Efficient Authentication Steps for Vehicle Transmission in Ad-Hoc Networks

Authors

  • S. Ragavi Department of Computer Science and Engineering, Paavai Engineering College, Namakkal, Tamilnadu, India Author
  • Dr. D. Banumathy Professor, Department of Computer Science and Engineering, Paavai Engineering College, Namakkal, Tamilnadu, India Author
  • Dr. M. Rameshkumar Department of Computer Science and Engineering, Paavai Engineering College, Namakkal, Tamilnadu, India Author
  • Dr. G. Madasamyraja Professor, Department of Information Technology, Paavai Engineering College, Namakkal, Tamilnadu, India Author

DOI:

https://doi.org/10.32628/IJSRSET24113132

Keywords:

Vehicle infrastructure Analysis, VANET, PBAS, Modification, OBUS, RSUS, V2V

Abstract

Vehicular ad-hoc networks (VANETs) are underactive development, thanks in part to recent advances in wireless communication and networking technologies. The most fundamental part of VANET is to enable message authentications between vehicles and roadside units. Message authentication using proxy vehicles has been proposed to reduce the computational overhead of roadside units significantly. In this message authentication scheme, a proxy vehicle that verifies multiple messages at the same time improves roadside units’ efficiency. In this paper first, we show that the only proxy-based authentication scheme (PBAS) presented for this goal by Liu et al. cannot guarantee message authenticity and also it is not resistant to impersonation and modification attacks and false acceptance of batched invalid signatures. Next, we propose a new identity-based message authentication scheme using proxy vehicles (ID-MAP). Then guarantee that it can satisfy the message authentication requirements, existential unforgeability of underlying signatures against adaptability chosen message, and identity attack is proved under the Elliptic Curve discrete logarithm problem (ECDLP) in the random oracle model. It should be highlighted that ID MAP not only is more efficient than PBAS since it is pairing-free and identity based and also it does not use map-to-point hash functions, also, it satisfies the security and privacy requirements of VANETs. Furthermore, analysis shows that the required time to verify 3000 messages in ID-MAP is reduced by 76% compared to that PBAS.

Downloads

Download data is not yet available.

References

Rekik M, Meddeb-Makhlouf A, Zarai F, et al. Improved dual authentication and key management techniques in Vehicular Ad Hoc Networks. In: Proceedings of 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA); 30 October–3 November 2027; Hammamet, Tunisia. pp. 1133–1140. doi: 10.1109/aiccsa.2017.118 DOI: https://doi.org/10.1109/AICCSA.2017.118

Azees M, Vijayakumar P, Jegatha Deborah L. Comprehensive survey on security services in vehicular ad‐hoc networks. IET Intelligent Transport Systems 2016; 10(6): 379–388. doi: 10.1049/iet-its.2015.0072 DOI: https://doi.org/10.1049/iet-its.2015.0072

Rekik M, Obaidat MS, Makhlouf A, et al. An optimized and secure authentication scheme for Vehicular Ad Hoc Networks. In: Proceedings of 2018 IEEE International Conference on Communications (ICC); 20–24 May 2018; Kansas City, MO, USA. pp. 1–6. doi: 10.1109/icc.2018.8422101 DOI: https://doi.org/10.1109/ICC.2018.8422101

Vijayakumar P, Azees M, Kannan A, et al. Dual authentication and key management techniques for secure data transmission in Vehicular Ad Hoc Networks. IEEE Transactions on Intelligent Transportation Systems 2016; 17(4): 1015–1028. doi: 10.1109/tits.2015.2492981 DOI: https://doi.org/10.1109/TITS.2015.2492981

Tan H, Choi D, Kim P, et al. Comments on “Dual authentication and key management techniques for secure data transmission in Vehicular Ad Hoc Networks.” IEEE Transactions on Intelligent Transportation Systems 2018; 19(7): 2149–2151. doi: 10.1109/tits.2017.2746880 DOI: https://doi.org/10.1109/TITS.2017.2746880

Priya MP, Jayaselvi P, Valarmathi R. A cooperative dual message authentication and group key management in VANET. International Journal of Pure and Applied Mathematics 2018; 118(18): 3721–3728.

Sayana SS, Bernald LM. Dual authentication and key management for secure transmission in Vanet. International Research Journal of Engineering and Technology (IRJET) 2018; 5(4): 3048–3051.

reeshma TP, Roshini TV. A review on privacy preserving authentication in VANETs. In: Proceedings of 2018 International Conference on Control, Power, Communication and Computing Technologies (ICCPCCT); 23–24 March 2018; Kannur, India. pp. 235–235. doi: 10.1109/iccpcct.2018.8574315 DOI: https://doi.org/10.1109/ICCPCCT.2018.8574315

He L, Zhu WT. Mitigating DoS attacks against signature-based authentication in VANETs. In: Proceedings of 2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE); 25–27 May 2012; Zhangjiajie, China. pp. 261–265. doi: 10.1109/csae.2012.6272951 DOI: https://doi.org/10.1109/CSAE.2012.6272951

Manivannan D, Moni SS, Zeadally S. Secure authentication and privacy-preserving techniques in Vehicular Ad- hoc Networks (VANETs). Vehicular Communications 2020; 25: 100247. doi: 10.1016/j.vehcom.2020.100247 DOI: https://doi.org/10.1016/j.vehcom.2020.100247

Ahamed ABS, Kanagaraj N, Azees M. EMBA: An efficient anonymous mutual and batch authentication schemes for VANETs. In: Proceedings of 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT); 20–21 April 2018; Coimbatore, India. pp. 1320–1326. doi: 10.1109/ICICCT.2018.8473110 DOI: https://doi.org/10.1109/ICICCT.2018.8473110

Downloads

Published

31-05-2024

Issue

Section

Research Articles

How to Cite

[1]
S. Ragavi, Dr. D. Banumathy, Dr. M. Rameshkumar, and Dr. G. Madasamyraja, “Efficient Authentication Steps for Vehicle Transmission in Ad-Hoc Networks”, Int J Sci Res Sci Eng Technol, vol. 11, no. 3, pp. 294–301, May 2024, doi: 10.32628/IJSRSET24113132.

Similar Articles

1-10 of 86

You may also start an advanced similarity search for this article.