Volume no :
|
Issue no :
Article Type :
Author :
Dr.S.Sathiya Priya, Dr.V.JeyaRamya, Ashwin Kumar. N. A, Manish Kandan K, Pattabiraman M
Published Date :
Publisher :
Page No: 1 - 9
Abstract : Real time data sharing between vehicles through V2V communication has been presented as a possible solution to improve traffic efficiency and reduce road safety issues which are major problems in contemporary transportation systems on account of rapid growth in vehicle traffic. This paper describes a real-time V2V communication system implementation that uses wireless communication technologies to enable vehicles to transmit vital information, including position, speed, and emergency alarms. The system helps increase drivers' situational awareness and their proactive decision-making by providing low-latency, secure, and reliable message transmission. Results from experiments show better reaction times, less chance of accidents, and better traffic flow. V2V communication offers collision avoidance techniques that are quicker and more efficient than those found in traditional warning systems. The suggested solution is intended to support the advancement of Intelligent Transportation Systems (ITS) by being scalable and responsive to various traffic situations. Furthermore, security measures like authentication and encryption are put in place to stop data manipulation and unwanted access. To find the best strategy for real-time applications, the study also investigates a number of wireless communication protocols, such as LoRa, Wi-Fi, and DSRC. In order to further improve transportation efficiency and safety, future improvements will incorporate AI-based predictive analytics and expand into Vehicle-to-Infrastructure (V2I) communication.
Keyword Intelligent Transportation System (ITS), Vehicular Ad-hoc Network (VANET), Low-Latency Communication, Network Congestion Management, Artificial Intelligence in Transportation, Cybersecurity in V2V Communication.
Reference:
  1. Deepa, R., Karthick, R., Velusamy, J., & Senthilkumar, R. (2025). Performance analysis of multiple-input multiple-output orthogonal frequency division multiplexing system using arithmetic optimization algorithm. Computer Standards & Interfaces, 92, 103934.
  2. Senthilkumar Ramachandraarjunan, Venkatakrishnan Perumalsamy & Balaji Narayanan 2022, ‘IoT based artificial intelligence indoor air quality monitoring system using enabled RNN algorithm techniques’, in Journal of Intelligent & Fuzzy Systems, vol. 43, no. 3, pp. 2853-2868
  3. Senthilkumar, Dr.P.Venkatakrishnan, Dr.N.Balaji, Intelligent based novel embedded system based IoT Enabled air pollution monitoring system, ELSEVIER Microprocessors and Microsystems Vol.77, June 2020
        1. Raju, P., Arun, R., Turlapati, V. R., Veeran, L., & Rajesh, S. (2024). Next-Generation Management on Exploring AI-Driven Decision Support in Business. In Optimizing Intelligent Systems for Cross-Industry Application(pp. 61-78). IGI Global.
        2. Turlapati, V. R., Thirunavukkarasu, T., Aiswarya, G., Thoti, K. K., Swaroop, K. R., & Mythily, R. (2024, November). The Impact of Influencer Marketing on Consumer Purchasing Decisions in the Digital Age Based on Prophet ARIMA-LSTM Model. In 2024 International Conference on Integrated Intelligence and C</em></em&gt;</em>ommunication Systems (ICIICS)(pp. 1-6). IEEE.

      &lt;

    /

ol>

    1. Srinivasan, R. (2025). Friction Stir Additive Manufacturing of AA7075/Al2O3 and Al/MgB2 Composites for Improved Wear and Radiation Resis
    1. t

ance in Aerospace Applications. J. Environ. Nanotechnol, <em>14(1), 295-305.

  • Vijayalakshmi, K., Amuthakkannan, R., Ramachandran, K., & Rajkavin, S. A. (2024). Federated L

 

    1. earning-Based Futuristic Fault Diagnosis and Standardization in Rotating Machinery.

SSRG International Journal of Electronics and Communication Engineering

    1. ,

11</em>

    1. (9), 223-236.

    2. Rajakannu, A. (2024). Implementation of Quality Function Deployment to Improve Online Learning and Teaching in Higher Education Institutes of Engineering in Oman. International Journal of Learning, Teaching and Educational Research, <em>23(12), 463-486.

<li

>Rajakannu, A., Ramachandran, K. P., & Vijayalakshmi, K. (2024). Application of Artificial Intelligence in Condition Monitoring for Oil and Gas Industries.

  • Al Haddabi, T., Rajakannu

, A., & Al Hasni, H. (2024). Design and Development of a Low-Cost Parabolic Type Solar Dryer and Its Performance Evaluation in Drying of King Fish–Case Study in Oman.

  • Rajakannu, A., Ramachandran, K. P., &

 

    1. <l

i style=”list-style-type: none;”>

    Vijayalakshmi, K. (2024). Condition Monitoring of Drill Bit for Manufacturing Sector Using Wavelet An

alysis and Artificial Neural Network (ANN).

  • Sakthibalan, P., Saravanan, M., Ansal, V., Rajakannu, A., Vijayalakshmi, K., & Vani, K. D. (2023). A Federated Learning Approach for Res

 

    1. ourceConstrained IoT Security Monitoring. In

Handbook on Federated Learning

     (pp. 131-154). CRC Press.

  1. Amuthakkannan, R., & Al Yaqoubi, M. H. A. (2023). Development of IoT based water pollution identification to avoid destruction of aquatic life and to improve the quality of water. International journal of engineering trends and technology71(10), 355-370.
  2. Amuthakkannan, R., Vijayalakshmi, K., Kamarunisha, M., Kumar, S. G., Ajithkumar, P., & Vikram, P. (2023). Optimization of multi parameters of WEDM using ANN based on principal component analysis for AA6063/B4C metal matrix composites. Materials Today: Proceedings.
  3. Amuthakkannan, R., Muthuraj, M., Ademi, E., Rajesh, V., & Ahammad, S. H. (2023). Analysis of fatigue strength on friction stir lap weld AA2198/Ti6Al4V joints. Materials Today: Proceedings.
  1. Sidharth, S. (2017). Access Control Frameworks for Secure Hybrid Cloud Deployments.
  2. Sidharth, S. (2016). Establishing Ethical and Accountability Frameworks for Responsible AI Systems.
  3. Sidharth, S. (2015). AI-Driven Detection and Mitigation of Misinformation Spread in Generated Content.
  4. Sidharth, S. (2015). Privacy-Preserving Generative AI for Secure Healthcare Synthetic Data Generation.
  5. Sidharth, S. (2018). Post-Quantum Cryptography: Readying Security for the Quantum Computing Revolution.
  6. Sidharth, S. (2019). DATA LOSS PREVENTION (DLP) STRATEGIES IN CLOUD-HOSTED APPLICATIONS.
  7. Sidharth, S. (2017). Cybersecurity Approaches for IoT Devices in Smart City Infrastructures.
  8. Sidharth, S. (2016). The Role of Artificial Intelligence in Enhancing Automated Threat Hunting 1Mr. Sidharth Sharma.
  9. Thamma, S. R. T. S. R. (2024). Optimization of Generative AI Costs in Multi-Agent and Multi-Cloud Systems.
  1. Thamma, S. R. T. S. R. (2024). Revolutionizing Healthcare: Spatial Computing Meets Generative AI.
  1. Jadhav, S., Machale, A., Mharnur, P., Munot, P., & Math, S. (2019, September). Text based stress detection techniques analysis using social media. In 2019 5th International Conference On Computing, Communication, Control And Automation (ICCUBEA)(pp. 1-5). IEEE.
  2. Thepade, D. S., Mandal, P. R., & Jadhav, S. (2015). Performance Comparison of Novel Iris Recognition Techniques Using Partial Energies of Transformed Iris Images and Enegy CompactionWith Hybrid Wavelet Transforms. In Annual IEEE India Conference (INDICON).
  3. Kiran, A., Sonker, A., Jadhav, S., Jadhav, M. M., Naga Ramesh, J. V., & Muniyandy, E. (2024). Secure Communications with THz Reconfigurable Intelligent Surfaces and Deep Learning in 6G Systems. Wireless Personal Communications, 1-17.
  4. Anitha, C., Tellur, A., Rao, K. B., Kumbhar, V., Gopi, T., Jadhav, S., & Vidhya, R. G. (2024). Enhancing Cyber-Physical Systems Dependability through Integrated CPS-IoT Monitoring. International Research Journal of Multidisciplinary Scope5(2), 706-713.
  5. Vandana, C. P., Basha, S. A., Madiajagan, M., Jadhav, S., Matheen, M. A., & Maguluri, L. P. (2024). IoT resource discovery based on multi faected attribute enriched CoAP: smart office seating discovery. Wireless Personal Communications, 1-18.
  1. Jadhav, S., Durairaj, M., Reenadevi, R., Subbulakshmi, R., Gupta, V., & Ramesh, J. V. N. (2024). Spatiotemporal data fusion and deep learning for remote sensing-based sustainable urban planning. International Journal of System Assurance Engineering and Management, 1-9.
  1. Thamma, S. R. (2024). Cardiovascular image analysis: AI can analyze heart images to assess cardiovascular health and identify potential risks.
  2. Thamma, S. R. T. S. R. (2024). Generative AI in Graph-Based Spatial Computing: Techniques and Use Cases.
  1. Vasista, T. G. K. (2016). Thoughtful approaches to implementation of electronic rulemaking. Int. J. Manag. Pub. Sect. Inf. Commun. Technol7(2), 43-53.
  1. Kalaiselvi, B., & Thangamani, M. (2020). An efficient Pearson correlation based improved random forest classification for protein structure prediction techniques. Measurement162, 107885.
  2. Prabhu Kavin, B., Karki, S., Hemalatha, S., Singh, D., Vijayalakshmi, R., Thangamani, M., … & Adigo, A. G. (2022). Machine learning‐based secure data acquisition for fake accounts detection in future mobile communication networks. Wireless Communications and Mobile Computing2022(1), 6356152.
  3. Geeitha, S., & Thangamani, M. (2018). Incorporating EBO-HSIC with SVM for gene selection associated with cervical cancer classification. Journal of medical systems42(11), 225.
  4. Thangamani, M., & Thangaraj, P. (2010). Integrated Clustering and Feature Selection Scheme for Text Documents. Journal of Computer Science6(5), 536.
  5. Gangadhar, C., Chanthirasekaran, K., Chandra, K. R., Sharma, A., Thangamani, M., & Kumar, P. S. (2022). An energy efficient NOMA-based spectrum sharing techniques for cell-free massive MIMO. International Journal of Engineering Systems Modelling and Simulation13(4), 284-288.
  6. Narmatha, C., Thangamani, M., & Ibrahim, S. J. A. (2020). Research scenario of medical data mining using fuzzy and graph theory. International Journal of Advanced Trends in Computer Science and Engineering9(1), 349-355.
  7. Thangamani, M., & Thangaraj, P. (2013). Fuzzy ontology for distributed document clustering based on genetic algorithm. Applied Mathematics & Information Sciences7(4), 1563-1574.
  8. Surendiran, R., Aarthi, R., Thangamani, M., Sugavanam, S., & Sarumathy, R. (2022). A Systematic Review Using Machine Learning Algorithms for Predicting Preterm Birth. International Journal of Engineering Trends and Technology70(5), 46-59.
  9. Thangamani, M., & Thangaraj, P. (2010). Ontology based fuzzy document clustering scheme. Modern Applied Science4(7), 148.
  1. Ibrahim, S. J. A., & Thangamani, M. (2018, November). Momentous Innovations in the prospective method of Drug development. In Proceedings of the 2018 International Conference on Digital Medicine and Image Processing (pp. 37-41).
  1. Anandasubramanian, C. P., & Selvaraj, J. (2024). NAVIGATING BANKING LIQUIDITY-FACTORS, CHALLENGES, AND STRATEGIES IN CORPORATE LOAN PORTFOLIOS. Tec Empresarial6(1).
  2. Madem, S., Katuri, P. K., Kalra, A., & Singh, P. (2023, May). System Design for Financial and Economic Monitoring Using Big Data Clustering. In 2023 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI)(pp. 1-7). IEEE.
  3. Kumar, J. S., Archana, B., Muralidharan, K., & Kumar, V. S. (2025). Graph Theory: Modelling and Analyzing Complex System. Metallurgical and Materials Engineering31(3), 70-77.
  4. Kumar, J. S., Archana, B., Muralidharan, K., & Srija, R. (2025). Spectral Graph Theory: Eigen Values Laplacians and Graph Connectivity. Metallurgical and Materials Engineering31(3), 78-84.
  5. Srija, R., Kumar, J. S., & Muralidharan, K. (2025). An improvement in estimating the population mean by using quartiles and correlation coefficient. Mathematics in Engineering, Science & Aerospace (MESA)16(1).
  1. Kumar, J. S., Murthy, S., Kumar, B. R., & Solaiappam, S. (2017, January). p-Value analyze the set of optimal value in MOFTP. In 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS) (pp. 1-5). IEEE.
  1. Ramesh, T. R., Lilhore, U. K., Poongodi, M., Simaiya, S., Kaur, A., & Hamdi, M. (2022). Predictive analysis of heart diseases with machine learning approaches. Malaysian Journal of Computer Science, 132-148.
  2. Ramesh, T. R., Vijayaragavan, M., Poongodi, M., Hamdi, M., Wang, H., & Bourouis, S. (2022). Peer-to-peer trust management in intelligent transportation system: An Aumann’s agreement theorem based approach. ICT Express8(3), 340-346.
  3. Ramesh, T. R., & Kavitha, C. (2013). Web user interest prediction framework based on user behavior for dynamic websites. Life Sci. J10(2), 1736-1739.
  4. Ali, A., Naeem, S., Anam, S., & Ahmed, M. M. (2022). Machine learning for intrusion detection in cyber security: Applications, challenges, and recommendations. UMT Artif. Intell. Rev2(2), 41-64.
  1. Ramesh, T. R., Raghavendra, R., Vantamuri, S. B., Pallavi, R., & Easwaran, B. (2023). IMPROVING THE QUALITY OF VANET COMMUNICATION USING FEDERATED PEER-TO-PEER LEARNING. ICTACT Journal on Communication Technology14(1).
  1. Jayapandiyan, J. R., Kavitha, C., & Sakthivel, K. (2020). Enhanced least significant bit replacement algorithm in spatial domain of steganography using character sequence optimization. Ieee Access8, 136537-136545.
  2. Sakthivel, K., Jayanthiladevi, A., & Kavitha, C. (2016). Automatic detection of lung cancer nodules by employing intelligent fuzzy c-means and support vector machine. BIOMEDICAL RESEARCH-INDIA27, S123-S127.
  3. Sakthivel, K., Nallusamy, R., & Kavitha, C. (2014). Color image segmentation using SVM pixel classification image. World Academy of Science, Engineering and Technology International Journal of Computer, Electrical, Automation, Control and Information Engineering8(10), 1924-1930.
  4. Jayapandiyan, J. R., Kavitha, C., & Sakthivel, K. (2020). Optimal secret text compression technique for steganographic encoding by dynamic ranking algorithm. In Journal of Physics: Conference Series(Vol. 1427, No. 1, p. 012005). IOP Publishing.

Sakthivel, K., Abinaya, R., Nivetha, I., & Kumar, R. A. (2014). Region based image retrieval using k-means and hierarchical clustering algorithms. International Journal of Innovative Research in Science, Engineering and Technology3(1), 1255-1260.

The rapid advancement of vehicle technology has substantially influenced current transportation systems.
making them safer, more efficient, more intelligent. However, despite the incorporation of advanced driver-
assistance systems (ADAS) such as sensors. Road accidents remain a significant global concern, causing thousands of fatalities and severe injuries every year. One major cause of these incidents is the lack of real-time communication between vehicles. Without this, drivers cannot make proactive decisions to avoid collisions.

Classic vision-based systems enhance safety by identifying nearby obstacles. However, they face limitations in challenging conditions like fog, rain, and obstructed views. These environmental factors reduce their effectiveness and compromise safety.

Vehicle-to-vehicle (V2V) communication offers a solution. By enabling real-time data sharing, it enhances radar and camera systems for collision avoidance. This advanced technology can address visibility challenges and improve overall road safety..

Introduction

V2V (Vehicle To Vehicle Communication for Intelligent) communication enables vehicles to transmit crucial information, such as speed, location, acceleration, and braking status, in real time. This wireless communication network allows vehicles to communicate situational dat., letting drivers and
automated systems react to potential risks before they become serious threats. Unlike conventional radar-based
safety measures, V2V systems transcend direct visual constraints by relying on a network of connected
vehicles. making road mobility safer and more efficient. Despite technological breakthroughs in collision avoidance systems. accidents remain prevalent due to delayed
driver responses and unpredictable traffic conditions. V2V communication directly tackles these difficulties by
providing cooperative awareness among vehicles.

Related works

By tackling existing obstacles and exploiting upcoming technology. V2V (Vehicle To Vehicle Communication for Intelligent) communication can change modern transportation systems. leading to safer roads and an intelligent, fully linked driving ecosystem Despite its benefits. V2V (Vehicle To Vehicle Communication for Intelligent) communication faces various obstacles. particularly in cybersecurity and data privacy. Since V2V relies on wireless communication, it is subject to hacking, spoofing, and unwanted access. To ensure secure data sharing, researchers are studying new encryption approaches, blockchain-based security frameworks, and anomaly detection systems to defend automobiles from cyber threats. Establishing a comprehensive cybersecurity framework is important to earning public trust and enabling mass deployment of V2V technologies.

Figure Shows the Flow chart for Vehicle To Vehicle Communication for Intelligent




Download Link: https://ai-cyber-security.kiwiinnovate.com/wp-content/uploads/2025/05/202590115.pdf

Indexed By: https://scholar.google.com/