Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 4/2021

24-10-2020

A trust infrastructure based authentication method for clustered vehicular ad hoc networks

Authors: Fatemehsadat Mirsadeghi, Marjan Kuchaki Rafsanjani, Brij B. Gupta

Published in: Peer-to-Peer Networking and Applications | Issue 4/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Vehicular Ad hoc Networks (VANETs) as a subset of mobile ad hoc networks which allow communication between any vehicle with other adjacent vehicles, road side units and infrastructure. In these networks, the purpose is to enhance the security, improve the management of urban and road traffic and provide services to the passenger. Due to problems such as reliability and privacy, messages that are exchanged in the network should be confidential and secure. Therefore, we need a secure topology to maintain trust, which enables the cryptographic process. In this paper, a trust based authentication method for clustered vehicular ad hoc networks is proposed. The efficient authentication method should be able to accurately detect malicious nodes and reduced delay and overhead. The main purpose of the proposed method is to create trustworthy and stable clusters that lead to the stability of the entire network. For this purpose, we estimate the trust degree of each vehicle by combining the trust between vehicles and the trust between the vehicle and Road Side Units (RSUs), and Cluster Heads (CHs) are selected based on this estimated trust degree. Cluster Heads along with verifiers are responsible for monitoring each vehicle. On the other hand, the cluster heads provide an optimal and secure route for transmitting messages. Messages are digitally signed by the sender and encrypted using a public/private key as distributed by a Trusted Authority (TA) and decrypted by the destination; so that each message contains a certificate from a trusted authority. In this identification, the sender and receiver of the message are verified and authentication will be achieved. By simulation results, it is proves that the proposed method increases the accuracy in detecting malicious nodes and the packet delivery ratio, and decreases the delay of authentication and overhead.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Fatemidokht H, Kuchaki Rafsanjani M (2016) A secure framework for beeadhoc (bio/nature inspired MANET routing protocol) using neural networks. Bulletin of the Transilvania University of Brasov. Mathematics, Informatics, Physics. Series III, vol. 9(58), no. 2: 125–136 Fatemidokht H, Kuchaki Rafsanjani M (2016) A secure framework for beeadhoc (bio/nature inspired MANET routing protocol) using neural networks. Bulletin of the Transilvania University of Brasov. Mathematics, Informatics, Physics. Series III, vol. 9(58), no. 2: 125–136
2.
go back to reference Kuchaki Rafsanjani M, Fatemidokht H (2015) FBeeAdHoc: A secure routing protocol for BeeAdHoc based on fuzzy logic in MANETs. International Journal of Electronics and Communications (AEÜ) 69:1613–1621CrossRef Kuchaki Rafsanjani M, Fatemidokht H (2015) FBeeAdHoc: A secure routing protocol for BeeAdHoc based on fuzzy logic in MANETs. International Journal of Electronics and Communications (AEÜ) 69:1613–1621CrossRef
4.
go back to reference Kaur N, Kad S (2015) A review on security related aspects in vehicular ad hoc networks", Proceedings of the International Conference on Information Security& Privacy (ICISP2015), Nagpur, India, pp. 387–394, December 11–12 Kaur N, Kad S (2015) A review on security related aspects in vehicular ad hoc networks", Proceedings of the International Conference on Information Security& Privacy (ICISP2015), Nagpur, India, pp. 387–394, December 11–12
5.
go back to reference Movahedi Z, Mazandarani A (2015) Self-adaptive routing protocol with delay range for inter-vehicle case networks. Soft Calculations journal 4(8):68–83 Movahedi Z, Mazandarani A (2015) Self-adaptive routing protocol with delay range for inter-vehicle case networks. Soft Calculations journal 4(8):68–83
6.
go back to reference Pietro RD, Mancini LV, Mei A (2006) Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks. Wirel Netw 12(6):709–721CrossRef Pietro RD, Mancini LV, Mei A (2006) Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks. Wirel Netw 12(6):709–721CrossRef
7.
go back to reference Varshney N, Roy T, Chaudhary N (2014) Security protocol for VANET by using digital certifcation to provide security with low bandwidth. Proceedings of the International Conference on Communication and Signal Processing. Melmaruvathur, India, pp. 768–772, April 3–5 Varshney N, Roy T, Chaudhary N (2014) Security protocol for VANET by using digital certifcation to provide security with low bandwidth. Proceedings of the International Conference on Communication and Signal Processing. Melmaruvathur, India, pp. 768–772, April 3–5
8.
go back to reference Al-Sultan S, Al-Doori MM, Al-Bayatti AH, Zedan H (January 2014) A comprehensive survey on vehicular ad hoc network. J Netw Comput Appl 37:380–392CrossRef Al-Sultan S, Al-Doori MM, Al-Bayatti AH, Zedan H (January 2014) A comprehensive survey on vehicular ad hoc network. J Netw Comput Appl 37:380–392CrossRef
9.
go back to reference Mokhtar B, Azab M (2015) Survey on security issues in vehicular ad hoc. Alexandria Engineering Journal 54(4):1115–1126CrossRef Mokhtar B, Azab M (2015) Survey on security issues in vehicular ad hoc. Alexandria Engineering Journal 54(4):1115–1126CrossRef
10.
go back to reference Engoulou RG, Bellaïche M, Pierre S, Quintero A (2014) VANET security surveys. Comput Commun 44:1–13CrossRef Engoulou RG, Bellaïche M, Pierre S, Quintero A (2014) VANET security surveys. Comput Commun 44:1–13CrossRef
11.
go back to reference Azees M, Vijayakumar P, Deborah LJ (2016) A comprehensive survey on security services in vehicular ad hoc networks (VANETs). IET Intell Transp Syst 10(6):379–388CrossRef Azees M, Vijayakumar P, Deborah LJ (2016) A comprehensive survey on security services in vehicular ad hoc networks (VANETs). IET Intell Transp Syst 10(6):379–388CrossRef
12.
go back to reference Zhao H, Sun D, Yue H, Zhao M, Cheng S (2018) Dynamic trust model for vehicular cyber-physical systems. International Journal of Network Security 20(1):157–167 Zhao H, Sun D, Yue H, Zhao M, Cheng S (2018) Dynamic trust model for vehicular cyber-physical systems. International Journal of Network Security 20(1):157–167
13.
go back to reference Bali RS, Kumar N, Rodrigues JJPC (2014) Clustering in vehicular ad hoc networks: taxonomy, challenges and solutions. Vehicular Communications 1(3):134–152CrossRef Bali RS, Kumar N, Rodrigues JJPC (2014) Clustering in vehicular ad hoc networks: taxonomy, challenges and solutions. Vehicular Communications 1(3):134–152CrossRef
14.
go back to reference Dawande JR, Silakari S, Deen A (2015) A survey of all existing clustering protocols in VANETs but main emphasis of survey laid on currently using protocol i.e. TCDGP. International Journal of Computer Applications 118(6):22–31CrossRef Dawande JR, Silakari S, Deen A (2015) A survey of all existing clustering protocols in VANETs but main emphasis of survey laid on currently using protocol i.e. TCDGP. International Journal of Computer Applications 118(6):22–31CrossRef
15.
go back to reference A. MS (2007) Public key cryptography – application algorithms and mathematical explanations. Tata Elxi Ltd, India, May 2007 A. MS (2007) Public key cryptography – application algorithms and mathematical explanations. Tata Elxi Ltd, India, May 2007
17.
go back to reference Mejri MN, Ben-Othman J, Hamdi M (2014) Survey on VANET security challenges and possible cryptographic solutions. Vehicular Communications 1(2):53–66CrossRef Mejri MN, Ben-Othman J, Hamdi M (2014) Survey on VANET security challenges and possible cryptographic solutions. Vehicular Communications 1(2):53–66CrossRef
18.
go back to reference Minhas UF, Zhang J, Tran T, Cohen R, Cheriton DR (2011) A multi-faceted approach to modeling agent trust for effective communication in the application of mobile ad hoc vehicular networks. IEEE Trans Syst Man Cybern Part C Appl Rev 41(3):407–420CrossRef Minhas UF, Zhang J, Tran T, Cohen R, Cheriton DR (2011) A multi-faceted approach to modeling agent trust for effective communication in the application of mobile ad hoc vehicular networks. IEEE Trans Syst Man Cybern Part C Appl Rev 41(3):407–420CrossRef
19.
go back to reference Mármol FG, Pérez GM (2012) TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks. J Netw Comput Appl 35(3):934–941CrossRef Mármol FG, Pérez GM (2012) TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks. J Netw Comput Appl 35(3):934–941CrossRef
20.
go back to reference Li W, Song H (2016) ART: an attack-resistant trust management scheme for securing vehicular ad hoc networks. IEEE Trans Intell Transp Syst 17(4):960–969CrossRef Li W, Song H (2016) ART: an attack-resistant trust management scheme for securing vehicular ad hoc networks. IEEE Trans Intell Transp Syst 17(4):960–969CrossRef
21.
go back to reference Hu H, Lu R, Zhang Z, Shao J (2017) REPLACE: a reliable trust-based platoon service recommendation scheme in VANET. IEEE Trans Veh Technol 66(2):1786–1797CrossRef Hu H, Lu R, Zhang Z, Shao J (2017) REPLACE: a reliable trust-based platoon service recommendation scheme in VANET. IEEE Trans Veh Technol 66(2):1786–1797CrossRef
22.
go back to reference Zhizhong J, Chuanhe H, Liya X, Bo W, Xi C, Xiying F (2012) A trusted opportunistic routing algorithm for VANET", Proceedings of the Third International Conference on Networking and Distributed Computing (ICNDC), Hangzhou, China, pp. 86–90, October 21–24, 2012 Zhizhong J, Chuanhe H, Liya X, Bo W, Xi C, Xiying F (2012) A trusted opportunistic routing algorithm for VANET", Proceedings of the Third International Conference on Networking and Distributed Computing (ICNDC), Hangzhou, China, pp. 86–90, October 21–24, 2012
24.
go back to reference Daeinabi A, Rahbar AG (2014) An advanced security scheme based on clustering and key distribution in vehicular ad hoc networks. Computers & Electrical Engineering journal 40(2):517–529CrossRef Daeinabi A, Rahbar AG (2014) An advanced security scheme based on clustering and key distribution in vehicular ad hoc networks. Computers & Electrical Engineering journal 40(2):517–529CrossRef
25.
go back to reference Chim TW, Yiu SM, Hui LCK, Li VOK (2014) VSPN: VANET-based secure and privacy-preserving navigation. IEEE Trans Comput 63(2):510–524MathSciNetCrossRef Chim TW, Yiu SM, Hui LCK, Li VOK (2014) VSPN: VANET-based secure and privacy-preserving navigation. IEEE Trans Comput 63(2):510–524MathSciNetCrossRef
26.
go back to reference Kerrache CA, Lagraa N, Calafate CT, Cano JC, Manzoni P (2016) T-VNets: a novel trust architecture for vehicular networks using the standardized messaging services of ETSI ITS. Comput Commun 93:68–83CrossRef Kerrache CA, Lagraa N, Calafate CT, Cano JC, Manzoni P (2016) T-VNets: a novel trust architecture for vehicular networks using the standardized messaging services of ETSI ITS. Comput Commun 93:68–83CrossRef
27.
go back to reference Sugumar R, Rengarajan A, Jayakumar C (2016) Trust based authentication technique for cluster based vehicular ad hoc networks (VANET). Wirel Netw 22(5):1–10 Sugumar R, Rengarajan A, Jayakumar C (2016) Trust based authentication technique for cluster based vehicular ad hoc networks (VANET). Wirel Netw 22(5):1–10
28.
go back to reference Barba CT, Aguiar LU, Igartua MA, Arnau JP, Monedero DR, Forné J, Pallarès E (2013) A collaborative protocol for anonymous reporting in vehicular ad hoc networks. Computer Standards & Interfaces 36(1):188–197CrossRef Barba CT, Aguiar LU, Igartua MA, Arnau JP, Monedero DR, Forné J, Pallarès E (2013) A collaborative protocol for anonymous reporting in vehicular ad hoc networks. Computer Standards & Interfaces 36(1):188–197CrossRef
29.
go back to reference Chuang MC, Lee JF (2014) TEAM: trust-extended authentication mechanism for vehicular ad hoc networks. IEEE Syst J 8(3):749–758CrossRef Chuang MC, Lee JF (2014) TEAM: trust-extended authentication mechanism for vehicular ad hoc networks. IEEE Syst J 8(3):749–758CrossRef
33.
go back to reference Thi Kim OT, Nguyen VD, Hong CS (2014) Which network simulation tool is better for simulating vehicular ad hoc network? Proceedings of the Korean Information Science Conference 134(1):930–932 Thi Kim OT, Nguyen VD, Hong CS (2014) Which network simulation tool is better for simulating vehicular ad hoc network? Proceedings of the Korean Information Science Conference 134(1):930–932
34.
go back to reference Hussain MDM, Beg MMS (2019) Using vehicles as fog infrastructures for transportation cyber-physical systems (T-CPS): Fog computing for vehicular networks. International Journal of Software Science and Computational Intelligence (IJSSCI) 11(1):47–69CrossRef Hussain MDM, Beg MMS (2019) Using vehicles as fog infrastructures for transportation cyber-physical systems (T-CPS): Fog computing for vehicular networks. International Journal of Software Science and Computational Intelligence (IJSSCI) 11(1):47–69CrossRef
35.
go back to reference Hiraishi H (2018) Passenger condition based route-planning for cognitive vehicle system. International Journal of Software Science and Computational Intelligence (IJSSCI) 10(2):25–35CrossRef Hiraishi H (2018) Passenger condition based route-planning for cognitive vehicle system. International Journal of Software Science and Computational Intelligence (IJSSCI) 10(2):25–35CrossRef
36.
go back to reference Pljonkin AP (2019) Vulnerability of the synchronization process in the quantum key distribution system. International Journal of Cloud Applications and Computing (IJCAC) 9(1):50–58CrossRef Pljonkin AP (2019) Vulnerability of the synchronization process in the quantum key distribution system. International Journal of Cloud Applications and Computing (IJCAC) 9(1):50–58CrossRef
37.
go back to reference Alhaidary M, Rahman SMM, Mohammed Z, Shamim Hossain M, Alamri A, Haque MSM, Gupta BB (2018) Vulnerability analysis for the authentication protocols in trusted computing platforms and a proposed enhancement of the offpad protocol. IEEE Access 6:6071–6081CrossRef Alhaidary M, Rahman SMM, Mohammed Z, Shamim Hossain M, Alamri A, Haque MSM, Gupta BB (2018) Vulnerability analysis for the authentication protocols in trusted computing platforms and a proposed enhancement of the offpad protocol. IEEE Access 6:6071–6081CrossRef
38.
go back to reference Kaushik S, Gandhi C (2019) Ensure hierarchal identity based data security in cloud environment. International Journal of Cloud Applications and Computing (IJCAC) 9(4):21–36CrossRef Kaushik S, Gandhi C (2019) Ensure hierarchal identity based data security in cloud environment. International Journal of Cloud Applications and Computing (IJCAC) 9(4):21–36CrossRef
39.
go back to reference Gupta BB (Ed.). (2018). Computer and cyber security: principles, algorithm, applications, and perspectives. CRC Press Gupta BB (Ed.). (2018). Computer and cyber security: principles, algorithm, applications, and perspectives. CRC Press
Metadata
Title
A trust infrastructure based authentication method for clustered vehicular ad hoc networks
Authors
Fatemehsadat Mirsadeghi
Marjan Kuchaki Rafsanjani
Brij B. Gupta
Publication date
24-10-2020
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 4/2021
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-020-01010-4

Other articles of this Issue 4/2021

Peer-to-Peer Networking and Applications 4/2021 Go to the issue

Premium Partner