scholarly journals Efficient Anonymous Data Authentication for Vehicular Ad Hoc Networks

2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Ping Yu ◽  
Wei Ni ◽  
Guangsheng Yu ◽  
Hua Zhang ◽  
Ren Ping Liu ◽  
...  

Vehicular ad hoc network (VANET) encounters a critical challenge of efficiently and securely authenticating massive on-road data while preserving the anonymity and traceability of vehicles. This paper designs a new anonymous authentication approach by using an attribute-based signature. Each vehicle is defined by using a set of attributes, and each message is signed with multiple attributes, enabling the anonymity of vehicles. First, a batch verification algorithm is developed to accelerate the verification processes of a massive volume of messages in large-scale VANETs. Second, replicate messages captured by different vehicles and signed under different sets of attributes can be dereplicated with the traceability of all the signers preserved. Third, the malicious vehicles forging data can be traced from their signatures and revoked from attribute groups. The security aspects of the proposed approach are also analyzed by proving the anonymity of vehicles and the unforgeability of signatures. The efficiency of the proposed approach is numerically verified, as compared to the state of the art.

Author(s):  
Bodhy Krishna .S

A wireless ad hoc network is a decentralized type of wireless network. It is a type of temporary computer-to-computer connection. It is a spontaneous network which includes mobile ad-hoc networks (MANET), vehicular ad-hoc networks (VANET) and Flying ad-hoc networks (FANET). A MANET is a network that has many free or autonomous nodes often composed of mobile devices that can operate without strict top-down network administration [1]. A VANET is a sub form of MANET. It is a technology that uses vehicles as nodes in a network to create a mobile network. FANET is an ad-hoc network of flying nodes. They can fly independently or can be operated distantly. This paper discusses the characteristics of these three ad-hoc networks.


Transport ◽  
2008 ◽  
Vol 23 (4) ◽  
pp. 291-298 ◽  
Author(s):  
Saleh Yousefi ◽  
Mahmood Fathy

In the recent years, direct message exchange between vehicles in order to improve the safety of road traffic has been attracting lots of interest in both networking and road safety communities. While travelling on a road, vehicles form an ad hoc network called Vehicular Ad hoc NETwork (VANET) and deploy life safety applications. Evaluating the performance of these applications is primordial for realizing VANETs in real life. Current literature lacks efficient ways to evaluate the performance of safety applications and mostly leverages on classical networking metrics like delay, delivery rate etc. In this paper, we consider both networking and safety concerns simultaneously to come up with more efficient methods. In particular, we first point out the significance of fairness and coverage from safety viewpoint. Then, we introduce two new metrics called beaconing rate and effective range aiming at providing more facilities for safety performance evaluation in VANET s research. Furthermore, realizing special characteristics of safety applications while disseminating beacon messages, we study the way that beacon dissemination protocols affect the performance of safety applications. We then conduct extensive simulation study to show the usefulness of the introduced metrics and derive some insights on the feasibility of driver‐assistant safety applications. Our evaluation also shows that sending the aggregated status of neighbouring vehicles in addition to vehicle's own status, and instead, increasing beacon transmission interval may be invoked in order to assist safety applications in providing satisfactory services to drivers.


2018 ◽  
Vol 7 (3) ◽  
pp. 1674
Author(s):  
Dania Mohammed ◽  
Ahmed Ghanim Wadday

the successful solutions used to manage traffic at intersections is the Vehicular ad hoc Network (VANET). The main problems in VANET are the preparation of the blocked route, repeated topology differences, and continuous vehicle movement. These problems are difficult to route data towards destinations. To work around this problem, use the Position-Based Routing Protocol (MDORA) name. One of the objectives of this protocol is to choose the best way to rely on the jump by the jump and on the footing of the farthest dis-tance of the interface from the source, thus ensuring the full transfer of data. This protocol reduces frequent connections by detecting the following packets and sending packets without first discovering the path. The environment is simulated by the Matlab program to show protocol results. The random distribution of nodes generation in the simulation environment has been changed in order to change con-tract locations compared to the first state of simulation and to show new result in second state of the protocol. as well The time unit value is also changed to reach the ratio of the number of dropped packets.  


2018 ◽  
Vol 9 (1) ◽  
pp. 51-65
Author(s):  
Soumen Saha ◽  
Utpal Roy ◽  
D.D. Sinha

Vehicular ad-hoc networks or VANETs are a new method of training an ad-hoc network in traffic. The authors have numbers of routing algorithms on a MANET. But none of them works efficiently in a VANET with respect to being a safe and secure transport system. The authors have proposed a modification on an AODV routing algorithm for VANET with the introduction of the double-ended queue or dqAODV in a request packet header. A comparable good result was found in the throughput. In the present work, the authors introduce a modification of an original AODV by applying a partial re-broadcast of the request packet (RREQ) of an AODV. They found a comparable result in the throughput of the packet delivery aspect for this work with the original algorithm and dqAODV. This is compared to the complexity in the original AODV algorithm.


2017 ◽  
Vol 11 (5) ◽  
pp. 30 ◽  
Author(s):  
Zaid A. Abdulkader ◽  
Azizol Abdullah ◽  
Mohd Taufik Abdullah ◽  
Zuriati Ahmad Zukarnain

Vehicular ad hoc network (VANET) technologies are evolving networked communications advances that incorporate mobile-based routing protocol sets for inter-vehicular exchanges of information in support of smart transportation networks. Privacy and security difficulties are primary concerns in VANET research as a result of the repeated vehicular movements, time-critical responses, and hybrid VANET architectures that differentiate these from other ad hoc networking types. Therefore, the design of secure mechanisms for authenticating and validating message transmissions between vehicles and eliminating adversarial elements from networks are of considerable importance in VANET research. This report offers a review of VANET features and security difficulties. The paper also summarizes certain chief threats to the authentication, confidentiality, and availability of secure services.


Author(s):  
Raúl Aquino-Santos ◽  
Víctor Rangel-Licea ◽  
Miguel A. García-Ruiz ◽  
Apolinar González-Potes ◽  
Omar Álvarez-Cardenas ◽  
...  

This chapter proposes a new routing algorithm that allows communication in vehicular ad hoc networks. In vehicular ad hoc networks, the transmitter node cannot determine the immediate future position of the receiving node beforehand. Furthermore, rapid topological changes and limited bandwidth compound the difficulties nodes experience when attempting to exchange position information. The authors first validate their algorithm in a small-scale network with test bed results. Then, for large-scale networks, they compare their protocol with the models of two prominent reactive routing algorithms: Ad-Hoc On-Demand Distance Vector and Dynamic Source Routing on a multi-lane circular dual motorway, representative of motorway driving. Then the authors compare their algorithm with motorway vehicular mobility, a location-based routing algorithm, on a multi-lane circular motorway. This chapter then provides motorway vehicular mobility results of a microscopic traffic model developed in OPNET, which the authors use to evaluate the performance of each protocol in terms of: Route Discovery Time, End to End Delay, Routing Overhead, Overhead, Routing Load, and Delivery Ratio.


Author(s):  
Ameneh Daeinabi ◽  
Akbar Ghaffarpour Rahbar

Vehicular Ad Hoc Networks (VANETs) are appropriate networks that can be applied for intelligent transportation systems. Three important challenges in VANETs are studied in this chapter. The first challenge is to defend against attackers. Because of the lack of a coordination unit in a VANET, vehicles should cooperate together and monitor each other in order to enhance security performance of the VANET. As the second challenge in VANETs, scalability is a critical issue for a network designer. Clustering is one solution for the scalability problem and is vital for efficient resource consumption and load balancing in large scale VANETs. On the other hand, due to the high-rate topology changes and high variability in vehicles density, transmission range of a vehicle is an important issue for forwarding and receiving messages. In this chapter, we study the clustering algorithms, the solutions appropriate to increase connectivity, and the algorithms that can detect attackers in a VANET.


Author(s):  
Shrirang Ambaji Kulkarni ◽  
G. Raghavendra Rao

Vehicular Ad Hoc Networks represent a specialized application of Mobile Ad Hoc Networks. Here the mobile nodes move in lanes and their mobility can be modeled based on realistic traffic scenarios. To meet the above challenge the goal of defining the mobility model for vehicular ad hoc network along with a realistic traffic pattern is an important research area. Vehicular mobility is characterized by acceleration, deceleration, possibility of different lanes and intelligent driving patterns. Also a modeling of traffic is necessary to evaluate a vehicular ad hoc network in a highway environment. The traffic model has to take into account the driver behavior in order to take decisions of when to overtake, change lanes, accelerate and decelerate. To overcome the limitation of traditional mobility models and mimic traffic models, many traffic model based simulators like CORSIM, PARAMICS and MOVE have been proposed. In this chapter we provide taxonomy of mobility models and analyze their implications. To study the impact of mobility model on routing protocol for vehicular motion of nodes we analyze the performance of mobility models with suitable metrics and study their correlation with routing protocol. We also discuss the fundamentals of traffic engineering and provide an insight into traffic dynamics with the Intelligent Driver Model along with its lane changing behavior.


Author(s):  
Revathi Venkataraman ◽  
T. Rama Rao

This chapter covers issues related to security in mobile ad hoc networks. It acts as a comprehensive survey material covering the cryptographic schemes and trust modeling techniques traditionally found in mobile ad hoc network (MANET) survey articles. The need for hybrid security techniques, involving both cryptographic approach and trust based model, in a resource constrained ad hoc network, is also emphasized in this work. Additionally, the lack of realism in the research works related to ad hoc network security is also pointed out. The state of the art in ad hoc security should employ hybrid techniques that can be easily implemented in an ad hoc network. This will lead to the large scale deployment of mobile ad hoc networks in various context-aware applications.


Sign in / Sign up

Export Citation Format

Share Document