{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T03:17:10Z","timestamp":1773717430974,"version":"3.50.1"},"reference-count":52,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2024,2,26]],"date-time":"2024-02-26T00:00:00Z","timestamp":1708905600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"CyberSecurity Research Flanders","award":["VR20192203"],"award-info":[{"award-number":["VR20192203"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>This research investigates the deployment and effectiveness of the novel Pre-Signature scheme, developed to allow for up-to-date reputation being available in Vehicle-to-Vehicle (V2V) communications in rural landscapes, where the communications infrastructure is limited. We discuss how existing standards and specifications can be adjusted to incorporate the Pre-Signature scheme to disseminate reputation. Addressing the unique challenges posed by sparse or irregular Roadside Units (RSUs) coverage in these areas, the study investigates the implications of such environmental factors on the integrity and reliability of V2V communication networks. Using the widely used SUMO traffic simulation tool, we create and simulate real-world rural scenarios. We have conducted an in-depth performance evaluation of the Pre-Signature scheme under the typical infrastructural limitations encountered in rural scenarios. Our findings demonstrate the scheme\u2019s usefulness in scenarios with variable or constrained RSUs access. Furthermore, the relationships between the three variables, communication range, amount of RSUs, and degree of home-to-vehicle connectivity overnight, are studied, offering an exhaustive analysis of the determinants influencing V2V communication efficiency in rural contexts. The important findings are (1) that access to accurate Reputation Values increases with all three variables and (2) the necessity of Pre-Signatures decreases if the amount and range of RSUs increase to high numbers. Together, these findings imply that areas with a low degree of adoption of RSUs (typically rural areas) benefit the most from our approach.<\/jats:p>","DOI":"10.3390\/fi16030077","type":"journal-article","created":{"date-parts":[[2024,2,26]],"date-time":"2024-02-26T10:40:17Z","timestamp":1708944017000},"page":"77","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Enabling Vehicle-to-Vehicle Trust in Rural Areas: An Evaluation of a Pre-Signature Scheme for Infrastructure-Limited Environments"],"prefix":"10.3390","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6319-4840","authenticated-orcid":false,"given":"Dimah","family":"Almani","sequence":"first","affiliation":[{"name":"Cyber Security Research Group, School of Computer Science, University of Nottingham, Nottingham NG8 1BB, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1263-4230","authenticated-orcid":false,"given":"Tim","family":"Muller","sequence":"additional","affiliation":[{"name":"Cyber Security Research Group, School of Computer Science, University of Nottingham, Nottingham NG8 1BB, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1697-6940","authenticated-orcid":false,"given":"Xavier","family":"Carpent","sequence":"additional","affiliation":[{"name":"Cyber Security Research Group, School of Computer Science, University of Nottingham, Nottingham NG8 1BB, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5684-9597","authenticated-orcid":false,"given":"Takahito","family":"Yoshizawa","sequence":"additional","affiliation":[{"name":"COSIC, KU Leuven, 3001 Leuven, Belgium"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0984-7542","authenticated-orcid":false,"given":"Steven","family":"Furnell","sequence":"additional","affiliation":[{"name":"Cyber Security Research Group, School of Computer Science, University of Nottingham, Nottingham NG8 1BB, UK"}]}],"member":"1968","published-online":{"date-parts":[[2024,2,26]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Anwar, W., Franchi, N., and Fettweis, G. (2019, January 22\u201325). Physical Layer Evaluation of V2X Communications Technologies: 5G NR-V2X, LTE-V2X, IEEE 802.11 BD, and IEEE 802.11 P. Proceedings of the 2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall), Honolulu, HI, USA.","DOI":"10.1109\/VTCFall.2019.8891313"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"5315","DOI":"10.1109\/JIOT.2021.3109010","article-title":"An Efficient Vehicle-to-Vehicle (V2V) Energy Sharing Framework","volume":"9","author":"Shurrab","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"4095","DOI":"10.1109\/TVT.2012.2209903","article-title":"A Reputation-Based Announcement Scheme for VANETs","volume":"61","author":"Li","year":"2012","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"7318","DOI":"10.1109\/TITS.2023.3253710","article-title":"Provably Secure and Anonymous V2I and V2V Authentication Protocol for VANETs","volume":"24","author":"Xie","year":"2023","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1621","DOI":"10.1109\/TITS.2018.2827460","article-title":"An Efficient Message-Authentication Scheme Based on Edge Computing for Vehicular Ad Hoc Networks","volume":"20","author":"Cui","year":"2018","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_6","unstructured":"Papadimitratos, P. (2024). Encyclopedia of Cryptography, Security and Privacy, Springer."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Simplicio, M.A., Cominetti, E.L., Patil, H.K., Ricardini, J.E., and Silva, M.V.M. (2018, January 5\u20137). The Unified Butterfly Effect: Efficient Security Credential Management System for Vehicular Communications. Proceedings of the 2018 IEEE Vehicular Networking Conference (VNC), Taipei, Taiwan.","DOI":"10.1109\/VNC.2018.8628369"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Verheul, E., Hicks, C., and Garcia, F.D. (2019, January 17\u201319). IFAL: Issue First Activate Later Certificates for V2X. Proceedings of the 2019 IEEE European Symposium on Security and Privacy (EuroSP), Stockholm, Sweden.","DOI":"10.1109\/EuroSP.2019.00029"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"26307","DOI":"10.1109\/ACCESS.2018.2834224","article-title":"A Realistic Distributed Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks","volume":"6","author":"Liu","year":"2018","journal-title":"IEEE Access"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Asghar, M., Doss, R.R.M., and Pan, L. (2018, January 21\u201323). A Scalable and Efficient PKI Based Authentication Protocol for VANETs. Proceedings of the 28th International Telecommunication Networks and Applications Conference (ITNAC), Sydney, NSW, Australia.","DOI":"10.1109\/ATNAC.2018.8615224"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"177693","DOI":"10.1109\/ACCESS.2020.3027718","article-title":"A Privacy-Preserving Authentication and Pseudonym Revocation Scheme for VANETs","volume":"8","author":"Qi","year":"2020","journal-title":"IEEE Access"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Joshi, A., Gaonkar, P., and Bapat, J. (2017, January 22\u201324). A Reliable and Secure Approach for Efficient Car-to-Car Communication in Intelligent Transportation Systems. Proceedings of the 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India.","DOI":"10.1109\/WiSPNET.2017.8300034"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"573","DOI":"10.1007\/s11276-006-6536-z","article-title":"Connectivity in One-Dimensional Ad Hoc Networks: A Queueing Theoretical Approach","volume":"12","author":"Miorandi","year":"2006","journal-title":"Wirel. Netw."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1538","DOI":"10.1109\/JSAC.2007.071005","article-title":"Routing in Sparse Vehicular Ad Hoc Wireless Networks","volume":"25","author":"Wisitpongphan","year":"2007","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Wu, J. (December, January 30). Connectivity Analysis of a Mobile Vehicular Ad Hoc Network with Dynamic Node Population. Proceedings of the 2008 IEEE Globecom Workshops, New Orleans, LA, USA.","DOI":"10.1109\/GLOCOMW.2008.ECP.60"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"2440","DOI":"10.1109\/TVT.2007.912161","article-title":"A Performance Modeling of Connectivity in Vehicular Ad Hoc Networks","volume":"57","author":"Khabazian","year":"2008","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Ng, S.C., Zhang, W., Yang, Y., and Mao, G. (2010, January 18\u201321). Analysis of Access and Connectivity Probabilities in Infrastructure-Based Vehicular Relay Networks. Proceedings of the 2010 IEEE Wireless Communication and Networking Conference, Sydney, NSW, Australia.","DOI":"10.1109\/WCNC.2010.5506271"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1016\/j.trb.2017.09.018","article-title":"A Critical Evaluation of the Next Generation Simulation (NGSIM) Vehicle Trajectory Dataset","volume":"105","author":"Coifman","year":"2017","journal-title":"Transp. Res. Part B Methodol."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Reis, A.B., Sargento, S., and Tonguz, O.K. (2011, January 15\u201318). On the Performance of Sparse Vehicular Networks with Road Side Units. Proceedings of the 2011 IEEE 73rd Vehicular Technology Conference (VTC Spring), Budapest, Hungary.","DOI":"10.1109\/VETECS.2011.5956724"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1168","DOI":"10.1007\/s10878-016-0029-5","article-title":"Optimal RSUs Deployment with Delay Bound along Highways in VANET","volume":"33","author":"Liu","year":"2017","journal-title":"J. Comb. Optim."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"2295","DOI":"10.1109\/TCOMM.2012.062512.100550","article-title":"A Cost-Effective Strategy for Road-Side Unit Placement in Vehicular Networks","volume":"60","author":"Wu","year":"2012","journal-title":"IEEE Trans. Commun."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"1654","DOI":"10.1109\/TIFS.2019.2946933","article-title":"Extensible Conditional Privacy Protection Authentication Scheme for Secure Vehicular Networks in a Multi-Cloud Environment","volume":"15","author":"Cui","year":"2019","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_23","first-page":"100279","article-title":"Accountable Credential Management System for Vehicular Communication","volume":"25","author":"Khan","year":"2020","journal-title":"Veh. Commun."},{"key":"ref_24","first-page":"100227","article-title":"Design and Evaluation of a Novel Hierarchical Trust Assessment Approach for Vehicular Networks","volume":"24","author":"Zeadally","year":"2020","journal-title":"Veh. Commun."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1016\/j.ins.2020.07.060","article-title":"Towards Secure and Practical Consensus for Blockchain Based VANET","volume":"545","author":"Kudva","year":"2021","journal-title":"Inf. Sci."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"1276","DOI":"10.1007\/s10878-016-0034-8","article-title":"Optimal RSUs Placement with Delay Bounded Message Dissemination in Vehicular Networks","volume":"33","author":"Liu","year":"2017","journal-title":"J. Comb. Optim."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Guerna, A., and Bitam, S. (2019, January 26\u201327). GICA: An Evolutionary Strategy for Roadside Units Deployment in Vehicular Networks. Proceedings of the 2019 International Conference on Networking and Advanced Systems (ICNAS), Annaba, Algeria.","DOI":"10.1109\/ICNAS.2019.8807882"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1145\/116873.116880","article-title":"Voronoi Diagrams\u2014A Survey of a Fundamental Geometric Data Structure","volume":"23","author":"Aurenhammer","year":"1991","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Patil, P., and Gokhale, A. (2013, January 20\u201324). Voronoi-Based Placement of Road-Side Units to Improve Dynamic Resource Management in Vehicular Ad Hoc Networks. Proceedings of the 2013 International Conference on Collaboration Technologies and Systems (CTS), San Diego, CA, USA.","DOI":"10.1109\/CTS.2013.6567260"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/MWC.2009.5361179","article-title":"Wireless Traffic Service Platform for Combined Vehicle-to-Vehicle and Vehicle-to-Infrastructure Communications","volume":"16","author":"Sukuvaara","year":"2009","journal-title":"IEEE Wirel. Commun."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"3850","DOI":"10.1109\/TITS.2018.2797529","article-title":"A Security Credential Management System for V2X Communications","volume":"19","author":"Brecht","year":"2018","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_32","first-page":"169","article-title":"Security Certificate Management System for V2V Communication in China","volume":"2","author":"Tao","year":"2019","journal-title":"SAE Int. J. Transp. Cyber. Privacy"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"1162","DOI":"10.1109\/JPROC.2011.2132790","article-title":"Dedicated Short-Range Communications (DSRC) Standards in the United States","volume":"99","author":"Kenney","year":"2011","journal-title":"Proc. IEEE"},{"key":"ref_34","unstructured":"(2023, September 23). Automated Vehicle Research. [Online], Available online: https:\/\/www.its.dot.gov\/automatedvehicle\/."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"6496","DOI":"10.1109\/JIOT.2021.3111048","article-title":"An RSU Deployment Strategy Based on Traffic Demand in Vehicular Ad Hoc Networks (VANETs)","volume":"9","author":"Yu","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_36","unstructured":"(2016). IEEE Standard for Wireless Access in Vehicular Environments\u2014Security Services for Applications and Management Messages (Standard No. IEEE Std 1609.2-2016)."},{"key":"ref_37","unstructured":"(2021). Intelligent Transport Systems (ITS); Security; ITS Communications Security Architecture and Security Management, Ver.2.1.1 (Standard No. TS 102 940)."},{"key":"ref_38","unstructured":"(2021). Intelligent Transport Systems (ITS); Security; Trust and Privacy Management, Ver.2.1.1 (Standard No. TS 102 941)."},{"key":"ref_39","unstructured":"(2021). Intelligent Transport Systems (ITS); Security; Security Header and Certificate Formats, Ver.2.1.1 (Standard No. TS 103 097)."},{"key":"ref_40","unstructured":"(2019). Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Part 3: Specifications of Decentralized Environmental Notification Basic Service, Ver.1.3.1 (Standard No. EN 302 637-2)."},{"key":"ref_41","unstructured":"Almani, D., Muller, T., Furnell, S., Carpent, X., and Yoshizawa, T. (2023, January 19\u201320). A Pre-Signature Scheme for Trustworthy Offline V2V Communication. Proceedings of the 14th IFIP International Conference on Trust Management (IFIPTM 2023), Amsterdam, The Netherlands."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Zeddini, B., Maachaoui, M., and Inedjaren, Y. (2022). Security Threats in Intelligent Transportation Systems and Their Risk Levels. Risks, 10.","DOI":"10.3390\/risks10050091"},{"key":"ref_43","unstructured":"Fujisaki, E., and Suzuki, K. (2007). International Workshop on Public Key Cryptography, Springer."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"98986","DOI":"10.1109\/ACCESS.2020.2997840","article-title":"AAAS: An Anonymous Authentication Scheme Based on Group Signature in VANETs","volume":"8","author":"Jiang","year":"2020","journal-title":"IEEE Access"},{"key":"ref_45","unstructured":"Backes, M., Meiser, S., and Schr\u00f6der, D. (2016). Public-Key Cryptography\u2014PKC 2016: 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, 6\u20139 March 2016, Springer. Proceedings, Part I."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1007\/s001450010003","article-title":"Security Arguments for Digital Signatures and Blind Signatures","volume":"13","author":"Pointcheval","year":"2000","journal-title":"J. Cryptol."},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Ateniese, G., and Hohenberger, S. (2005, January 7\u201311). Proxy Re-Signatures: New Definitions, Algorithms, and Applications. Proceedings of the 12th ACM Conference on Computer and Communications Security, ACM, Alexandria, VA, USA.","DOI":"10.1145\/1102120.1102161"},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Katz, J., and Katz, J. (2010). Digital Signatures, Springer.","DOI":"10.1007\/978-0-387-27712-7"},{"key":"ref_49","unstructured":"(2023, February 10). SUMO Home Page. [Online]. Available online: https:\/\/eclipse.dev\/sumo\/."},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Lopez, P.A., Behrisch, M., Bieker-Walz, L., Erdmann, J., Fl\u00f6tter\u00f6d, Y.-P., Hilbrich, R., L\u00fccken, L., Rummel, J., Wagner, P., and Wie\u00dfner, E. (2018, January 4\u20137). Microscopic Traffic Simulation Using SUMO. Proceedings of the 21st IEEE International Conference on Intelligent Transportation Systems, IEEE Intelligent Transportation Systems Conference (ITSC), Maui, HI, USA. Available online: https:\/\/elib.dlr.de\/124092\/.","DOI":"10.1109\/ITSC.2018.8569938"},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1109\/TMC.2010.133","article-title":"Bidirectionally Coupled Network and Road Traffic Simulation for Improved IVC Analysis","volume":"10","author":"Sommer","year":"2011","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Di Felice, M., Ghandour, A.J., Artail, H., and Bononi, L. (August, January 30). On the Impact of Multi-Channel Technology on Safety-Message Delivery in IEEE 802.11p\/1609.4 Vehicular Networks. Proceedings of the 2012 21st International Conference on Computer Communications and Networks (ICCCN), Munich, Germany.","DOI":"10.1109\/ICCCN.2012.6289273"}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/16\/3\/77\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T14:05:14Z","timestamp":1760105114000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/16\/3\/77"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,26]]},"references-count":52,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2024,3]]}},"alternative-id":["fi16030077"],"URL":"https:\/\/doi.org\/10.3390\/fi16030077","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2,26]]}}}