Intelligent Authentication and Message Forwarding in VANET

Author(s):  
Sachin Pandurang Godse ◽  
Parikshit N. Mahalle

Vehicle ad hoc networks face the challenging issue of vehicle communication and its security. So, these issues become key research topics for global VANET researchers. Researcher's current solutions mostly focus on either of the problems but currently they are now heading towards finding satisfactory solutions for both of the above-mentioned problems. VANET networks should be robust and strongly dependent on their communication rapidness, message authentication, priority messaging, and security. Here, the authors discuss four VANET issues: authentication delays, fake messages, priority-based messaging, and VANET security, with respective solutions. This article presents an enhanced ECC-based algorithm to minimize authentication delays and provide secure VANET. Result analysis shows that the algorithm is effective in reducing the authentication delays and improves communication rapidness, improves the security model operation to detect Sybil and reply attack, and promotes intelligent message forwarding to block fake messages and increases message delivery performance.

2021 ◽  
Author(s):  
Tingyun Gan ◽  
Yongjian Liao ◽  
Yikuan Liang ◽  
Zijun Zhou ◽  
Ganglin Zhang

Abstract Vehicular fog computing (VFC), combing vehicle ad hoc networks (VANET) with fog computing, is an efficient vehicle communication architecture. However, the user data is often threatened since VFC is an open environment. Attribute-based encryption (ABE) is suitable for open scenarios, such as cloud and Internet of Things (IoT), because of its confidentiality and access control characteristics. However, the traditional ABE has disadvantages, such as the inability to hide the attributes in the access policy, and the use of computationally inefficient composite order bilinear pairing groups to prove adaptive security. Traditional ABE is not practical in VFC. We summarized the existing schemes of full policy hiding ABE and partial policy hiding ABE, then concluded that partial policy hiding ABE is more suitable for VFC. We combine policy hiding technology and the technology of converting bilinear pairing cryptography schemes into prime-order bilinear pairing cryptography schemes and propose an efficient and partial policy-hiding ciphertext-policy ABE (CP-ABE) scheme suitable for VFC. Experiments have proved that our scheme is computationally more efficient than previous policy hiding ABE schemes.


Vehicular ad hoc networks (VANETs) are under active development phase, especially due to the latest and foremost wireless communication and networking technologies. Basically VANETs consist of some parts which play the major role to enable message authentication between vehicles which are on-board units as well as roadside units. To reduce the load on trusted authorities several roadside units are set up and message authentication using proxy vehicles has been proposed. This used to minimize the computational overhead of roadside units significantly. Due to this message authentication scheme the efficiency of roadside unit improves. In this paper we propose an Efficient Hybrid Message Authentication Scheme (EHMAS) that deals with the technique where it not only guarantees message authenticity, but it is also resistant against impersonation and modification attacks. First we explain the properties of the attacks in security model. Second we provide an EHMAS scheme where a novel authentication technique is proposed for registration and verification of users using elliptic crypto system. Finally the paper concluded with the scope of the proposed work and provides future enhancement using machine learning techniques.


Electronics ◽  
2020 ◽  
Vol 9 (2) ◽  
pp. 298
Author(s):  
Lin Li ◽  
Wenjian Wang ◽  
Zhenhai Gao

Clustering is a technique for dividing a network into different group of nodes and managing the transmission of data among the interacting nodes, to improve the effectiveness and safety of information transfer. Clustering have been well studied and applied in traditional mobile networks. However, vehicle networks have short connection time, frequently changing topology, and other unique properties that conventional clustering cannot transfer well. The vehicle nodes in Vehicle Ad-hoc Networks (VANETs) are most directly affected by the surrounding vehicle nodes and exchanged information with them. However, this will cause network congestion or even the spread of malicious messages. The inclusion of vehicle’s (driver’s) social relationships in vehicle communication clustering will increase the degree of trust between vehicle nodes, making communication more purposeful and accurate. This study proposed a new clustering for vehicle networks that is based on drivers’ social relationship combined with the instantaneous position and speed of the vehicle node. Simulation results showed that this clustering method can improve the effectiveness of information transmission and increase the utilization of the application layer.


2016 ◽  
pp. 105-108
Author(s):  
Chia-Ho Ou ◽  
Chih-Feng Chao ◽  
Wei-Pu He ◽  
Chong-Min Gao

Sensors ◽  
2022 ◽  
Vol 22 (2) ◽  
pp. 643
Author(s):  
Muhammad Bilal Latif ◽  
Feng Liu ◽  
Kai Liu

An autonomous driving environment poses a very stringent requirement for the timely delivery of safety messages in vehicular ad hoc networks (VANETs). Time division multiple access (TDMA)-based medium access control (MAC) protocols are considered a promising solution because of their time-bound message delivery. However, in the event of mobility-caused packet collisions, they may experience an unpredicted and extended delay in delivering messages, which can cause catastrophic accidents. To solve this problem, a distributed TDMA-based MAC protocol with mobility-caused collision mitigation (MCCM-MAC) is presented in this paper. The protocol uses a novel mechanism to detect merging collisions and mitigates them by avoiding subsequent access collisions. One vehicle in the merging collisions retains the time slot, and the others release the slot. The common neighboring vehicles can timely suggest a suitable new time slot for the vacating vehicles, which can avoid access collisions between their packet transmissions. A tie-breakup mechanism is employed to avoid further access collisions. Simulation results show that the proposed protocol reduces packet loss more than the existing methods. Consequently, the average delay between the successfully delivered periodic messages is also reduced.


2017 ◽  
Vol 28 (1) ◽  
pp. 31-46
Author(s):  
A.A. Adas A.A. Adas

This paper focuses on secure data communication between nodes in Ad-Hoc networks by employing IPSec (Internet Protocol Security). In wireless communication, Ad-Hoc network is a new paradigm since, which is used for highly sensitive and emergency operations. Ad-Hoc network is considered a number of mobile nodes that are connected through wireless interfaces and moves arbitrarily. Ensuring security is one of the main issues due to its infrastructure less solutions. This research aims for IPSec protocol that provides security for an Ad-Hoc networking in a various applications. IPSec incorporates security model, i.e. AES (Advanced Encryption Standard) into its framework. In this work, we consider the problem of incorporating security mechanisms to securing data communication for Ad-Hoc networks. We look at AODV routing protocol (Ad-Hoc On-Demand Distance Vector) in detail and it is used for secure routing. Simulation of IPSec protocol is simulated using NS-3 simulator. Results from NS-3 simulator is compared with AH, ESP, and AES in terms of Quality of Service parameters throughput, average processing time and average end-to-end delay.


2019 ◽  
Vol 61 (3) ◽  
pp. 1117-1128 ◽  
Author(s):  
Xuting Duan ◽  
Jingyi Wei ◽  
Daxin Tian ◽  
Jianshan Zhou ◽  
Haiying Xia ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document