Skip to main content
main-content
Top

Hint

Swipe to navigate through the articles of this issue

28-07-2022

Using I2P (Invisible Internet Protocol) Encrypted Virtual Tunnels for a Secure and Anonymous Communication in VANets: I2P Vehicular Protocol (IVP)

Authors: Tayeb Diab, Marc Gilg, Pascal Lorenz, Frederic Drouhin

Published in: Wireless Personal Communications

Login to get access
share
SHARE

Abstract

The Invisible Internet Project (I2P) as a secure protocol uses robust mechanisms and strong algorithms to reinforce the security and the anonymity of the communication. However, the difference between internet and VANet in terms of mobility and connectivity of nodes presents a big issue that needs to be treated when using I2P mechanisms in VANet. The previous work “Anonymizing Communication in VANets by Applying I2P Mechanisms” proposes a protocol based on tunnels and encryption algorithms that use digital signatures and authentication mechanisms. Tunnels are created in static scenarios not dynamic and without maintaining their existence, which is a challenging issue in VANet that need to be treated to reply to different requirements of this kind of networks. In this paper, we complete the last version of the proposed protocol (I2P Vehicular Protocol) by integrating a tunnel maintenance algorithm for maintaining the existence of the created tunnels during the communication. This algorithm allows the implementation of the protocol in mobile scenarios of VANet. The effectiveness and security of IVP protocol are proved by analyzing the added part related to the tunnel maintenance process and showing performance results (end-to-end delay, PDR and overhead). Simulation results show that the new protocol version is better than the first version thanks to the integrated tunnel maintenance algorithm. Simulation scenarios were executed using NS3 simulator.
Literature
1.
go back to reference Diab, T., Gilg, M., & Lorenz, P. (2019). A secure communication model using lightweight Diffie-Hellman method in vehicular ad hoc networks. International Journal of Security and Networks, 14(2), 61–77. CrossRef Diab, T., Gilg, M., & Lorenz, P. (2019). A secure communication model using lightweight Diffie-Hellman method in vehicular ad hoc networks. International Journal of Security and Networks, 14(2), 61–77. CrossRef
2.
go back to reference Tayeb Diab, Marc Gilg, Frederic Drouhin & Pascal Lorenz, “Anonymizing Communication in VANets by Applying I2P Mechanisms”, IEEE Global Communications Conference, (2019) Tayeb Diab, Marc Gilg, Frederic Drouhin & Pascal Lorenz, “Anonymizing Communication in VANets by Applying I2P Mechanisms”, IEEE Global Communications Conference, (2019)
4.
go back to reference Joe, M. M., & Ramakrishnan, B. (2016). Review of vehicular ad hoc network communication models including WVANET (Web VANET) model and WVANET future research directions. Wireless networks, 22(7), 2369–2386. CrossRef Joe, M. M., & Ramakrishnan, B. (2016). Review of vehicular ad hoc network communication models including WVANET (Web VANET) model and WVANET future research directions. Wireless networks, 22(7), 2369–2386. CrossRef
7.
go back to reference Aghabagherloo Alireza, et al. An Efficient Anonymous Authentication Scheme Using Registration List in VANETs. arXiv preprint arXiv:​2004.​00282 (2020) Aghabagherloo Alireza, et al. An Efficient Anonymous Authentication Scheme Using Registration List in VANETs. arXiv preprint arXiv:​2004.​00282 (2020)
10.
go back to reference Jiang Yanji, Shaocheng Ge, and Xueli Shen. AAAS: an anonymous authentication scheme based on group Signature in VANETs. IEEE Access (2020) Jiang Yanji, Shaocheng Ge, and Xueli Shen. AAAS: an anonymous authentication scheme based on group Signature in VANETs. IEEE Access (2020)
11.
go back to reference HAN Mu., Liu Shuai, MA Shidian, et al. Anonymous authentication scheme based on fog computing for VANET. PLoS one. 2020, 15(2), e0228319 HAN Mu., Liu Shuai, MA Shidian, et al. Anonymous authentication scheme based on fog computing for VANET. PLoS one. 2020, 15(2), e0228319
12.
go back to reference Saddiki, K., et al. (2017). “Black hole attack detection and ignoring in OLSR protocol.” International Journal of Trust Management in Computing and Communications, 4(1), 75–93. CrossRef Saddiki, K., et al. (2017). “Black hole attack detection and ignoring in OLSR protocol.” International Journal of Trust Management in Computing and Communications, 4(1), 75–93. CrossRef
Metadata
Title
Using I2P (Invisible Internet Protocol) Encrypted Virtual Tunnels for a Secure and Anonymous Communication in VANets: I2P Vehicular Protocol (IVP)
Authors
Tayeb Diab
Marc Gilg
Pascal Lorenz
Frederic Drouhin
Publication date
28-07-2022
Publisher
Springer US
Published in
Wireless Personal Communications
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-022-09888-4