Skip to main content
Top

2021 | OriginalPaper | Chapter

A Novel Authentication Scheme for VANET with Anonymity

Authors : Harshita Pal, Bhawna Narwal

Published in: Progress in Advanced Computing and Intelligent Engineering

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

VANET is an essential key technology for building up an intelligent transportation system (ITS) that combines current wireless technologies to vehicles. Real-time information sent to driver or vehicle ensures smooth traffic flow in order to ensure safe driving and traffic management while avoiding accidents. To maintain smooth functioning and protection of real-time information from alteration, data must be secured and authenticated. In this paper, a novel anonymous authentication scheme for VANET has been presented which tries to provide strong non-repudiation, anti-forgery, and anonymity properties. Additionally, to avoid vehicles from abusing VANET as well as to provide strong privacy protection, a conditional tracking mechanism for vehicle tracing is developed which revokes certificates of misbehaving vehicles in an efficacious manner. Moreover, the proposed protocol protects the network from attacks such as masquerading, identity theft, and certificate replication.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Al-Sultan S, Al-Doori MM, Al-Bayatti AH, Zedan H (2014) A comprehensive survey on vehicular ad hoc network. J Netw Comput Appl 37:380–389CrossRef Al-Sultan S, Al-Doori MM, Al-Bayatti AH, Zedan H (2014) A comprehensive survey on vehicular ad hoc network. J Netw Comput Appl 37:380–389CrossRef
2.
go back to reference Narwal B (2018) Fake news in digital media. In: 2018 international conference on advances in computing, communication control and networking (ICACCCN). Greater Noida (UP), India, pp 977–981 Narwal B (2018) Fake news in digital media. In: 2018 international conference on advances in computing, communication control and networking (ICACCCN). Greater Noida (UP), India, pp 977–981
3.
go back to reference Narwal B, Mohapatra A (2017) Performance analysis of QoS parameters during vertical handover process between Wi-Fi and WiMAX networks. In: International conference on recent developments in science, engineering and technology, Springer, p 330344 Narwal B, Mohapatra A (2017) Performance analysis of QoS parameters during vertical handover process between Wi-Fi and WiMAX networks. In: International conference on recent developments in science, engineering and technology, Springer, p 330344
4.
go back to reference Rani S, Narwal B, Mohapatra AK (2017) RREQ flood attack and its mitigation in ad hoc network. In: International conference on recent developments in science, engineering and technology. Springer, Singapore, pp 599–607 Rani S, Narwal B, Mohapatra AK (2017) RREQ flood attack and its mitigation in ad hoc network. In: International conference on recent developments in science, engineering and technology. Springer, Singapore, pp 599–607
5.
go back to reference Narwal B, Mohapatra AK (2016) Energy efficient vertical handover algorithm for heterogeneous wireless networks, vol 9, pp 8981–8984 Narwal B, Mohapatra AK (2016) Energy efficient vertical handover algorithm for heterogeneous wireless networks, vol 9, pp 8981–8984
6.
go back to reference Mishra B, Panigrahy SK, Tripathy TC, Jena D, Jena SK (2011) A secure and efficient message authentication protocol for VANETs with privacy preservation. In: IEEE world congress on information and communication technologies, pp 880–885 Mishra B, Panigrahy SK, Tripathy TC, Jena D, Jena SK (2011) A secure and efficient message authentication protocol for VANETs with privacy preservation. In: IEEE world congress on information and communication technologies, pp 880–885
7.
go back to reference Cui J, Wei L, Zhang J, Xu Y, Zhong H (2018) An efficient message-authentication scheme based on edge computing for vehicular ad hoc networks. IEEE Trans Intell Transp Syst 20(5):1621–1632CrossRef Cui J, Wei L, Zhang J, Xu Y, Zhong H (2018) An efficient message-authentication scheme based on edge computing for vehicular ad hoc networks. IEEE Trans Intell Transp Syst 20(5):1621–1632CrossRef
8.
go back to reference Singh A, Fhom HCS (2017) Restricted usage of anonymous credentials in vehicular ad hoc networks for misbehavior detection. Int J Inf Secur 16(2):195–211CrossRef Singh A, Fhom HCS (2017) Restricted usage of anonymous credentials in vehicular ad hoc networks for misbehavior detection. Int J Inf Secur 16(2):195–211CrossRef
9.
go back to reference Jiang S, Zhu X, Wang L (2016) An efficient anonymous batch authentication scheme based on HMAC for VANETs. IEEE Trans Intell Transp Syst 17(8):2193–2204CrossRef Jiang S, Zhu X, Wang L (2016) An efficient anonymous batch authentication scheme based on HMAC for VANETs. IEEE Trans Intell Transp Syst 17(8):2193–2204CrossRef
10.
go back to reference Liu ZC, Xiong L, Peng T, Peng DY, Liang HB (2018) A realistic distributed conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Access 6:26307–26317CrossRef Liu ZC, Xiong L, Peng T, Peng DY, Liang HB (2018) A realistic distributed conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Access 6:26307–26317CrossRef
11.
go back to reference Azees M, Vijayakumar P, Deboarh LJ (2017) EAAP: Efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad hoc networks. IEEE Trans Intell Transp Syst 18(9):2467–2476CrossRef Azees M, Vijayakumar P, Deboarh LJ (2017) EAAP: Efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad hoc networks. IEEE Trans Intell Transp Syst 18(9):2467–2476CrossRef
12.
go back to reference Lim K, Manivannan D (2016) An efficient protocol for authenticated and secure message delivery in vehicular ad hoc networks. Vehic Commun 4:30–37CrossRef Lim K, Manivannan D (2016) An efficient protocol for authenticated and secure message delivery in vehicular ad hoc networks. Vehic Commun 4:30–37CrossRef
13.
go back to reference Asl FR, Samavi R (2017) SyNORM: symmetric non repudiated message authentication in vehicular ad hoc networks. In: 2017 IEEE 86th vehicular technology conference (VTCFall), pp 1–5 Asl FR, Samavi R (2017) SyNORM: symmetric non repudiated message authentication in vehicular ad hoc networks. In: 2017 IEEE 86th vehicular technology conference (VTCFall), pp 1–5
14.
go back to reference Tan H, Choi D, Kim P, Pan S, Chung I (2017) Comments on dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks. IEEE Trans Intell Transp Syst 19(7):2149–2151CrossRef Tan H, Choi D, Kim P, Pan S, Chung I (2017) Comments on dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks. IEEE Trans Intell Transp Syst 19(7):2149–2151CrossRef
15.
go back to reference Narwal B, Mohapatra AK, Usmani KA (2019) Towards a taxonomy of cyber threats against target applications. J Stat Manage Syst 22(2):301–325 Narwal B, Mohapatra AK, Usmani KA (2019) Towards a taxonomy of cyber threats against target applications. J Stat Manage Syst 22(2):301–325
16.
go back to reference Dhawan S, Narwal B (2019) Unfolding the mystery of ransomware. In: International conference on innovative computing and communications, Springer, pp 25–32 Dhawan S, Narwal B (2019) Unfolding the mystery of ransomware. In: International conference on innovative computing and communications, Springer, pp 25–32
Metadata
Title
A Novel Authentication Scheme for VANET with Anonymity
Authors
Harshita Pal
Bhawna Narwal
Copyright Year
2021
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-6584-7_26