JOURNAL ARTICLE

Performance Enhancement for Secure Vehicular Communications

Abstract

In this paper, we propose a new TESLA (timed efficient stream loss-tolerant authentication) based secure vehicular communication (TSVC) protocol with privacy preserving, aiming to achieve less communication overhead without compromising the security and privacy requirements. With TSVC, the communication overhead can be significantly reduced due to the message authentication code (MAC) tag attached in each packet and only a fast hash operation is required to verify each packet. Simulation results show that TSVC maintains acceptable message latency with much smaller packet size while significantly reducing the message loss ratio compared with that by the existing PKI-based protocols especially when the traffic is denser.

Keywords:
Computer science Computer network Message authentication code Overhead (engineering) Hash-based message authentication code Latency (audio) Network packet Packet loss Authentication (law) Hash function Low latency (capital markets) Protocol (science) Cryptographic protocol Computer security Cryptography Telecommunications

Metrics

7
Cited By
0.62
FWCI (Field Weighted Citation Impact)
7
Refs
0.75
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Vehicular Ad Hoc Networks (VANETs)
Physical Sciences →  Engineering →  Electrical and Electronic Engineering
Advanced Authentication Protocols Security
Physical Sciences →  Computer Science →  Computer Networks and Communications
Mobile Ad Hoc Networks
Physical Sciences →  Computer Science →  Computer Networks and Communications

Related Documents

JOURNAL ARTICLE

Secure performance analysis and optimization for FD-NOMA vehicular communications

Lai WeiYingyang ChenDongsheng ZhengBingli Jiao

Journal:   China Communications Year: 2020 Vol: 17 (11)Pages: 29-41
JOURNAL ARTICLE

Secure and privacy-preserving, timed vehicular communications

Mike BurmesterEmmanouil MagkosVassilis Chrissikopoulos

Journal:   International Journal of Ad Hoc and Ubiquitous Computing Year: 2012 Vol: 10 (4)Pages: 219-219
© 2026 ScienceGate Book Chapters — All rights reserved.