Smartphone-Based Platform for Secure Multi-Hop Message Dissemination in VANETs
<p>Building blocks of the smartphone-based platform for secure message dissemination. The platform is intended to support both the transmission (TX) and reception (RX) roles to enable a given node behave as source for packet generation, relay for disseminating messages, or as destination node. Specific functions (marked with *) at the TX/RX modules are optional, and should be enabled at the user space (i.e., configuration interface).</p> "> Figure 2
<p>Sequence diagram of the certificateless signature scheme (CSS) scheme.</p> "> Figure 3
<p>Sequence diagram of the enrollment process in the CSS (and asymmetric CSS [ACSS]) scheme.</p> "> Figure 4
<p>Sequence diagram of the Sign-Verify process in the CSS (and ACSS) scheme.</p> "> Figure 5
<p>Relay node identification (<b>phase 1</b>) and transmissions behavior (<b>phase 2</b>) with the Urban Multi-hop Broadcast (UMB) message dissemination protocol.</p> "> Figure 6
<p>Total transmitted data for using and not using the aggregation technique.</p> ">
Abstract
:1. Introduction
1.1. Smartphones in VANETs
1.2. Related Work
1.3. Contributions
- A methodological approach for the design of a mobile platform for enabling the provision of a novel certificateless security approach in a smartphone-based VANETs. In particular, the platform is intended to disseminate sensitive information and as such authentication and integrity checks are mandatory in our design.
- The construction in the asymmetric setting of a Certificateless Signature Scheme (ACSS), relying on pairing-based cryptographic signatures, that ensures authenticity of nodes and integrity of exchanged data among smartphones in VANETs. We present a novel construction of digital signing algorithm based on pairing-based cryptography under the asymmetric setting. The asymmetric property allows practical implementations for security levels compliant with current standards (e.g., 128-bits or greater).
- For the first time, a proof-of-concept, deployment of the ACSS scheme in a smartphone-based platform in VANETs is presented in the literature. We validate our platform over small-scale deployments, using as a baseline a multi-hop message dissemination protocol. Nevertheless, the platform can be used to deploy other message dissemination protocol as required.
2. Security in Vehicular Networking
3. Smartphone-Based Platform Design
3.1. Platform Requirements
- FR1: Message dissemination. The platform must behave either as a source node that starts the transmission of a message or as a relay that rebroadcasts a received message whenever a dissemination criterion is fulfilled.
- FR2: Security. The platform must provide authentication and integrity security services in a per-packet basis.
- FR3: Location-awareness. The platform must retrieve the current location of the device by means of a native location provider or any Bluetooth-enabled GPS device. While the first option is generally adopted, because the convenience and ease of use, the second alternative can be helpful in experiments aimed to contrast precision of location information from different providers. It should also be able to adjust intervals for location requests, which could be useful for deploying energy- and context-aware oriented mechanisms in VANET mechanisms and applications.
- FR4: Performance metrics. The platform must monitor and store relevant metrics related to message dissemination (e.g., delay, losses) and security services (e.g., execution time, memory usage). The collected metrics should be stored locally, and global statistics should be accessible by the user.
- FR5: Packet management. The platform must support a flexible packet management mechanism to enable the definition of application specific packet formats.
- NFR1: Passiveness. The user should not be aware of the underlying operation mechanisms on the smartphone-based platform for secure message dissemination. Moreover, minimal user involvement should be required for the configuration of basic elements.
- NFR2: Modifiability. The platform components should be organized to ease the understanding of its functional principles and interaction among components, allowing the integration of new functionalities.
- NFR3: Energy. The platform should provide the means for deploying mechanisms to drive a trade-off between energy efficiency and data transmission.
- NFR4: Network management. A given node running the platform should create, discover, and connect to the VANET without the intervention of any managing entity or infrastructure.
3.2. Platform Modules Definition
- Once the initial parameters have been introduced, the platform firstly creates the required sockets for message transmission and reception. This is because in our design a smart device deploying the platform could behave either as a source or as a relay node. A source node is the one that starts broadcasting a warning message to inform about a given event inferred from its sensed context. A relay node is expected to extend coverage transmission by rebroadcasting an incoming message. Although in this case no additional payload would be added to the received message, the node would require its contextual information (e.g., location, power, etc.) to determine if the considered dissemination criterion is fulfilled.
- At the application framework layer, the packet management module provides the functionality of packet generation according to a predefined packet format as illustrated in Table 2. Although the packet format could be easily modified to prevent large overhead amounts, the packet management component could also support power-aware strategies to drive trade-off between transmission packet delay and overhead-payload ratio. Each generated packet triggers an event at the storage module that records outgoing/ingoing packets processed by the platform.
- The wireless interface manager location at the application framework layer aims to control the interaction with the location providers. Unlike existing works that mainly rely on native GPS receiver, depending on energy constraints and location accuracy, our platform is designed to acquire location data from a native GPS sensor or an external GPS logger device accessed via Bluetooth. Regardless of the location provider, when the node deploying the platform needs to disseminate a message, at the TX module the location information is appended on each generated packet. On the contrary, when a message is received (RX module) it is verified and registered and then it is passed to the dissemination protocol module. This latter one decides whether the received message should be retransmitted to the next hop or not, taking into account a distance criterion.
- Upon the transmission or reception of a packet, a record of its payload is saved in a file. The information stored in the file conforms the Packet fields registry, which is maintained in the main storage directory of the device. The file (i.e., registry) contains the data of each packet that is part of an existing communication. A text string containing the payload’s fields is obtained from the object modeling the packet. The resulting file is available for statistical analysis offline at the end of the test trials.
3.3. Security Services in the VANET Platform
4. Asymmetric Certificateless Signature Scheme (ACSS)
4.1. Preliminaries
- , with g a generator in .
4.2. Description of Our ACSS
- -
- is the vehicle unique identifier (e.g., license plate).
- -
- Compute = (in ).
- -
- Compute = . is the partial private key for the vehicle v (in ).
- -
- is the vehicle partial private key.
- -
- Choose a random value a in (the set ).
- -
- Assign the tuple as the private key of v.
- -
- Assign the value as the public key of v.
- -
- M is the message to be signed by v.
- -
- is v’s identifier.
- -
- is v’s private key.
- -
- is v’s public key.
- -
- v chooses a random value a in (the set ).
- -
- v computes (in ).
- -
- v computes
- -
- Compute
- -
- Compute , where ’+’ is the group operation in .
- -
- The digital signature of M by v is .
- -
- M is the received message and its signature is .
- -
- is v’s identifier.
- -
- is v’s public key.
- -
- Compute (in ).
- -
- Compute (in ).
- -
- Compute (in ).
- -
- If equals to , the signature is valid and the message is considered authentic. If not, the message should be discarded. Here, the ’×’ operator is the group operation in .
4.3. Security Assumptions
- The master private key must be kept secure and the transport of partial private keys from the TA to the vehicles during the enrollment process must be secure, for example, using a SSL-enabled connection. Another alternative is the car manufacturer to install the key material in the vehicle offline.
5. Android Implementation
5.1. Wi-Fi Peer-to-Peer (P2P)
- The Server class, to create objects that listen on a port for newly received messages. This object keeps listening in the same port for new messages, and dispatch each one in a separated thread.
- The ServerTasks extends from the AsyncTask class and operates in the background. This class processes every received packet and obtains the reception timestamp. In addition, the message content fields are then stored in a file for future analysis and statistics extraction.
- The Client class has the main function of sending packets and appending them relevant data, such as GPS position and a unique identifier. This class also extends from AsyncTask, with the purpose of performing its operations in the background.
5.2. Packet Management
5.2.1. Packet Aggregation Mechanism
5.2.2. Packet Records
5.3. GPS Location Readings
5.4. The Security Scheme
6. Experimental Results
- Message dissemination evaluation. The aim of these experiments is to validate the platform’s feasibility for continuous packet generation, transmission, and reception in multi-hop conditions. Then, we also evaluate the performance of a location-based message dissemination protocol to determine the influence of the location provider’s precision on the message dissemination process for selecting the next relay node.
- Security services. We analyze the impact of deploying the proposed ACSS security scheme on our smartphone-based VANET platform in terms of delay and packet loss under different security levels.
- Packet aggregation. We determine the benefits of deploying packet aggregation mechanisms.
6.1. Message Dissemination Evaluation
- Successful reception ratio. Ratio of the total number of nodes and the number of nodes that correctly received the packets.
- Generated load per-broadcast packet. Ratio of the average of total transmitted bits and the total number of broadcast packets received.
- Relay error selection. The average times the protocol selects an erroneous relay node for broadcast purposes.
- Packet loss ratio. The percentage of packets lost per number of packets transmitted.
6.2. Impact of the Security Scheme
6.3. Packet Aggregation Evaluation
7. Concluding Remarks
Author Contributions
Funding
Conflicts of Interest
References
- Al-Sultan, S.; Al-Doori, M.M.; Al-Bayatti, A.H.; Zedan, H. A comprehensive survey on vehicular ad hoc network. J. Netw. Comput. Appl. 2014, 37, 380–392. [Google Scholar] [CrossRef]
- Toor, Y.; Muhlethaler, P.; Laouiti, A.; Fortelle, A.D.L. Vehicle Ad Hoc networks: Applications and related technical issues. IEEE Commun. Surv. Tutor. 2008, 10, 74–88. [Google Scholar] [CrossRef]
- Najm, W.G.; Koopmann, J.; Smith, J.D.; Brewer, J. Frequency of Target Crashes for Intellidrive Safety Systems; Technical Report; National Highway Traffic Safety Administration: Washington, DC, USA, 2010.
- Sadou, M.; Bouallouche-Medjkoune, L. Hybrid sensor and vehicular networks: A survey. Int. J. Veh. Inf. Commun. Syst. 2017, 3, 204–229. [Google Scholar] [CrossRef]
- Litman, T. Autonomous Vehicle Implementation Predictions. Available online: http://www.vtpi.org/avip.pdf (accessed on 10 March 2018).
- Raento, M.; Oulasvirta, A.; Petit, R.; Toivonen, H. ContextPhone: A prototyping platform for context-aware mobile applications. IEEE Pervasive Comput. 2005, 4, 51–59. [Google Scholar] [CrossRef]
- Petracca, M.; Pagano, P.; Pelliccia, R.; Ghibaudi, M.; Salvadori, C.; Nastasi, C. On-Board Unit Hardware and Software Design for Vehicular Ad-hoc Networks; IGI Global: Hershey PA, USA, 2012. [Google Scholar]
- Toutouh, J.; Alba, E. Light commodity devices for building vehicular ad hoc networks: An experimental study. Ad Hoc Netw. 2016, 37, 499–511. [Google Scholar] [CrossRef]
- Gorrieri, A.; Martalò, M.; Busanelli, S.; Ferrari, G. Clustering and sensing with decentralized detection in vehicular ad hoc networks. Ad Hoc Netw. 2016, 36, 450–464. [Google Scholar] [CrossRef]
- Park, Y.; Ha, J.; Kuk, S.; Kim, H.; Liang, C.J.M.; Ko, J. A feasibility study and development framework design for realizing smartphone-based vehicular networking systems. IEEE Trans. Mob. Comput. 2014, 13, 2431–2444. [Google Scholar] [CrossRef]
- Vandenberghe, W.; Moerman, I.; Demeester, P. On the feasibility of utilizing smartphones for vehicular ad hoc networking. In Proceedings of the 2011 11th International Conference on ITS Telecommunications (ITST 2011), St. Petersburg, Russia, 23–25 August 2011; pp. 246–251. [Google Scholar]
- Abid, H.; Chung, T.C.; Lee, S.; Qaisar, S. Performance Analysis of LTE Smartphones-Based Vehicle-to-Infrastrcuture Communication. In Proceedings of the 2012 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, Fukuoka, Japan, 4–7 September 2012; pp. 72–78. [Google Scholar]
- Jeong, S.; Baek, Y.; Son, S.H. A Hybrid V2X System for Safety-Critical Applications in VANET. In Proceedings of the 2016 IEEE 4th International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA), Nagoya, Japan, 6–7 October 2016; pp. 13–18. [Google Scholar]
- Tornell, S.M.; Patra, S.; Calafate, C.T.; Cano, J.C.; Manzoni, P. A novel On-Board Unit to accelerate the penetration of ITS services. In Proceedings of the 2016 13th IEEE Annual Consumer Communications Networking Conference (CCNC), Las Vegas, NV, USA, 9–12 January 2016; pp. 467–472. [Google Scholar]
- Campolo, C.; Iera, A.; Molinaro, A.; Paratore, S.Y.; Ruggeri, G. SMaRTCaR: An integrated smartphone-based platform to support traffic management applications. In Proceedings of the 2012 First International Workshop on Vehicular Traffic Management for Smart Cities (VTM), Dublin, Ireland, 20 November 2012; pp. 1–6. [Google Scholar]
- Su, K.C.; Wu, H.M.; Chang, W.L.; Chou, Y.H. Vehicle-to-vehicle communication system through wi-fi network using android smartphone. In Proceedings of the 2012 International Conference on Connected Vehicles and Expo (ICCVE), Beijing, China, 12–16 December 2012; pp. 191–196. [Google Scholar]
- Caballero-Gil, P.; Caballero-Gil, C.; Molina-Gil, J. How to build vehicular ad-hoc networks on smartphones. J. Syst. Archit. 2013, 59, 996–1004. [Google Scholar] [CrossRef]
- Buchenscheit, A.; Schaub, F.; Kargl, F.; Weber, M. A VANET-based emergency vehicle warning system. In Proceedings of the 2009 IEEE Vehicular Networking Conference (VNC), Tokyo, Japan, 28–30 October 2009; pp. 1–8. [Google Scholar]
- Rivero-García, A.; Santos-González, I.; Caballero-Gil, P. A Secure Mobile Platform for Intelligent Transportation Systems. In International Joint Conference SOCO’16-CISIS’16-ICEUTE’16; Graña, M., López-Guede, J.M., Etxaniz, O., Herrero, Á., Quintián, H., Corchado, E., Eds.; Springer International Publishing: Cham, Switzerland, 2017; pp. 487–497. [Google Scholar]
- Viriyasitavat, W.; Midtrapanon, S.; Rittirat, T.; Thanumaiweerakun, S. Performance analysis of android-based real-time message dissemination in VANETs. In Proceedings of the 2016 International Conference on Computing, Networking and Communications (ICNC), Kauai, HI, USA, 15–18 Feburary 2016; pp. 1–5. [Google Scholar]
- Dhurandher, S.; Obaidat, M.; Jaiswal, A.; Tiwari, A.; Tyagi, A. Vehicular Security Through Reputation and Plausibility Checks. IEEE Syst. J. 2014, 8, 384–394. [Google Scholar] [CrossRef]
- Galaviz-Mosqueda, A.; Morales-Sandoval, M.; Villarreal-Reyes, S.; Galeana-Zapién, H.; Rivera-Rodríguez, R.; Alonso-Arévalo, M.Á. Multi-hop broadcast message dissemination in vehicular ad hoc networks: A security perspective review. Int. J. Distrib. Sens. Netw. 2017, 13. [Google Scholar] [CrossRef] [Green Version]
- Chen, W.; Guha, R.K.; Kwon, T.J.; Lee, J.; Hsu, Y.Y. A survey and challenges in routing and data dissemination in vehicular ad hoc networks. Wirel. Commun. Mob. Comput. 2011, 11, 787–795. [Google Scholar] [CrossRef]
- Mejri, M.N.; Ben-Othman, J.; Hamdi, M. Survey on VANET security challenges and possible cryptographic solutions. Veh. Commun. 2014, 1, 53–66. [Google Scholar] [CrossRef]
- Engoulou, R.G.; Bellaïche, M.; Pierre, S.; Quintero, A. VANET security surveys. Comput. Commun. 2014, 44, 1–13. [Google Scholar] [CrossRef]
- Johnson, D.; Menezes, A.; Vanstone, S. The Elliptic Curve Digital Signature Algorithm (ECDSA). Int. J. Inf. Secur. 2001, 1, 36–63. [Google Scholar] [CrossRef]
- Malip, A.; Ng, S.L.; Li, Q. A certificateless anonymous authenticated announcement scheme in vehicular ad hoc networks. Secur. Commun. Netw. 2014, 7, 588–601. [Google Scholar] [CrossRef] [Green Version]
- Morales-Sandoval, M.; Gonzalez Compean, J.L.; Diaz Perez, A.; Sosa Sosa, V.J. A pairing-based cryptographic approach for data security in the Cloud. Int. J. Inf. Secur. 2018, 17, 441–461. [Google Scholar] [CrossRef]
- Xiong, H.; Chen, Z.; Li, F. Efficient and multi-level privacy-preserving communication protocol for VANET. Comput. Electr. Eng. 2012, 38, 573–581. [Google Scholar] [CrossRef]
- Lyu, C.; Gu, D.; Zhang, X.; Sun, S.; Tang, Y. Efficient, fast and scalable authentication for VANETs. In Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), Shanghai, China, 7–10 April 2013; pp. 1768–1773. [Google Scholar]
- Ying, B.; Makrakis, D.; Mouftah, H.T. Privacy preserving broadcast message authentication protocol for VANETs. J. Netw. Comput. Appl. 2013, 36, 1352–1364. [Google Scholar] [CrossRef]
- Al-Riyami, S.S.; Paterson, K.G. Certificateless Public Key Cryptography. In Advances in Cryptology, ASIACRYPT 2003; Laih, C.S., Ed.; Springer: Berlin/Heidelberg, Germany, 2003; pp. 452–473. [Google Scholar]
- Shamir, A. Identity-Based Cryptosystems and Signature Schemes. In Advances in Cryptology; Blakley, G.R., Chaum, D., Eds.; Springer: Berlin/Heidelberg, Germany, 1985; pp. 47–53. [Google Scholar]
- Boneh, D. Pairing-Based Cryptography: Past, Present, and Future. In Advances in Cryptology—ASIACRYPT 2012; Springer: Berlin/Heidelberg, Germany, 2012; Volume 7658. [Google Scholar]
- Escofier, J.P. Galois Theory; Graduate Texts in Mathematics; Springer: New York, NY, USA, 2001; Volume 204. [Google Scholar]
- Lynn, B. On the Implementation of Pairing-Based Cryptosystems. Ph.D. Thesis, Department of Computere Science, Stanford University, Stanford, CA, USA, 2007. [Google Scholar]
- De Caro, A.; Iovino, V. jPBC: Java pairing based cryptography. In Proceedings of the 2011 IEEE Symposium on Computers and Communications (ISCC), Corfu, Greece, 28 June–1 July 2011; pp. 850–855. [Google Scholar]
- Barker, E.; Barker, W.; Burr, W.; Polk, W.; Smid, M. Recommendation for Key Management—Part 1: General (Revision 4); NIST Special Publication 800-57; NIST: Gaithersburg, MD, USA, 2015; pp. 1–156.
- Korkmaz, G.; Ekici, E.; Özgüner, F.; Özgüner, U. Urban Multi-hop Broadcast Protocol for Inter-vehicle Communication Systems. In Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks, Philadelphia, PA, USA, 1 October 2004; ACM: New York, NY, USA, 2004; pp. 76–85. [Google Scholar]
Year | Platform | Purpose | Disseminationn | Communication | Security Service |
---|---|---|---|---|---|
2017 [19] | Smartphones (Android) | Traffic event-based notifications | V2I (single-hop) | 3G | Authentication |
2016 [8] | Smartphones, tablets (Android) | Periodic message exchange | V2V (single-hop) | Wi-Fi | None |
2016 [20] | Smartphones (Android) | Periodic message exchange | V2V (single-hop) | Wi-Fi | None |
2016 [14] | Smartphones (Android), Raspberry Pi | Peer-to-peer video transmission | V2V (single-hop) | Wi-Fi | None |
2013 [17] | Smartphones (Android) | Traffic event-based notifications | V2V (single-hop) | Wi-Fi | Authentication |
2012 [15] | Smartphones (Android), Arduino | Traffic management | V2I (single-hop) | 3G | None |
2012 [16] | Smartphone (Android) | Periodic message exchange | V2V (multi-hop) | Wi-Fi Direct | None |
2009 [18] | Laptops | Emergency unit warning messages | V2V, V2I (multi-hop) | Wi-Fi | Authentication |
This work | Smartphones (Android) | Periodic message exchange | V2V (multi-hop) | Wi-Fi | Authentication, integrity |
Field Name | Data Type | Size (bytes) |
---|---|---|
Packet identifier | String | 7 |
Message type | Char | 2 |
MAC address | String | 17 |
IP address | Byte | 4 |
Time stamp | String | 23 |
Latitude | Double | 8 |
Longitude | Double | 8 |
Speed | Double | 8 |
Security flag | Char | 2 |
Feature/Device | Samsumg Galaxy Note 10.1 | Samsumg Galaxy Grand Prime |
---|---|---|
System on Chip (SoC) | Exynos 4412 | Snapdragon 410 |
CPU | Quad-core 1.4 GHz Cortex-A9 | Quad-core 1.2 GHz Cortex-A53 |
GPU | Mali-400 | Mali-400 |
Memory | 2 GB RAM | 1 GB RAM |
Internal storage | 64 GB | 8 GB |
Battery capacity | 7000 mAh | 2600 mAh |
Android OS | Ice Cream Sandwich (4.0.3) | KitKat (4.4.4) |
Wi-Fi | 802.11 a/b/g/n, Wi-Fi Direct, | 802.11 a/b/g/n, Wi-Fi Direct |
Bluetooth | 4.0 | 4.0 |
Distance (m) | RTT (ms) | Packet Loss (%) |
---|---|---|
10 | 106.56 | 33.89 |
20 | 111.15 | 27.14 |
50 | 112.55 | 45.65 |
100 | 114.92 | 48.12 |
Security | GPS | Rx Ratio (%) | Gen. Load (bits) |
---|---|---|---|
Not enabled | Native | 79.13 | 1754.49 |
External | 90.36 | 1722.13 | |
Enabled | Native | 57.94 | 10,264.78 |
External | 85.21 | 10,820.89 |
GPS Provider | Security | Relay Selection Error (%) | Packet Loss A–B (%) | Packet Loss B–C (%) | Packet Loss C–A (%) |
---|---|---|---|---|---|
Native | Not enabled | 53.13 | 19.41 | 17.22 | 25.97 |
Enabled | 84.38 | 17.13 | 12.80 | 21.24 | |
External | Not enabled | 40.63 | 8.18 | 7.42 | 13.32 |
Enabled | 65.63 | 6.12 | 4.78 | 33.46 |
Sec. Level/Groups Size | Sym | Asym | ||||
---|---|---|---|---|---|---|
80 | 1024 | 1024 | 1024 | 320 | 640 | 192 |
112 | 2048 | 2048 | 2048 | 448 | 896 | 2688 |
128 | 3072 | 3072 | 3072 | 512 | 1024 | 3072 |
Operations | Security Level (bits) | ||
---|---|---|---|
80 | 112 | 128 | |
Message generation | 5.22 | 4.88 | 5.00 |
Parsing to bytes | 0.65 | 0.53 | 0.52 |
Signature regeneration | 1231.01 | 1628.67 | 1894.17 |
Output to interface | 0.53 | 0.51 | 0.54 |
Other | 2.85 | 2.70 | 3.15 |
Total | 1240.26 | 1637.29 | 1903.38 |
Operations | Security Level (bits) | ||
---|---|---|---|
80 | 112 | 128 | |
Message reconstruction | 7.18 | 6.62 | 8.08 |
Signature regeneration | 329.07 | 443.71 | 453.48 |
Other | 0.03 | 0.03 | 0.03 |
Total | 336.28 | 450.36 | 461.59 |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Galeana-Zapién, H.; Morales-Sandoval, M.; Leyva-Vázquez, C.A.; Rubio-Loyola, J. Smartphone-Based Platform for Secure Multi-Hop Message Dissemination in VANETs. Sensors 2020, 20, 330. https://doi.org/10.3390/s20020330
Galeana-Zapién H, Morales-Sandoval M, Leyva-Vázquez CA, Rubio-Loyola J. Smartphone-Based Platform for Secure Multi-Hop Message Dissemination in VANETs. Sensors. 2020; 20(2):330. https://doi.org/10.3390/s20020330
Chicago/Turabian StyleGaleana-Zapién, Hiram, Miguel Morales-Sandoval, Carlos A. Leyva-Vázquez, and Javier Rubio-Loyola. 2020. "Smartphone-Based Platform for Secure Multi-Hop Message Dissemination in VANETs" Sensors 20, no. 2: 330. https://doi.org/10.3390/s20020330
APA StyleGaleana-Zapién, H., Morales-Sandoval, M., Leyva-Vázquez, C. A., & Rubio-Loyola, J. (2020). Smartphone-Based Platform for Secure Multi-Hop Message Dissemination in VANETs. Sensors, 20(2), 330. https://doi.org/10.3390/s20020330