Vehicular-to-Everything Communication in IoT

A special issue of Information (ISSN 2078-2489). This special issue belongs to the section "Information and Communications Technology".

Deadline for manuscript submissions: closed (31 March 2023) | Viewed by 2362

Special Issue Editors

E-Mail Website
Guest Editor
Laboratoire d'Informatique Gaspard Monge, Université Gustave Eiffel, 77454 Marne-la-Vallée, France
Interests: computer network; Internet of Things; AIoT: artificial Intelligent of Things; applied cryptography; blockchain
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Laboratoire d'Informatique Gaspard Monge, Université Paris-Est Marne-la-Vallée, 77454 Marne-la-Vallée, France
Interests: UAV; mobile edge computing; reinforcement learning; IoT; computer network
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Over the last decade, a significant number of vehicles are equipped with several connected objects/sensors with the ability to interact with the environment through heterogeneous communication technologies. These technologies are embedded in the on-board communication units in order to exchange data with different IoT devices, connected vehicles, and any other infrastructural support (such as road side units (RSUs) or even unmanned aerial vehicles (UAVs)). These kinds of communications establish what we call the paradigm of “Vehicle-to-Everything communication (V2E)”.

The V2E communication paradigm covers several application domains: infotainment, road safety, autonomous vehicles, air quality mapping, location-oriented services, smart city, smart district, etc.

To promote V2E research, the aim of this Special Issue is to attract recent research findings, both from industry and academia, with a particular focus on ITS applications, management, efficiency, and infotainment areas, etc. Therefore, contributions may focus on, but are not limited to the following areas.

1) Vehicle-to-X communication, networking and technologies

2) Vehicle-to-X requirements, platforms and software   

3) Vehicle-to-UAV communication

4) V2X architectures, standards and regulations

5) Mobility management in V2X and Internet of Vehicles

6) V2X Applications and Use cases

7) AI-based solutions for V2X

8) V2X-based autonomous driving

9) V2X and connected digital twins interactions

10) V2X security and privacy architectures and protocols 

Prof. Dr. Abderrezak Rachedi
Dr. Omar Sami Oubbati
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Information is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.


  • V2X networking and technologies
  • connected digital twins for V2X
  • AI-based mechanisms
  • security and privacy in V2X

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:


20 pages, 2128 KiB  
Using Adaptive Zero-Knowledge Authentication Protocol in VANET Automotive Network
by Igor Anatolyevich Kalmykov, Aleksandr Anatolyevich Olenev, Natalia Igorevna Kalmykova and Daniil Vyacheslavovich Dukhovnyj
Information 2023, 14(1), 27; - 31 Dec 2022
Cited by 3 | Viewed by 1838
One of the most important components of intelligent transportation systems (ITS) is the automotive self-organizing VANET network (vehicular ad hoc network). Its nodes are vehicles with specialized onboard units (OBU) installed on them. Such a network can be subject to various attacks. To [...] Read more.
One of the most important components of intelligent transportation systems (ITS) is the automotive self-organizing VANET network (vehicular ad hoc network). Its nodes are vehicles with specialized onboard units (OBU) installed on them. Such a network can be subject to various attacks. To reduce the effectiveness of a number of attacks on the VANET, it is advisable to use authentication protocols. Well-known authentication protocols support a security policy with full trust in roadside unit (RSU) base stations. The disadvantage of these authentication protocols is the ability of the RSU to track the route of the vehicle. This leads to a violation of the privacy and anonymity of the vehicle’s owner. To eliminate this drawback, the article proposes an adaptive authentication protocol. An advantage of this protocol is the provision of high imitation resistance without using symmetric and asymmetric ciphers. This result has been achieved by using a zero-knowledge authentication protocol. A scheme for adapting the protocol parameters depending on the intensity of the user’s traffic has been developed for the proposed protocol. The scientific novelty of this solution is to reduce time spent on authentication without changing the protocol execution algorithm by reducing the number of modular exponentiation operations when calculating true and “distorted” digests of the prover and verifying the correctness of responses, as well as by reducing the number of responses. Authentication, as before, takes place in one round without changing the bit depth of the modulus used in the protocol. To evaluate the effectiveness of the adaptive authentication protocol, the VANET model was implemented using NS-2. The obtained research results have shown that the adaptation of the authentication protocol in conditions of increased density of vehicles on the road makes it possible to increase the volume of data exchange between OBU and RSU by reducing the level of confidentiality. In addition, a mechanism for verifying the authority of the vehicle’s owner for provided services has been developed. As a result of the implementation of this mechanism, vehicle registration sites (VRS) calculate the public key of the vehicle without using encryption and provide necessary services to the owner. Full article
(This article belongs to the Special Issue Vehicular-to-Everything Communication in IoT)
Show Figures

Figure 1

Back to TopTop