{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T17:40:11Z","timestamp":1767289211594,"version":"build-2065373602"},"reference-count":48,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2020,4,27]],"date-time":"2020-04-27T00:00:00Z","timestamp":1587945600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>A key characteristic of Smart Cities is the ability to reduce conflicts between different agents coexisting in a dynamic system, such as the interaction between vehicles and pedestrians. This paper presents a system to augment the awareness of vehicle drivers regarding the presence of pedestrians in nearby crosswalks. The proposed system interconnects Road Side Units (RSUs), which are informed about the state of the crosswalks, and vehicles, in order to spread to vehicles, the information about the presence of pedestrians in crosswalks. To prevent false information spreading, RSUs sign the alert messages they broadcast and all vehicles can validate the signatures. This poses strong security requirements, such as non-repudiation of alert messages, as well as strong real-time requirements, such as minimum message validation delays among vehicles approaching a crosswalk of interest. To manage the signed alert messages, we are proposing Nimble Asymmetric Cryptography (NAC), which authenticates implicit broadcast messages. NAC minimizes the usage of asymmetric ciphers, which are fundamental to assure non-repudiation but increase performance penalties and uses hash chaining for source authentication of implicit messages.<\/jats:p>","DOI":"10.3390\/s20092473","type":"journal-article","created":{"date-parts":[[2020,4,28]],"date-time":"2020-04-28T10:30:58Z","timestamp":1588069858000},"page":"2473","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["An Efficient and Secure Alert System for VANETs to Improve Crosswalks\u2019 Security in Smart Cities"],"prefix":"10.3390","volume":"20","author":[{"given":"Jo\u00e3o","family":"Branquinho","sequence":"first","affiliation":[{"name":"Instituto de Telecomunica\u00e7\u00f5es, 3810-193 Aveiro, Portugal"},{"name":"University of Aveiro, 3810-193 Aveiro, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6791-4291","authenticated-orcid":false,"given":"Carlos","family":"Senna","sequence":"additional","affiliation":[{"name":"Instituto de Telecomunica\u00e7\u00f5es, 3810-193 Aveiro, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9745-4361","authenticated-orcid":false,"given":"Andr\u00e9","family":"Z\u00faquete","sequence":"additional","affiliation":[{"name":"Instituto de Telecomunica\u00e7\u00f5es, 3810-193 Aveiro, Portugal"},{"name":"DETI\/IEETA, University of Aveiro, 3810-193 Aveiro, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2020,4,27]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"2985","DOI":"10.1109\/TITS.2015.2439292","article-title":"A Security and Privacy Review of VANETs","volume":"16","author":"Qu","year":"2015","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Mishra, R., Singh, A., and Kumar, R. (2016, January 3\u20135). VANET security: Issues, challenges and solutions. Proceedings of the 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), Chennai, India.","DOI":"10.1109\/ICEEOT.2016.7754846"},{"key":"ref_3","first-page":"19","article-title":"A survey on authentication schemes in VANETs for secured communication","volume":"9","author":"Manvi","year":"2017","journal-title":"Veh. Commun."},{"key":"ref_4","first-page":"45","article-title":"Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A survey","volume":"16","author":"Ali","year":"2019","journal-title":"Veh. Commun."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1621","DOI":"10.1109\/TITS.2018.2827460","article-title":"An Efficient Message-Authentication Scheme Based on Edge Computing for Vehicular Ad Hoc Networks","volume":"20","author":"Cui","year":"2019","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"34507","DOI":"10.1109\/ACCESS.2020.2974214","article-title":"When Backscatter Communication Meets Vehicular Networks: Boosting Crosswalk Awareness","volume":"8","author":"Pereira","year":"2020","journal-title":"IEEE Access"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Branquinho, J., Senna, C., and Z\u00faquete, A. (2019, January 16\u201319). Smart Crosswalks: A Safe Alert System That Minimizes the Confrontation Between Vehicles and Pedestrians. Proceedings of the 13th Multi Conference on Computer Science and Information Systems, Porto, Portugal.","DOI":"10.33965\/csc2019_201908C048"},{"key":"ref_8","unstructured":"ETSI (2010). ETSI TS 102 637-3 V1.1.1 Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Part 3: Specifications of Decentralized Environmental Notification Basic Service, European Telecommunications Standards Institute. Technical report."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Ivanov, I., Maple, C., Watson, T., and Lee, S. (2018, January 28\u201329). Cyber security standards and issues in V2X communications for Internet of Vehicles. Proceedings of the Living in the Internet of Things: Cybersecurity of the IoT\u20142018, London, UK.","DOI":"10.1049\/cp.2018.0046"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Wasef, A., and Shen, X. (2010, January 23\u201327). Efficient group signature scheme supporting batch verification for securing vehicular networks. Proceedings of the 2010 IEEE International Conference on Communications, Cape Town, South Africa.","DOI":"10.1109\/ICC.2010.5502136"},{"key":"ref_11","unstructured":"Hasrouny, H., Bassil, C., Samhat, A.E., and Laouiti, A. (May, January 29). Group-based authentication in V2V communications. Proceedings of the Fifth International Conference on Digital Information and Communication Technology and its Applications (DICTAP), Beirut, Lebanon."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Guo, J., Baugh, J.P., and Wang, S. (2007, January 11). A Group Signature Based Secure and Privacy-Preserving Vehicular Communication Framework. Proceedings of the 2007 Mobile Networking for Vehicular Environments, Anchorage, AK, USA.","DOI":"10.1109\/MOVE.2007.4300813"},{"key":"ref_13","first-page":"199","article-title":"Provably Secure Proxy Multi-Signature Scheme Based on ECC","volume":"43","author":"Tiwari","year":"2014","journal-title":"Inf. Technol. Control"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Kim, D., Choi, J., and Jung, S. (2010, January 9\u201312). Mutual Identification and Key Exchange Scheme in Secure VANETs Based on Group Signature. Proceedings of the 2010 7th IEEE Consumer Communications and Networking Conference, Las Vegas, NV, USA.","DOI":"10.1109\/CCNC.2010.5421656"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Lim, K., Tuladhar, K.M., Wang, X., and Liu, W. (2017, January 19\u201321). A scalable and secure key distribution scheme for group signature based authentication in VANET. Proceedings of the 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), New York, NY, USA.","DOI":"10.1109\/UEMCON.2017.8249091"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"943","DOI":"10.1016\/j.future.2016.11.024","article-title":"Computationally Efficient Privacy Preserving Anonymous Mutual and Batch Authentication Schemes for Vehicular Ad Hoc Networks","volume":"78","author":"Vijayakumar","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"4987","DOI":"10.1109\/T-WC.2008.070773","article-title":"TSVC: Timed efficient and secure vehicular communications with privacy preserving","volume":"7","author":"Lin","year":"2008","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"3357","DOI":"10.1109\/TVT.2008.928581","article-title":"An efficient message authentication scheme for vehicular communications","volume":"57","author":"Zhang","year":"2008","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"749","DOI":"10.1109\/JSYST.2012.2231792","article-title":"TEAM: Trust-Extended Authentication Mechanism for Vehicular Ad Hoc Networks","volume":"8","author":"Chuang","year":"2014","journal-title":"IEEE Syst. J."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Chim, T.W., Yiu, S.M., Hui, L.C.K., and Li, V.O.K. (2009, January 22\u201326). Security and Privacy Issues for Inter-vehicle Communications in VANETs. Proceedings of the 2009 6th IEEE Annual Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks Workshops, Rome, Italy.","DOI":"10.1109\/SAHCNW.2009.5172962"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Vighnesh, N.V., Kavita, N., Urs, S.R., and Sampalli, S. (2011, January 25\u201328). A novel sender authentication scheme based on hash chain for Vehicular Ad-Hoc Networks. Proceedings of the 2011 IEEE Symposium on Wireless Technology and Applications (ISWTA), Langkawi, Malaysia.","DOI":"10.1109\/ISWTA.2011.6089388"},{"key":"ref_22","first-page":"16","article-title":"A lightweight authentication scheme for vehicular ad hoc networks based on MSR","volume":"15","author":"Yang","year":"2019","journal-title":"Veh. Commun."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1016\/j.iot.2018.11.003","article-title":"Securing the Internet of Things: Challenges, threats and solutions","volume":"5","author":"Grammatikis","year":"2019","journal-title":"Internet Things"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1635","DOI":"10.1109\/LCOMM.2016.2574708","article-title":"A Traffic-Light-Aware Routing Protocol Based on Street Connectivity for Urban Vehicular Ad Hoc Networks","volume":"20","author":"Ding","year":"2016","journal-title":"IEEE Commun. Lett."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1109\/CC.2018.8424605","article-title":"A greedy traffic light and queue aware routing protocol for urban VANETs","volume":"15","author":"Xia","year":"2018","journal-title":"China Commun."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"27","DOI":"10.3141\/2140-03","article-title":"Effectiveness of Automatic Pedestrian Detection Device and Smart Lighting for Pedestrian Safety","volume":"2140","author":"Nambisan","year":"2009","journal-title":"Transp. Res. Rec."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Pau, G., Campisi, T., Canale, A., Severino, A., Collotta, M., and Tesoriere, G. (2018). Smart Pedestrian Crossing Management at Traffic Light Junctions through a Fuzzy-Based Approach. Future Internet, 10.","DOI":"10.3390\/fi10020015"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1016\/j.neucom.2015.06.098","article-title":"Efficient authentication and access control of message dissemination over vehicular ad hoc network","volume":"181","author":"Kang","year":"2016","journal-title":"Neurocomputing"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1145\/302350.302353","article-title":"A New Family of Authentication Protocols","volume":"32","author":"Anderson","year":"1998","journal-title":"SIGOPS Oper. Syst. Rev."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Perrig, A., Canetti, R., Tygar, J.D., and Song, D. (2002). The TESLA broadcast authentication protocol. RSA CryptoBytes, 1\u201311.","DOI":"10.1007\/978-1-4615-0229-6_3"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Perrig, A., Song, D., Canetti, R., Tygar, J.D., and Briscoe, B. (2005). Timed Efficient Stream Loss-Tolerant Authentication (TESLA): Multicast Source Authentication Transform Introduction, Network Working Group, The Internet Society. RFC 4082 (Informational).","DOI":"10.17487\/rfc4082"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Perrig, A., and Tygar, J.D. (2003). TESLA Broadcast Authentication. Secure Broadcast Communication: In Wired and Wireless Networks, Springer.","DOI":"10.1007\/978-1-4615-0229-6"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Jahanian, M.H., Amin, F., and Jahangir, A.H. (2015, January 7\u20139). Analysis of TESLA protocol in vehicular ad hoc networks using timed colored Petri nets. Proceedings of the 2015 6th International Conference on Information and Communication Systems (ICICS), Amman, Jordan.","DOI":"10.1109\/IACS.2015.7103231"},{"key":"ref_34","unstructured":"(2016). 1609.12-2019\u2014IEEE Standard for Wireless Access in Vehicular Environments (WAVE)\u2014Identifiers, IEEE."},{"key":"ref_35","unstructured":"Marques, M.S.R. (2018). Avalia\u00e7\u00e3o de Estrat\u00e9gias de Dissemina\u00e7\u00e3o de Mensagens de emerg\u00eaNcia em Redes Veiculares. [Master\u2019s Thesis, University of Aveiro]."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Chen, Y.L., and Wang, C.A. (2007, January 22\u201325). Vehicle Safety Distance Warning System: A Novel Algorithm for Vehicle Safety Distance Calculating Between Moving Cars. Proceedings of the 2007 IEEE 65th Vehicular Technology Conference\u2014VTC2007\u2014Spring, Dublin, Ireland.","DOI":"10.1109\/VETECS.2007.529"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"982","DOI":"10.1007\/s10033-017-0143-z","article-title":"Estimation of Road Friction Coefficient in Different Road Conditions Based on Vehicle Braking Dynamics","volume":"30","author":"Zhao","year":"2017","journal-title":"Chin. J. Mech. Eng."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Pessoa, G., Dias, R., Condeixa, T., Azevedo, J., Guardalben, L., and Sargento, S. (2017, January 29\u201331). Content distribution emulation for vehicular networks. Proceedings of the 2017 Wireless Days, Porto, Portugal.","DOI":"10.1109\/WD.2017.7918146"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1109\/JIOT.2018.2791522","article-title":"PortoLivingLab: An IoT-Based Sensing Platform for Smart Cities","volume":"5","author":"Santos","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_40","first-page":"36","article-title":"Frequency and velocity of people walking","volume":"84","author":"Pachi","year":"2005","journal-title":"Struct. Eng."},{"key":"ref_41","first-page":"264","article-title":"Musings on the Wang et al. MD5 Collision","volume":"2004","author":"Hawkes","year":"2004","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/11426639_2","article-title":"How to Break MD5 and Other Hash Functions","volume":"Volume 3494","author":"Hutchison","year":"2005","journal-title":"Advances in Cryptology\u2014EUROCRYPT 2005"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1007\/11799313_17","article-title":"A Study of the MD5 Attacks: Insights and Improvements","volume":"Volume 4047","author":"Hutchison","year":"2006","journal-title":"Fast Software Encryption"},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Stevens, M., Sotirov, A., Appelbaum, J., Lenstra, A., Molnar, D., Osvik, D.A., and De Weger, B. (2009). Short chosen-prefix collisions for MD5 and the creation of a rogue CA certificate. Proceedings of the Annual International Cryptology Conference, Springer.","DOI":"10.1007\/978-3-642-03356-8_4"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Josefsson, S., and Liusvaara, I. (2017). Edwards-Curve Digital Signature Algorithm (EdDSA), Internet Society. RFC 8032 (Informational).","DOI":"10.17487\/RFC8032"},{"key":"ref_46","unstructured":"Knoop, V., and Daganzo, C. (2017, January 8\u201312). The Effect of Pedestrian Crossings on Traffic Flow. Proceedings of the 96th Annual Meeting Transportation Research Board, Washington, DC, USA."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1016\/j.trc.2016.02.017","article-title":"Management of intersections with multi-modal high-resolution data","volume":"68","author":"Muralidharan","year":"2016","journal-title":"Transp. Res. Part Emerg. Technol."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"2467","DOI":"10.1109\/TITS.2016.2634623","article-title":"EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks","volume":"18","author":"Azees","year":"2017","journal-title":"IEEE Trans. Intell. Transp. Syst."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/9\/2473\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T13:23:56Z","timestamp":1760361836000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/9\/2473"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,27]]},"references-count":48,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2020,5]]}},"alternative-id":["s20092473"],"URL":"https:\/\/doi.org\/10.3390\/s20092473","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2020,4,27]]}}}