1. Introduction
The rapid migration of people from villages to cities has produced major threats in regard to controlling the overfilled traffic. Traffic congestion in a city environment has now become the focal point of many researchers. Vehicular AdHoc networks provide the Intelligent Transportation System with the help of Road Side Units (RSU). These networks are the primary source of improving driving safety by decreasing roadside accidents [
1]. However, RSU message passing is categorized under Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) Communication. VANETs help minimize roadside accidents and recognize the positions of vehicles moving along the same track. On VANETs, spotting emergency vehicles, such as patrol cars and ambulances, is an easy task. This process is subject to acquiring the moving vehicle’s actual location. According to the authors [
2], location service is the critical application of VANETs. There is a belief that Intelligent Transportation Systems employ the Internet of Everything (IoE). The authors’ paper also discusses monitoring the traffic flow using edge computing in VANETs [
3]. Resource sharing is one of the significant issues involved with vehicular communication. Resource sharing in high-vehicle mobility requires significant power consumption; which is a severe obstacle in vehicular Communication [
4]. To optimize resource utilization and reduce network signal overhead, distributed resource management is beneficial [
5].
P2P (Peer-to-Peer) systems using a wireless network are growing in popularity due to the evolution of the internet. These systems provide optimal performance while sharing messages and other resources. Road safety applications using P2P wireless networks are also becoming a vital part of the VANET for traffic monitoring [
6,
7]. For Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I), the area is selected by determining a particular cluster, or through a distance radius. An Intelligent Traffic System brings about numerous benefits to traffic management [
8]. These benefits include on-the-mark traffic monitoring, right traffic congestion analysis, sending accurate traffic violation warnings to drivers, traffic infrastructure analysis, and sending messages using V2V and V2I Communication [
9].
In an ITS, the average message response time typically takes up to 10 times in milliseconds. The cluster or a distance radius usually has a radius range of approximately 400 meters. On a Vehicular AdHoc Network, the message passing can be done through textual, graphic, and audible information. The VANET must be secured against cyber-attacks, unauthorized access, identity theft, and phishing [
10]. It may be stated that VANET security is breached when someone gains unauthorized access to a particular Vehicle Onboard Unit (OBU), and is able to alter or hinder the vehicle’s main functionality. Due to traffic congestion or bad road infrastructure, there is a chance of vehicle collision [
11]. The “Crash Possibility” message can be conveyed to the vehicle in an attempt to overcome this issue. Distance measurement is a necessary element to generate a collision warning message; which can be performed using a camera and a sensor [
12]. There is a problem of false messages passing for vehicle collision warnings. To eliminate this issue, we took the services of a third-party Certification Authority. The CA will carry out multiple functions like vehicle registration and vehicle authentication. It also acts as a bridge for V2V and V2I communications. Due to authentication with CA, the identity of the false message sender can be highlighted as shown in
Table 1.
We proposed secure cluster-based authentication and communication schemes for Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communications. Our work covers the following phases for V2I and V2V communications and resource sharing in a VANET.
Authentication and registration using third-party Certification Authority
V2I & V2I Communication Channel
Graph-Based Resource Sharing in Vehicular Communication
For registration and authentication, we took up assistance from the third-party Certification Authority. We demonstrated the V2V and V2I communication mechanism in a 400-meter diameter. We addressed primary security goals like integrity, authenticity, and availability of messages in vehicular communication on a specific cluster.
Figure 1 simplifies the Vehicle-to-Vehicle communication in a 400-meter cluster. CH means the Head of the Cluster, and CM denotes the other Cluster Member. We proposed two algorithms based on baseline and greedy approaches for resource allocation in vehicular communications.
Section 1 addresses the introduction and research contribution. In
Section 2, we have discussed previous studies relevant to the research. We compared the various past research contributions on VANET with the aid of a comparison table.
Section 3 includes the research methodology, implementation, performance evaluation, results, and discussions. The methodology section includes the demonstration of the proposed scheme, implementation, and graph-based resource sharing in vehicular communications. This section further addresses notations and assumptions, research results, and performance evaluation. In the implementation subsection, we have discussed the utilized tools and technologies. Ultimately, we have concluded our research in the conclusion section.
2. Literature Review
In VANETs, the significant contribution of the researchers includes (a) a central service directory architecture [
13,
14,
15], (b) directory-less service architecture [
16,
17,
18], and (c) distributed directory service architecture [
19,
20,
21,
22,
23]. In the first portion, based on central service discovery architecture, the researchers proposed a central discovery server to store the service information and re-join a discovery request with the matched discovery outcomes. Ali et al. [
13] discussed a three-way link between 5G technology, Software-Defined Networks, and Vehicular AdHoc Networks. The authors concentrated on creating a network balance through highlighting the mobility, security, and performance of software-defined networks (SDN). The authors of [
14] discussed mystery location-oriented and self-reliance protocols for Mobile AdHoc Networks routing. The authors anticipated their views on a secure packet delivery mechanism in MANETs for vehicular communications. Edge et al. [
15] discussed the techniques and methods for providing location-based services for users’ tools by requiring assistance from Service-Based Interfaces.
The authors [
17] proposed the idea of edge computing in Vehicular AdHoc Networks using bit-blocking protocol infrastructure. The authors [
18] elucidated the use and function of wireless Vehicular AdHoc Networks. They differentiated the structure of MANETs and Cellular Networks. Yang et al. [
19] clarified the Vehicle-to-Vehicle (V2V) communications using Peer-to-Peer networks through employing graph theory and consensus algorithm. The authors omitted the Roadside Units and defined the serial communication between vehicles moving along the road. The authors [
20] conducted three focus group interviews and eight individual interviews to address trust and privacy matters in Peer-to-Peer networks. Shah et al. [
21] provided a visual paradigm of VANET in a 5G technology-based network. The authors [
22] described the concept of vehicular cloud by using P2P routing protocols to prevent road accidents, monitor traffic, and ensure fast content delivery. Singh et al. [
23] wrote a survey paper on the state of the art vehicular communications and future directions for further studies. Salem et al. [
24] proposed a self-organized framework for VANETs. They applied mathematical analysis to their proposed framework in order to enhance security goals. They also evaluated their framework’s performance in terms of computation complexity, storage, and communication overhead. By comparing several schemes, they also tested their framework against several types of external attacks. The authors of [
25,
26] evaluated the performance of vehicular communication on P2P wireless network, while the authors of [
27,
28,
29,
30] discussed several security issues and challenges in VANETs with multiple dimensions including P2P wireless networks.
Table 2 consists of the comparison of previous research over vehicular communication and VANETs, while
Figure 2 displays various VANET routing protocols.
Table 2. compares related works on Vehicular Communication with paper reference, publishing year, and significant contribution attributes. (✔) indicates that the topic is covered completely, whereas (✗) means no discussion is present, and (✽) conveys that the topic is covered partially.
Routing protocols play an essential role in vehicular AdHoc networks; expediting the provision of several services through facilitating the transmission of messages from one node to another. There are two distinct categories for VANET routing protocols. Topological Routing Protocols (TRPs) are one kind, while Geographic Routing Protocols (GRPs) are another. Topological routing protocols maintain data links and disseminate topological data. Scalability issues, time- consumption discovery, cumbersome control requirements, and tedious maintenance are merely a number of the challenges that TRPs must overcome.
On the other hand, Geographic Routing Protocols depend on the most up-to-date location information to establish connections with moving vehicles. Keeping and disseminating the connection data is optional. Because of their simplicity and low overhead, these protocols function well in highly dynamic, large-scale networks. Compared to topological routing protocols, geographical routing protocols perform and scale better, while having a lower routing overhead. Obtaining the precise coordinates of the vehicles, and then adjusting the routes accordingly is a necessary first step in developing GRPs [
54,
55,
56,
57,
58].
Figure 3 provides the hierarchy of routing protocols with their significant components.
Zhang et al. [
31] presented a brief account of Artificial Intelligence Transmission Scheduling in cognitive vehicular communications and networks. They discussed several vehicular communication modes, including V2V and V2I. They also investigated the features of these communication modes and spectrum resources adopted by vehicles in diverse network states with numeric values. As a result, they proposed a deep reinforcement earning algorithm for optimal scheduling of vehicular communication. Liang et al. [
32] discussed resource allocation and power-sharing in vehicular communication. They debated the requirements for different links, like high capacity for V2I links and UR for V2V links. They proposed several optimal resource allocation algorithms for better resource allocation and power-sharing. Zhang et al. [
33] discussed a capable network paradigm with predictive off-loading for vehicular networks. The authors explained the cloud-based vehicular networks in multiple dimensions by proposing a mobile edge computing framework. They talked about the effectiveness of V2V and V2I communication modes in terms of vehicle mobility, and time consumption of executing the computation task. The authors of [
34] discuss the hierarchy of various types of wireless networks and network standards. They examine a cumulative smart grid model for vehicle mobility and other wireless technologies. Furthermore, they have presented an overview of radio technologies with their corresponding ranges and IoT security analysis.
The authors [
35] proposed several models and communication channel measurement metrics for wireless infrared networks. Their research discussed almost 20 optical wireless communication models with different communication scenarios. Rahman et al. [
36] elaborated on the longitudinal safety assessment of connected vehicles moving on superhighways. They expressed their intelligent driver model in a connected vehicle network with a high-level control algorithm. They proposed three joining categories, including front join, rear join, and cut join, with possible safety measures such as time-to-collision, rear-end crash risk index, and sideswipe crash risk. Masini et al. [
37] authored a survey paper on V2V-based vehicular sensor network communications. They discussed both V2V and V2X in the sense of visible light communication and 5G. They also discussed the challenges and issues posed by short-range V2V communication. The authors [
38] discussed V2X channel models for communication by explaining the physical layer perspectives. The authors also discussed the resource allocation and challenges in vehicular communications.
Yan et al. [
39] discussed Vehicle-to-Vehicle communication in Vehicular AdHoc Networks by introducing a short-range communication model. The authors also highlighted the probability analysis of Vehicle-to-Vehicle linking in road sections. Liu et al. [
40] designed a modified clustering algorithm by modifying the improved force-directed algorithm and spectral-clustering algorithm. They utilized the SUMO tool to perform their experiments for cluster stability in VANETs. The authors of [
41] described VANETs cloud architecture for traffic management using a cloud communication vehicle. They proposed a cloud service and vehicle handle message algorithms for V2V and V2V communication. [
42] analyzed the message propagation speed in VANETs. They applied the Markov renewal process to categorize message passing between RSUs.
Xiao et al. [
43] proposed a cell transmission model for freeway traffic on VANETs, and performed a thorough connection probability analysis. The authors also performed numerical simulations of their results with the help of different graphs. The authors (Ali et al., 2020) proposed a distributed architecture for VANET’s performance based on fog technology. To ensure transmission reliability, they also developed a mathematical model for assertive communication between vehicles and the fog layer. In their research, the authors evaluated the performance of their proposed architecture by considering major factors like throughput, jitter, and delay time. The authors [
42,
59] proposed a privacy-preserving communication scheme for VANETs. They intermixed elliptic curve cryptography and an identity-based encryption scheme to compose their scheme. The authors addressed server impersonation, replay, modification, and man-in-middle attacks.
Various researchers such as [
60] have proposed models regarding cluster-based routing in VANETs, and a stream position performance analysis methodology was presented to address security concerns. Their model is based on DDoS attack detection and uses various factors that become a source of threat to cluster-based routing. The authors [
61] used a real geographic scenario to analyze the cluster-based routing protocol for VANET. They simulated their work on SUMO for varying numbers of vehicles. By highlighting cluster-based routing protocol, the authors [
62] discussed the applicability of a routing protocol on VANET. The authors [
63] discussed the issues and challenges of location-based routing protocols in VANET. They also discussed the issues and challenges of cluster-based routing protocols.
The Vehicular AdHoc Network (VANET) is an Intelligent Transportation System (ITS) that requires regular monitoring for optimum operation. The goal of a VANET is successfully implemented via the application of Machine Learning algorithms; which allow the system to automatically learn from its data processing history and optimize itself accordingly. This article examines the safety, communication, and traffic-related challenges in VANET systems and how machine-learning methods may solve these issues. It also includes a case study demonstrating a VANET-based situation [
45], and discusses future directions and obstacles.
In this study, we have addressed a multi-objective optimization problem to fine-tune the settings of a graph-based attribute-vector classification system (GCMAV). It seeks to optimize global criteria while increasing the class lifespan and the pace of information transmission and decreasing inter-class overload. It presents an Efficient Key Management Scheme (KMSUNET) that uses symmetric and asymmetric encryption to solve performance and security issues. The NetSim simulator and the MOEA framework were employes to run the simulations and fine-tune the settings. Open Street Map was used for the experiments’ realistic maps, and the findings were compared to competing algorithms. The suggested technique performs well because of the typical inter-class lifespan and information transmission rate [
46].
Vehicle-to-Vehicle communication and other cars, roadside devices, and infrastructure are made possible via Vehicular AdHoc Networks (VANETs); a special case of mobile AdHoc networks. Messages must be sent safely and reliably to increase security, facilitate the management of urban and road traffic, and offer services to the commuting public. This study presents a trust-based authentication mechanism for clustered vehicular AdHoc networks to build reliable and stable clusters, ensuring the stability of the entire whole. Cluster Heads (CHs) are chosen according to the predicted trust degree of each vehicle; which is calculated by adding the trust between cars and the trust between the vehicle and Road Side Units (RSUs). After being digitally signed by the sender, messages are encrypted using a public/private key-pair provided by a Trusted Authority (TA), and then decoded at the receiving end. Simulated results demonstrate that the suggested strategy improves malicious node detection accuracy, improves packet delivery ratio, and reduces authentication latency and overhead [
47].
In terms of improving road safety and management, intelligent transportation systems, of which vehicular AdHoc networks are a crucial component, cannot be overstated. Nodes may be unable to obtain reliable traffic data if unscrupulous users insert phoney emergency warnings into the networks. In this paper, we offer a novel method for identifying malicious nodes that uses a fuzzy logic model to rate the reliability of each node. The vehicles are organized into groups, and an off-road device verifies the reliability of each node prior to allowing them access to the networks. Validation and demonstration of the technique’s capability to identify and remove all malicious nodes over time are shown via simulations, decreasing the percentage of harmful nodes and raising the success rate of the supplied data [
48].
This work offers a unique self-adaptable Angular-based k-medoid Clustering Scheme (SAACS) to create adaptable clusters. To decrease network latency, clusters are built by making educated assumptions about route lengths and signal ranges. A unique performance indicator, the cosine-based node uncoupling frequency, determines which will serve as the Cluster Head (CH). The parametric analysis range depends on the number of vehicular nodes that may receive a signal. Comparing the suggested method to others, such as Cluster Head Lifetime (CHL), Cluster Member Lifetime (CML), Cluster Number (CL), Cluster Overhead (CO), Packet Loss Ratio (PLR), and Average Packet Delay (APD), the experimental findings indicate that the proposed method provides superior service (APD). CML is 50% more effective than RTVC plus ECHS; whereas CHL is improved by 40% compared to RTVC alone. The suggested methodology reduces the ratio of lost packets to total packets, and the overhead incurred by other methods by 45%. As a result, the disparity between highway nodes in congested and sparse areas has shrunk [
49]. The purpose of this research is to give a comprehensive analysis of the solutions presented so far to alleviate traffic congestion. It covers and analyses the three major subsystems of a Traffic Management System, and offers and discusses future research directions and notable topics that require additional examination for a practical and effective Traffic Management System [
50].
This study suggests employing a one-way hash chain model based Urbanized Block Chain Key Agreement Protocol (UB-KAP) to strengthen privacy and data integrity safeguards in VANET-based healthcare networks. To expedite replies, beacons use a packet classification procedure to identify which emergency messages are safe and which are dangerous. To ensure the effectiveness of the proposed model, SUMO simulates road traffic (Simulation of Urban Mobility). The overall assessment considers the data collected per user, the message delivery ratio, the total data acquired, the latency, and the energy used by the model [
51].
This study aims to provide a new framework for an intelligent data-driven transportation system in metropolitan settings that can display CV data in real-time utilizing a big data analytic engine. It suggests a revolutionary visualization Representational State Transfer (REST) web service, an efficient real-time data distribution strategy, and innovative ways for collecting, extracting, and ingesting data. Through using OMNET++ and Veins, we recreated a traffic incident dataset and put Basic Safety Messages through their paces in a large data cluster experiment. Accurate performance was shown for packet loss, packet delivery, and communication delay; high throughput and low latency were identified for distributed data delivery systems; and the RESTFUL visualization web service exhibited the quickest response time [
52].
A novel algorithmic method is hereby provided to organize the cluster structure, and choose CHs suitable for use in a VANET. By improving network settings, Weighted Cluster Protocol (AWCP) achieves the optimal channel by randomly pairing nodes. An automobile network with optimized throughput and location is presented based on a study of the AWCP EE-WOA model. The key generated by each car should be updated regularly, and if a vehicle develops the best method for recognizing keys, the system administrator should suspend or revoke the authority of scenarios. A maximum cluster efficiency of 96.84 is achieved by employing the proposed algorithm, making it superior to both the Weighted Cluster Protocol and the AWCP Whale algorithmic programme protocols in terms of increased encapsulation potency and portability [
53].
6. Conclusions
This research covered a broad spectrum of vehicular communications on VANET. We proposed the cluster-based improved authentication and communication resource-sharing algorithms for vehicular communications. The use of cluster-based routing schemes for V2V and V2I communication enhances the reliability, scalability, and stability of fast-moving VANETs. The third-party certification authority for vehicle authentication provides a secure and private mechanism for authentication. The schemes minimize the E2E delay and route request, reduce link failure, and improve the throughput, TCP Socket Initialization time, TCP handshake response, and DNS lookup. The innovative P2P wireless communication in a 400-meter radius cluster minimizes the resources used, and the RESTful APIs and algorithms for resource sharing enable implementation in vehicular communication. Our experimental evaluation demonstrates the effectiveness of the proposed schemes in optimizing resource sharing in vehicular communication. The proposed scheme can contribute to the development of more efficient and reliable Intelligent Transportation Systems in VANETs, which can improve the traffic management and reduce congestion in overcrowded city zones. For simulation and performance evaluation, we used MATLAB and REST APIs. Finally, the results of this study were compared with those obtained through relevant past studies, suggesting an improved performance through cluster-based authentication and communication scheme.
Since the 5G network diminishes the internet speed barrier and other issues related to VANETs communication, our proposed improved cluster-based authentication and communication scheme will provide accelerated performance in V2I and V2V communications. It is also helpful in developing real-world apps in the future by adopting this secure and reliable scheme. One future trend in the area of urban traffic monitoring in VANETs (Vehicular Ad-hoc Networks) based on cluster management is the integration of blockchain technology. Blockchain can provide a secure and decentralized way of managing the clusters and nodes in VANETs, enhancing the security and privacy of the communication and authentication schemes. Another trend is the use of artificial intelligence and machine learning algorithms to improve the accuracy and efficiency of the traffic monitoring and management. These techniques can help in identifying patterns, predicting traffic congestion, and optimizing traffic flow. Moreover, the use of IoT (Internet of Things) sensors and devices, such as cameras and traffic sensors, can be integrated into VANETs for collecting real-time data and improving the accuracy of traffic monitoring and management. Finally, the development of new communication protocols and standards for VANETs can also be expected. The focus will be on enhancing the reliability, security, and privacy of the communication schemes, as well as ensuring interoperability and compatibility with other networks and systems.