Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2009
In this paper, we propose a novel scheme to achieve secure, and efficient vehicular communication. In particular, SegCom provides two mechanisms to perform successive authentication of the vehicle with the road-side infrastructure units to expedite authentication for Vehicle-to-Infrastructure (V2I) communication. Furthermore, to enhance the efficiency of Vehicle-to-Vehicle (V2V) communication, SeGCom permits the vehicles to form group, which are also used for performing multi-hop V2V communication without any assistance from a trusted authority. Comparison with other existing schemes in the literature has been performed to show the efficiency and applicability of our scheme.
Wireless Communications and Mobile Computing
The advancements in Vehicular Ad Hoc Networks (VANETs) require more intelligent security protocols that ultimately provide unbreakable security to vehicles and other components of VANETs. VANETs face various types of security pitfalls due to the openness characteristics of the VANET communication infrastructure. Researchers have recently proposed different mutual authentication schemes that address security and privacy issues in vehicle-to-vehicle (V2V) communication. However, some V2V security schemes suffer from inadequate design and are hard to implement practically. In addition, some schemes face vehicle traceability and lack anonymity. Hence, this paper’s primary goal is to enhance privacy preservation through mutual authentication and to achieve better security and performance. Therefore, this article first describes the vulnerabilities of a very recent authentication scheme presented by Vasudev et al. Our analysis proves that the design of Vasudev et al.’s scheme is incorrect...
2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2016
Vehicular ad hoc network (VANET) has been ahot topic in recent years. Currently, VANET research mainlyfocuses on enhancing road safety, traffic safety warning, andreducing traffic accidents. In the future, the security of vehiclecommunication ought to be considered to protect privacy ofusers, such as personal ID and vehicular route. In order toenhance public service vehicles management, ensure officialactivities, and reduce finance expenditure meanwhile, a secureofficial vehicle communication protocol for VANET isproposed in this paper. The proposal combines homomorphickey agreement, symmetric encryption, message authenticationand digital signature mechanism, etc. Based on the protocol, personal information of users can be better protected. Besides, the proposed scheme has properties of mutual authenticationanonymous, availability, non-repudiation and security, all ofwhich are beneficial to privacy protection.
… (SIECPC), 2011
Today's VANET applications are vastly focused towards fulfilling users' requirements on road and making their journey safe and comfortable. In particular, safety applications will provide secure information to users and introduce mechanisms to help reduce the death rate due to road accidents. The most important aspect in such environment is the integrity of this safety information; it must be at all times prevented from being altered by attackers. Attackers try to get benefits from the nature of open wireless medium to launch different kind of attacks in the network to achieve their specific goals. Current DSRC is used as a communication medium for sending the safety and non safety messages from vehicle to vehicle (V2V) and vehicle to infrastructure (V2I). With the introduction of trusted computing several years ago, Trusted Platform Module (TPM) is a security hardware that can potentially handle the software attacks on VANET and maintain the integrity of the data within vehicular network. The main idea behind trusted computing is the hardware based TPM which contains active security modules that supports chain of trust to be built within components of the network. We propose a new model for chain of trust within vehicular to handle all types of attacks and maintain the integrity of messages. Direct Anonymous Attestation (DAA) digital group signature scheme play a key role for developing web of trust and provides security and privacy for vehicle.
International Journal of Future Generation Communication and Networking, 2016
Vehicular Ad Hoc Network (VANET) is a more influential network in which vehicles depend on each other to communicate and for the secure exchange of the messages. With the improvement in the technology, mainly the vehicles are equipped with Wi-Fi and GPS devices to improve the traffic handling and road safety. But many vehicles may broadcast the bogus messages for their own purpose, so it needs a trustful environment and an effective trust management schemes to prevent the network from the various malicious attacks. Trust establishment is very challenging as the network is highly mobile and vehicles may come in or depart at any time. In this paper, we first discuss the VANET model to describe the environment, and then the trust management schemes to secure the network and lastly the various cryptography fundamentals for the fast and safe message transfer.
Security and Communication Networks, 2016
Vehicular Ad-hoc Networks (VANETs) are a move towards regulating safe traffic and intelligent transportation system. A VANETs is characterized by extremely dynamic topographical conditions owing to speedily moving vehicles. In VANETs, vehicles can transmit messages within a pre-defined area to achieve safety and efficiency of the system. Then ensuring authenticity of origin of messages to the receiver in such a dynamic environment is a crucial challenge. Another concern in VANET is preservation of privacy of user/vehicle. Recently, Chuang and Lee proposed a trust-extended authentication mechanism (TEAM) for vehicle-to-vehicle communications in VANETs. TEAM not only satisfies various security features but also enhances the performance of the authentication process using transitive trust relationship among vehicles. Nonetheless, our analysis shows that TEAM is vulnerable to insider attack, privacy breach, impersonation attacks and some other problems. In this paper, to eradicate the vulnerabilities found in Chuang-Lee's scheme, an enhanced trust-extended authentication scheme for VANET is proposed. We display the efficiency of our scheme through security analysis and comparison. Through simulation results using widely accepted NS-2 simulator, we show that our scheme authenticates vehicles faster than Chuang-Lee's scheme.
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2021
The initial signaling and data exchanges over open wireless transmission channels in vehicular ad hoc networks (VANETs) renders these networks susceptible to security and privacy violation attacks such as impersonation and packet replays. To curb this, a number of protocols have been proposed such as Public Key Infrastructure (PKI) based schemes, identity (ID) based schemes, anonymity based approaches and password or biometric based schemes. However, PKI based schemes have high computational overheads while ID based schemes are vulnerable to denial of service attacks (DoS). On the other hand, password and biometric based schemes employ the long term shared secrets stored in tamper proof devices (TPD) as the sole authentication factor, rendering them vulnerable to side-channel attacks. On their part, anonymity based approaches employ either digital certificates, pseudonyms or group signatures. However, these schemes do not offer trajectory privacy, conventional signature signing and verification is inefficient, and certificate storage or revocation leads to high storage and computation costs. In this paper, a multi-factor mutual authentication protocol that addressed some of these attacks is proposed. This scheme eliminates the requirement for long term storage of secret keys on TPD and remained secure even in the face of on-broad unit (OBU) active physical attack. Simulation results showed that the proposed protocol is robust against attacks such as privileged insider, masquerade and packet replay. It also preserved backward key secrecy, forward key secrecy, password secrecy and anonymity. Its performance evaluation revealed that it exhibited average computation and communication overheads, in addition to average beacon generation and verification latencies.
Ad Hoc Networks, 2011
Vehicular ad hoc network (VANET) is an emerging type of networks which facilitates vehicles on roads to communicate for driving safety. The basic idea is to allow arbitrary vehicles to broadcast ad hoc messages (e.g. traffic accidents) to other vehicles. However, this raises the concern of security and privacy. Messages should be signed and verified before they are trusted while the real identity of vehicles should not be revealed, but traceable by authorized party. Existing solutions either rely heavily on a tamper-proof hardware device, or cannot satisfy the privacy requirement and do not have an effective message verification scheme. In this paper, we provide a software-based solution which makes use of only two shared secrets to satisfy the privacy requirement (with security analysis) and gives lower message overhead and at least 45% higher successful rate than previous solutions in the message verification phase using the bloom filter and the binary search techniques (through simulation study). We also provide the first group communication protocol to allow vehicles to authenticate and securely communicate with others in a group of known vehicles.
international journal of engineering trends and technology, 2014
In recent era, we know transport industry tend to incorporates many facilities to the vehicle users which not only helps people to have safe journey but also smooth in nature. Intelligent transportation system (ITS) is the need for today's luxurious life. In this paper, it is proposed that communication among vehicles is performed using efficient routing where as secure environment is established using PKI(public key environment). It can be said that proposed Routing approach have better capabilities than other existing routing protocols it means communication where emergency messages will be disseminated efficiently and as early as possible. When VANET is to be protected from malicious access or to avoid the problem of vehicle tracking, one of the security features is called as location privacy is not mainly offered by typical PKI. Here efficient routing approach will be blended with security feature such as vehicles 's location privacy feature. which is definitely will be ...
Vehicular Ad-hoc network (VANET) has gained huge attraction from research community due to their significant nature of providing the autonomous vehicular communication. The efficient communication is considered as prime concern in these networks however, several techniques have been introduced to improve the overall communication of VANETs. Security and privacy are also considered as prime aspects of VANETs. Maintaining data security and privacy is highly dynamic VANETs is a challenging task. Several techniques have been introduced recently which are based on the cryptography and key exchange. However, these techniques provide solution to limited security threats. Hence, this work introduces a novel approach for key management and distribution in VANET to provide the security to the network and its components. This approach is later incorporated with cryptography mechanism to secure data packets. Hence, the proposed approach is named as Secure Group Key Management and Cryptography (SGKC). The experimental study shows significant improvements in the network performance. This SGKC approach will help the VANET user's fraternity to perform secured data transmission.
IEEE Transactions on Vehicular Technology, 2010
The existing authentication protocols to secure vehicular ad hoc networks (VANETs) raise challenges such as certificate distribution and revocation, avoidance of computation and communication bottlenecks, and reduction of the strong reliance on tamper-proof devices. This paper efficiently cope with these challenges with a decentralized group authentication protocol in the sense that the group is maintained by each RSU rather than by a centralized authority as in most existing protocols employing group signatures. In our proposal, we employ each roadside unit (RSU) to maintain and manage an on-the-fly group within its communication range. Vehicles entering the group can anonymously broadcast vehicle-to-vehicle (V2V) messages, which can be instantly verified by the vehicles in the same group (and neighbor groups). Later, if the message is found to be false, a third party can be invoked to disclose the identity of the message originator. Our protocol efficiently exploits the specific features of vehicular mobility, physical road limitations and properly distributed RSUs. Our design leads to a robust VANET since, if some RSUs occasionally collapse, only the vehicles driving in those collapsed areas will be affected. Due to the numerous RSUs sharing the load to maintain the system, performance does not significantly degrade when more vehicles join the VANET; hence, the system is scalable.
Computer Communications, 2008
Vehicular networks are very likely to become the most pervasive and applicable of mobile ad hoc networks in this decade. Vehicular Ad hoc NETwork (VANET) has become a hot emerging research subject, but few academic publications describing its security infrastructure. In this paper, we review the secure infrastructure of VANET, some potential applications and interesting security challenges. To cope with these security challenges, we propose a novel secure scheme for vehicular communication on VANETs. The proposed scheme not only protects the privacy but also maintains the liability in the secure communications by using session keys. We also analyze the robustness of the proposed scheme.
International Journal of Advanced Science and Technology, 2017
Vehicular Ad hoc Network (VANET) is the furthermost remarkable and an advantageous technique for the research field for improving the security and protection of drivers and passengers. It is an interesting subclass of Mobile Ad-hoc Network, which authorizes smart communication between vehicles furthermore in the middle of the vehicle and roadside frameworks. It is an application of a wireless network for switching the data – to the domain of vehicles. For the creation of trustful surroundings, trust can be practiced to increase the safety in vehicular networks, which is a major section of security. Trust can be considered by directly observing the human actions or indirectly by getting the neighbor's opinion which produces a trusted communicating environment. They turn into a principal component of intelligent transportation systems. There is a transitivity model in the existing work in which the Authentication Server (AS) provides the authority to Law Executor (LE) for authenticating the other vehicles as a trustful vehicle. So in proposed work a new technique in which there is no vehicle in the network to provide the authority. Trust is estimated by the nodes, then this value sends to the AS where this value is calculated and updated regularly. This method enhances the security of the network. NS2 simulator is used for the overall operation of the proposed work and throughput, PDR and routing overhead show the efficiency of the network.
Vehicular ad hoc networks (VANETs) are an important communication paradigm in modern-day mobile computing for exchanging live messages regarding traffic congestion, weather conditions. A trusted authority (TA) is designed to provide a variety of online premium services to customers through VANETs. TA classifies the users into primary, secondary, and unauthorized users. First, we present a dual authentication scheme to provide a high level of security in the vehicle side to effectively prevent the unauthorized vehicles entering into the VANET. Second, we propose a dual group key management scheme to efficiently distribute a group key to a group of users and to update such group keys during the users’ join and leave operations. From this project, we must send the messages or some safety information from the authority to the primary user and the primary user to the secondary user with full of secured process.
Peer-to-Peer Networking and Applications, 2019
Vehicular ad hoc networks (VANET) is one of the most awaited and ambitious projects of Intelligent Transport System (ITS), where vehicles are permitted to talk with each other. The ultimate goal of the network is to develop a connected network of automobiles, and eventually to reduce traffic and accidents. However, VANET is an ad hoc network without any infrastructure. Apart from architectural issues, there are plenty of security and performance issues, which makes it difficult to be implemented. Therefore, we are using fully authenticated Signcryption technique along with re-cryptography and shareable cloud to make the network safe, reliable and robust. Signcryption combines signature and encryption in a single step, hence decreasing the number of computations. Re-cryptography allows alternative authorities to take charge of the primary authority while maintaining communication transparency. Group signature facilitates secure communication within the group. Security has been verified using Burrows-Abadi-Needham (BAN) logic and Automated Validation of Internet Security Protocols and Applications (AVISPA).
IEEE Access
Vehicular ad-hoc networks (VANETs) can substantially improve traffic safety and efficiency by providing a communication platform between vehicles and roadside units (RSUs) to share real-time information on traffic and road conditions. Two essential security requirements for VANETS are data authentication and the preservation of the privacy of vehicle owners. Conditional privacy-preserving authentication (CPPA) schemes address both of these security requirements. The existing CPPA schemes either require a tamper-resistant device (TRD), which is vulnerable to key exposure based on physical attacks, or require continuous communications of vehicles with RSUs, which significantly increases the communication overhead. This paper addresses both of these problems by proposing a provable secure, and efficient CPPA scheme. We prove the privacy-preserving property of our scheme in the random oracle model and show that it offers anonymity, unlinkability, and tamper detection even if a physical attacker succeeds in compromising an individual OBU. Moreover, the performance analysis of our scheme shows a substantial improvement in communication cost, especially in comparison with RSU-aided schemes that require continuous vehicle communication with roadside units and a Trusted Authority (TA). INDEX TERMS Vehicular ad-hoc networks, privacy-preserving schemes, provable security, authentication, physically secure, fail-stop signature. I. INTRODUCTION 16 Many road accidents are caused by the lack of timely infor-17 mation to the vehicle's drivers, resulting in inappropriate 18 or delayed responses to unexpected situations. Vehicular 19 Ad-hoc NETworks (VANETs) can increase safety by trans-20 mitting relevant information to drivers in a timely way. 21 Four entities are involved in these networks: drivers (users), 22 On-Board Units (OBU) in vehicles, RoadSide Units (RSU), 23 and a Trusted Authority (TA) [1]. A Tamper Resistant 24 The associate editor coordinating the review of this manuscript and approving it for publication was Zijian Zhang. Device (TRD) or Trusted Platform Module (TPM) can be 25 embedded in OBUs. Vehicle drivers are authenticated with 26 a password, a smart card, or a security token (e.g., stored 27 on a smartphone). OBUs and RSUs can establish Vehicle-28 to-Vehicle (V-2-V) and Vehicle-to-RSU (V-2-R) communi-29 cations, and RSUs can communicate with the TA over the 30 internet (Figure 1). Each vehicle acts as a node in these 31 networks and sends the information to its closest neighbors. 32 One of the major concerns in these networks is how 33 to authenticate the sender while protecting the anonymity 34 of vehicles and their drivers. The existing authentication 35 schemes for vehicular ad-hoc networks can be categorized 36
Network, 2022
Given the enormous interest shown by customers as well as industry in autonomous vehicles, the concept of Internet of Vehicles (IoV) has evolved from Vehicular Ad hoc NETworks (VANETs). VANETs are likely to play an important role in Intelligent Transportation Systems (ITS). VANETs based on fixed infrastructures, called Road Side Units (RSUs), have been extensively studied. Efficient, authenticated message dissemination in VANETs is important for the timely delivery of authentic messages to vehicles in appropriate regions in the VANET. Many of the approaches proposed in the literature use RSUs to collect events (such as accidents, weather conditions, etc.) observed by vehicles in its region, authenticate them, and disseminate them to vehicles in appropriate regions. However, as the number of messages received by RSUs increases in the network, the computation and communication overhead for RSUs related to message authentication and dissemination also increases. We address this issue a...
International journal of computer applications, 2013
VANET is very useful for solving traffic related problems and provide safety to life's of Drivers and passengers moving on the road, In this paper the proposed algorithm is helpful in authenticating a user and Solving Traffic related problems and provide more efficient broadcast system by covering Large distance. According to this Approach Vehicles can communicate with RSU,but there is no Vehicle to vehicle Communication. RSU can communicate with each other and update their information to the nearest RSU (NRSU), after that the emergency broadcast is also done by the NRSU. For security reasons we consider Vehicle numbers as their pseudonym and apply a new approach to authenticate the user, So that no unauthorized user can broadcast and send any false information to RSU. The public Key Cryptography is used to encrypt the communication between Vehicles and RSU.
International Journal of Vehicle Information and Communication Systems, 2013
In this paper, we make a survey of the known schemes for V2V (vehicle to vehicle) and V2I (vehicle to infrastructure) authentication in VANETs (vehicular ad hoc networks). We consider a variety of safety applications in VANETs, identify authentication as one of the security requirements and discuss the security challenges for these applications. Existing authentication schemes based on digital signatures are discussed along with schemes based on hash chains and hash trees. It has also been shown how the level of security of these schemes is increased by the involvement of a trusted Certification Authority. We also focus on issues pertaining to anonymity, unlinkability, traceability and computation and communication overhead. Finally, we summarise the limitations of the existing authentication schemes in real-life applications and conclude that further research is essential in this area.
International Journal of Advanced Computer Science and Applications, 2017
VANET (Vehicular Adhoc Network) has made an evolution in the transportation hi-tech system in most of the developed countries. VANET plays an important role in an intelligent transportation system (ITS). This paper gives an overall survey on the research in VANET security and communication. It also gives parameters considered by the previous researchers. After the survey, it considered the authentication and message forwarding issues required more research. Authentication is first line of security in VANET; it avoids attacks made by the malicious nodes. Previous research has come up with some Cryptographic, Trust based, Id based, and Group signature based authentication schemes. Speed of authentication and privacy preservation are the important parameters in VANET authentication. This paper presented the AECC (Adaptive Elliptic Curve Cryptography), and EECC (Enhanced Elliptic Curve Cryptography) schemes to improve the speed and security of authentication. In AECC, the key size is adaptive, i.e. different sizes of keys are generated during the key generation phase. Three ranges are specified for key sizes: small, large, and medium. In EECC, added an extra parameter during the transmission of information from, the vehicle to the RSU for key generation. This additional parameter gives the information about the vehicle ID, and the location of the vehicle to the RSU and the other vehicle. Under the communication issue of VANET, the paper gives priority based message forwarding for improving the message forwarding scheme. It handles emergency situations more effectively.
Computers, Materials & Continua
Vehicular Ad hoc Networks (VANETs) become a very crucial addition in the Intelligent Transportation System (ITS). It is challenging for a VANET system to provide security services and parallelly maintain high throughput by utilizing limited resources. To overcome these challenges, we propose a blockchain-based Secured Cluster-based MAC (SCB-MAC) protocol. The nearby vehicles heading towards the same direction will form a cluster and each of the clusters has its blockchain to store and distribute the safety messages. The message which contains emergency information and requires Strict Delay Requirement (SDR) for transmission are called safety messages (SM). Cluster Members (CMs) sign SMs with their private keys while sending them to the blockchain to confirm authentication, integrity, and confidentiality of the message. A Certificate Authority (CA) is responsible for physical verification, key generation, and privacy preservation of the vehicles. We implemented a test scenario as proof of concept and tested the safety message transmission (SMT) protocol in a real-world platform. Computational and storage overhead analysis shows that the proposed protocol for SMT implements security, authentication, integrity, robustness, non-repudiation, etc. while maintaining the SDR. Messages that are less important compared to the SMs are called non-safety messages (NSM) and vehicles use RTS/CTS mechanism for NSM transmission. Numerical studies show that the proposed NSM transmission method maintains 6 times more throughput, 2 times less delay and 125% less Packet Dropping Rate (PDR) than traditional MAC protocols. These results prove that the proposed protocol outperforms the traditional MAC protocols.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.