},
	journal = {International Journal of Computer Applications},
	issue_date = {August 2021},
	volume = {183},
	number = {21},
	month = {Aug},
	year = {2021},
	issn = {0975-8887},
	pages = {49-54},
	numpages = {6},
	url = {},
	doi = {10.5120/ijca2021921586},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


Internet of Vehicles (IoV) provides new opportunities for the coordination of vehicles for enhancing and improving safety and transformation performance because many accidents occur in road. So, safety plays an important role. To prevent the vehicle from hijacked this proposed model is designed. If it was discussed about the authentication of vehicles, then there are protocols proposed by another author, but does not work of authentication of the vehicular user in the network. so, to remove this drawback this proposed model is discussed. This ASC protocol is used for vehicular user authentication and certificate used for vehicle authentication and also to avoid collision due to unnecessary delivery of messages. Both ASC protocol and certificate are combined for the authenticity of vehicular user and vehicle. To verify this protocol working condition Example, flowchart and algorithms are discussed for the authenticity of vehicle and user. This proposed approach is verified by using the SUMO (Simulator for Urban Mobility) simulator and NETEDIT ID. Result and analysis has also discussed this dissertation.


  1. Patel, K.K., Patel, S.M., and Scholar, P.G. ,” Internet of Things-IOT: Definition, Characteristics, Architecture, Enabling Technologies, Application & Future Challenges”. International Journal of Engineering Science and Computing 6, 1–10,2016.
  2. Hegyi, A., De Schutter, B., & Hellendoorn, J. (2005). Optimal coordination of variable speed limits to suppress shock waves. Intelligent Transportation Systems, IEEE Transactions on, 6, 102-112.
  3. T. Schmidt, R. Philipsen, P. Themann, and M. Ziefle, “Public perception of V2X-technology - evaluation of general advantages, disadvantages and reasons for data sharing with connected vehicles,” in IEEE Intelligent Vehicles Symposium, Jun. 2016, pp. 1344 – 1349.
  4. Z. H. Gu, G. Han, H. B. Zeng, and Q. L. Zhao, “Securityaware mapping and scheduling with hardware co-processors for flexray-based distributed embedded systems,” IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 10, pp. 3044–3057, Oct. 2016.
  5. O. Kaiwartya, A. H. Abdullah, Y. Cao, A. Altameem, M. Prasad, C.-T. Lin, and X. Liu, “Internet of vehicles: Motivation, layered architecture, network model, challenges, and future aspects,” IEEE Access, vol. 4, pp. 5356–5373, 2016.
  6. Aliedani and S. W. Loke, “Cooperative car parking using vehicle-to-vehicle communication: An agent-based analysis,” Computers, Environment and Urban Systems, p., 2018.
  7. K. Grover, A. Lim, S. Lee, and Q. Yang, “Privacy-enabled probabilistic verification in broadcast authentication for vehicular Networks,” Ad Hoc and Sensor Wireless Networks, vol. 32, no. 3–4, pp. 239–274, 2016.
  8. García-Magariño, G. Palacios-Navarro, R. Lacuesta, and J. Lloret, “ABSCEV: An agent-based simulation framework about smart transportation for reducing waiting times in charging electric vehicles,” Computer Networks, vol. 138, pp. 119–135, 2018.
  9. Chaogang Tang, Xianglin Wei, Chunsheng Zhi, Wei Chen,Joel J. P. C. Rodrigues,” Towards Smart Parking Based on Fog Computing” ,IEEEAccess, 2018.
  10. Joonsang Yoo and Jeong Hyun Yi,” Code-Based Authentication Scheme for Lightweight Integrity Checking of Smart Vehicles “, IEEE Journal, 2018.
  11. CHIEN-MING CHEN, BIN XIANG, YINING LIU and KING-HANG WANG, “A Secure Authentication Protocol for internet of vehicle”, IEEE Access, Volume 7, January 2019, page number 12047-12056.
  12. Bidi Ying, Amiya Nayak, “Ananymous and lightweight authentication for secure vehicular network”, IEEE TRANSACTION ON VEHICULAR TECHNOLOGY, VOL 66, DECEMBER 2017.


Internet of vehicle, Vehicular user, Vehicles, Roadside Unit, Trust Authorities