Skip to main content
Erschienen in: Wireless Personal Communications 1/2017

24.11.2016

A Secure and Efficient V2V Authentication Method in Heavy Traffic Environment

verfasst von: Myoung-Seok Han, Sang Jun Lee, Woo-Sik Bae

Erschienen in: Wireless Personal Communications | Ausgabe 1/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A secure and safe authentication on a vehicular ad-hoc network (VANET) is essential for network security. A safe data transmission requires integrity, availability and privacy protection features as well as efficient communication in diverse settings. Recently proposed security protocols for vehicular communication cannot authenticate in a complex way in areas of heavy traffic due to the increasing number of messages in proportion to the number of vehicles. For efficient communication, data volume need be reduced and communication should be safe against a range of attacks. Hence, the present paper proposes a protocol that accelerates message processing by sending a low data volume for communication in areas of heavy traffic and that blocks replay attacks by checking timestamps. In addition, CASPER/FDR (Lowe in Casper: a compiler for the analysis of security protocols. User Manual and Tutorial, Version 1.12, 2009; Formal Systems (Europe) Ltd in Failures-Divergence Renement. FDR2 user manual, 2010) is used to verify the proposed protocol for its security and efficiency against any security vulnerabilities.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Lowe G. (2009). Casper: A compiler for the analysis of security protocols (Version 1.12). User Manual and Tutorial. Lowe G. (2009). Casper: A compiler for the analysis of security protocols (Version 1.12). User Manual and Tutorial.
2.
Zurück zum Zitat Formal Systems (Europe) Ltd. (2010). Oxford University Computing Laboratory, Failures-Divergence Renement. FDR2 User Manual, October 19 2010. Formal Systems (Europe) Ltd. (2010). Oxford University Computing Laboratory, Failures-Divergence Renement. FDR2 User Manual, October 19 2010.
3.
Zurück zum Zitat R.M.E.M., Jebakumari, M. (2014). An effective secure mechanism for vehicular content distribution in VANET. International Journal of Computer Trends and Technology 8(4), 167–172. R.M.E.M., Jebakumari, M. (2014). An effective secure mechanism for vehicular content distribution in VANET. International Journal of Computer Trends and Technology 8(4), 167–172.
4.
Zurück zum Zitat Tang, X., Pu, J., Gao, Y., Xie, Y., & Xiong, Z. (2015). GPS-based replica deletion scheme with anti-packet distribution for vehicular networks. The Computer Journal, 58(6), 1399–1415.CrossRef Tang, X., Pu, J., Gao, Y., Xie, Y., & Xiong, Z. (2015). GPS-based replica deletion scheme with anti-packet distribution for vehicular networks. The Computer Journal, 58(6), 1399–1415.CrossRef
5.
Zurück zum Zitat Huang, C., et al. (2015). mvSERS: A secure emergency response solution for mobile healthcare in vehicular environments. The Computer Journal, 58(10), 2461–2475.CrossRef Huang, C., et al. (2015). mvSERS: A secure emergency response solution for mobile healthcare in vehicular environments. The Computer Journal, 58(10), 2461–2475.CrossRef
6.
Zurück zum Zitat Di Felice, M., Doost-Mohammady, R., Chowdhury, K. R., & Bononi, L. (2012). Smart radios for smart vehicles: Cognitive vehicular networks. IEEE Vehicular Technology Magazine, 7(2), 26–33.CrossRef Di Felice, M., Doost-Mohammady, R., Chowdhury, K. R., & Bononi, L. (2012). Smart radios for smart vehicles: Cognitive vehicular networks. IEEE Vehicular Technology Magazine, 7(2), 26–33.CrossRef
7.
Zurück zum Zitat Chen, J., Mamun, M. S. I., & Miyaji, A. (2015). An efficient batch verification system and its effect in a real time VANET environment. Security and Communication Networks, 8(2), 298–310.CrossRef Chen, J., Mamun, M. S. I., & Miyaji, A. (2015). An efficient batch verification system and its effect in a real time VANET environment. Security and Communication Networks, 8(2), 298–310.CrossRef
8.
Zurück zum Zitat Yan, G., Wen, D., Olariu, S., & Weigle, M. C. (2013). Security challenges in vehicular cloud computing. IEEE Transactions on Intelligent Transportations System, 14(1), 284–294.CrossRef Yan, G., Wen, D., Olariu, S., & Weigle, M. C. (2013). Security challenges in vehicular cloud computing. IEEE Transactions on Intelligent Transportations System, 14(1), 284–294.CrossRef
9.
Zurück zum Zitat Sun, Y., Lu, R., Lin, X., Shen, X., & Su, J. (2010). An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. IEEE Transactions on Vehicular Technology, 59(7), 3589–3603.CrossRef Sun, Y., Lu, R., Lin, X., Shen, X., & Su, J. (2010). An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. IEEE Transactions on Vehicular Technology, 59(7), 3589–3603.CrossRef
10.
Zurück zum Zitat Rabieh, K., Mahmoud, M. M., Azer, M., & Allam, M. (2015). A secure and privacy-preserving event reporting scheme for vehicular Ad Hoc networks. Security and Communication Networks, 8(17), 3271–3281.CrossRef Rabieh, K., Mahmoud, M. M., Azer, M., & Allam, M. (2015). A secure and privacy-preserving event reporting scheme for vehicular Ad Hoc networks. Security and Communication Networks, 8(17), 3271–3281.CrossRef
11.
Zurück zum Zitat Shaikh, R. A., & Alzahrani, A. S. (2014). Intrusion-aware trust model for vehicular ad hoc networks. Security and Communication Networks, 7(11), 1652–1669.CrossRef Shaikh, R. A., & Alzahrani, A. S. (2014). Intrusion-aware trust model for vehicular ad hoc networks. Security and Communication Networks, 7(11), 1652–1669.CrossRef
12.
Zurück zum Zitat Czerny, B. J., D’Ambrosio, J., Debouk, R., & Stashko, K. (2010) ISO 26262 Functional safety draft international standard for road vehicles: Background, Status, and Overview. General Motors Powertrain. Czerny, B. J., D’Ambrosio, J., Debouk, R., & Stashko, K. (2010) ISO 26262 Functional safety draft international standard for road vehicles: Background, Status, and Overview. General Motors Powertrain.
13.
Zurück zum Zitat IEEE 1609.2-2016 Standard for wireless access in vehicular environments - Security services for applications and management messages, 2016. IEEE 1609.2-2016 Standard for wireless access in vehicular environments - Security services for applications and management messages, 2016.
14.
Zurück zum Zitat Rongxing, L., Lin, X., & Shen, X. (2013). SPOC: A secure and privacy preserving opportunistic computing framework for mobile healthcare emergency. IEEE Transactions on Parallel and Distributed Systems, 24(3), 614–624.CrossRef Rongxing, L., Lin, X., & Shen, X. (2013). SPOC: A secure and privacy preserving opportunistic computing framework for mobile healthcare emergency. IEEE Transactions on Parallel and Distributed Systems, 24(3), 614–624.CrossRef
15.
Zurück zum Zitat Chen, Y. M., & Wei, Y. C. (2013). A beacon-based trust management system for enhancing user centric location privacy in VANETs. Journal of Communications and Networks, 15(2), 153–163.CrossRef Chen, Y. M., & Wei, Y. C. (2013). A beacon-based trust management system for enhancing user centric location privacy in VANETs. Journal of Communications and Networks, 15(2), 153–163.CrossRef
16.
Zurück zum Zitat Park, S. P., Ahn, J. W., & Kim, E. G. (2015). Design and implementation of secure vehicle communication protocols for WAVE communication systems. Journal of the Korea Institute of Information and Communication Engineering, 19(4), 841–847.CrossRef Park, S. P., Ahn, J. W., & Kim, E. G. (2015). Design and implementation of secure vehicle communication protocols for WAVE communication systems. Journal of the Korea Institute of Information and Communication Engineering, 19(4), 841–847.CrossRef
17.
Zurück zum Zitat Festag, A., Papadimitratos, P., & Tielert, T. (2010). Design and performance of secure geo-cast for vehicular communication. IEEE Transactions on Vehicular Technology, 59(5), 2456–2471.CrossRef Festag, A., Papadimitratos, P., & Tielert, T. (2010). Design and performance of secure geo-cast for vehicular communication. IEEE Transactions on Vehicular Technology, 59(5), 2456–2471.CrossRef
18.
Zurück zum Zitat Ristanovic, N., Papadimitratos, P., Theodorakopoulos, G., Hubaux, J. P., & Le Boudec, J. Y. (2011, January). Adaptive message authentication for multi-hop networks. In Wireless On-Demand Network Systems and Services (WONS), 2011 Eighth International Conference on (pp. 96–103). IEEE. Ristanovic, N., Papadimitratos, P., Theodorakopoulos, G., Hubaux, J. P., & Le Boudec, J. Y. (2011, January). Adaptive message authentication for multi-hop networks. In Wireless On-Demand Network Systems and Services (WONS), 2011 Eighth International Conference on (pp. 96–103). IEEE.
19.
Zurück zum Zitat Ning, H., Liu, H., & Yang, L. T. (2013). Cyberentity security in the internet of things. Computer, 46(4), 46–53.CrossRef Ning, H., Liu, H., & Yang, L. T. (2013). Cyberentity security in the internet of things. Computer, 46(4), 46–53.CrossRef
Metadaten
Titel
A Secure and Efficient V2V Authentication Method in Heavy Traffic Environment
verfasst von
Myoung-Seok Han
Sang Jun Lee
Woo-Sik Bae
Publikationsdatum
24.11.2016
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2017
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-016-3884-6

Weitere Artikel der Ausgabe 1/2017

Wireless Personal Communications 1/2017 Zur Ausgabe

Neuer Inhalt