Skip to main content
Erschienen in: Wireless Networks 3/2017

22.01.2016

Group Key Authentication scheme for Vanet INtrusion detection (GKAVIN)

verfasst von: G. Kumaresan, T. Adiline Macriga

Erschienen in: Wireless Networks | Ausgabe 3/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Security must be provided in VANET as it is open to various attacks due to malicious vehicle, Brute force attack, misbehaving and faulty nodes, malicious users, and malicious nodes. The attacks can be occurred due to the lack of authentication. To overcome this problem, in this paper, we propose to develop a group key authentication and misbehaviour detection in VANET. Initially, we form clusters with three types of nodes within a certain transmission range namely Unique Node, Sub Unique Node, and Normal Node. Handshaking can be performed followed by message signing. The message is verified, and then group key is generated with subsequent key generation at each time slot. Finally, location information and time about vehicles can be used to detect malicious behaviours. Simulation results show that the proposed technique can achieve more packet delivery ratio with reduced delay, overhead, and packet drop.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Chhoeun, S. A., Ayutaya, K. S. N., Charnsripinyo, C., Chamnongthai, K. ,& Kumhom, P. (2009). A novel message fabrication detection for beaconless routing in VANETs. In International conference on communication software and networks (pp. 453–457). Chhoeun, S. A., Ayutaya, K. S. N., Charnsripinyo, C., Chamnongthai, K. ,& Kumhom, P. (2009). A novel message fabrication detection for beaconless routing in VANETs. In International conference on communication software and networks (pp. 453–457).
2.
Zurück zum Zitat Raw, R. S., Kumar, M., & Singh, N. (2013). Security challenges, issues and their solutions for VANET. International Journal of Network Security & Its Applications (IJNSA), 5(5), 95–105.CrossRef Raw, R. S., Kumar, M., & Singh, N. (2013). Security challenges, issues and their solutions for VANET. International Journal of Network Security & Its Applications (IJNSA), 5(5), 95–105.CrossRef
3.
Zurück zum Zitat Kumar, A., & Sinha, M. (2014) Overview on vehicular ad hoc network and its security issues. In International conference on computing for sustainable global development (pp. 792–797). Kumar, A., & Sinha, M. (2014) Overview on vehicular ad hoc network and its security issues. In International conference on computing for sustainable global development (pp. 792–797).
4.
Zurück zum Zitat Wei, L., et al. (2014). Security and privacy for storage and computation in cloud computing. Information Sciences, 258, 371–386.CrossRef Wei, L., et al. (2014). Security and privacy for storage and computation in cloud computing. Information Sciences, 258, 371–386.CrossRef
5.
Zurück zum Zitat Hwang, R.-J., Hsiao, Y.-K., & Liu, Y.-F. (2011) Secure communication scheme of VANET with privacy preserving. In IEEE 17th international conference on parallel and distributed systems (pp. 654–659) (ISSN: 1521-9097). Hwang, R.-J., Hsiao, Y.-K., & Liu, Y.-F. (2011) Secure communication scheme of VANET with privacy preserving. In IEEE 17th international conference on parallel and distributed systems (pp. 654–659) (ISSN: 1521-9097).
6.
Zurück zum Zitat Mershad, K., & Artail, H. (2011) REACT: Secure and Efficient Data Acquisition in VANETs. In IEEE 7th international conference on wireless and mobile computing, networking and communications (pp. 149–156) (ISSN: 2160-4886). Mershad, K., & Artail, H. (2011) REACT: Secure and Efficient Data Acquisition in VANETs. In IEEE 7th international conference on wireless and mobile computing, networking and communications (pp. 149–156) (ISSN: 2160-4886).
7.
Zurück zum Zitat Wei, L., et al. (2010) SecCloud: Bridging secure storage and computation in cloud. In ICDCS workshops (pp. 52–61). Wei, L., et al. (2010) SecCloud: Bridging secure storage and computation in cloud. In ICDCS workshops (pp. 52–61).
8.
Zurück zum Zitat Yan, Z., et al. (2014). A survey on trust management for internet of things. Journal of Network and Computer Applications, 42, 120–134.CrossRef Yan, Z., et al. (2014). A survey on trust management for internet of things. Journal of Network and Computer Applications, 42, 120–134.CrossRef
9.
Zurück zum Zitat Jing, Q., et al. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20(8), 2481–2501.CrossRef Jing, Q., et al. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20(8), 2481–2501.CrossRef
10.
Zurück zum Zitat Yan, Z., et al. (2015). A security and trust framework for virtualized networks and software-defined networking. Security and Communication Networks. Yan, Z., et al. (2015). A security and trust framework for virtualized networks and software-defined networking. Security and Communication Networks.
11.
Zurück zum Zitat Rawatz, D. B., Bistax, B. B., Yan, G., & Weigley, M. C. Securing vehicular ad hoc networks against malicious drivers: A probabilistic approach. In International conference on complex, intelligent, and software intensive systems. Rawatz, D. B., Bistax, B. B., Yan, G., & Weigley, M. C. Securing vehicular ad hoc networks against malicious drivers: A probabilistic approach. In International conference on complex, intelligent, and software intensive systems.
12.
Zurück zum Zitat Yang, H., et al. (2014). Provably secure three-party authenticated key agreement protocol using smart cards. Computer Networks, 58, 29–38.CrossRef Yang, H., et al. (2014). Provably secure three-party authenticated key agreement protocol using smart cards. Computer Networks, 58, 29–38.CrossRef
13.
Zurück zum Zitat Fadlullah, Z., et al. (2010). DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis. IEEE/ACM Transactions on Networking (TON), 18(4), 1234–1247.CrossRef Fadlullah, Z., et al. (2010). DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis. IEEE/ACM Transactions on Networking (TON), 18(4), 1234–1247.CrossRef
14.
Zurück zum Zitat Wang, T., et al. (2015). Survey on channel reciprocity based key establishment techniques for wireless systems. Wireless Networks, 21(6), 1835–1846.CrossRef Wang, T., et al. (2015). Survey on channel reciprocity based key establishment techniques for wireless systems. Wireless Networks, 21(6), 1835–1846.CrossRef
15.
Zurück zum Zitat Li, P., Guo, S., Shui, Yu., & Vasilakos, A. V. (2014). Reliable multicast with pipelined network coding using opportunistic feeding and routing. IEEE Transactions on Parallel and Distributed Systems, 25(12), 3264–3273.CrossRef Li, P., Guo, S., Shui, Yu., & Vasilakos, A. V. (2014). Reliable multicast with pipelined network coding using opportunistic feeding and routing. IEEE Transactions on Parallel and Distributed Systems, 25(12), 3264–3273.CrossRef
16.
Zurück zum Zitat Vasilakos, A. V., et al. (2015). Information centric network: Research challenges and opportunities. Journal of Network and Computer Applications, 52, 1–10.CrossRef Vasilakos, A. V., et al. (2015). Information centric network: Research challenges and opportunities. Journal of Network and Computer Applications, 52, 1–10.CrossRef
17.
Zurück zum Zitat VinhHoa, L. A., & Cavalli, A. (2014). Security attacks and solutions in vehicular ad hoc networks: A survey. International Journal on AdHoc Networking Systems (IJANS), 4(2), 1–20.CrossRef VinhHoa, L. A., & Cavalli, A. (2014). Security attacks and solutions in vehicular ad hoc networks: A survey. International Journal on AdHoc Networking Systems (IJANS), 4(2), 1–20.CrossRef
18.
Zurück zum Zitat Reza Rahimi, M., et al. (2014). Mobile cloud computing: A survey, state of art and future directions. MONET, 19(2), 133–143. Reza Rahimi, M., et al. (2014). Mobile cloud computing: A survey, state of art and future directions. MONET, 19(2), 133–143.
19.
Zurück zum Zitat Yao, G., et al. (2015). Passive IP traceback: Disclosing the locations of IP spoofers from path backscatter. IEEE Transactions on Information Forensics and Security, 10(3), 471–484.MathSciNetCrossRef Yao, G., et al. (2015). Passive IP traceback: Disclosing the locations of IP spoofers from path backscatter. IEEE Transactions on Information Forensics and Security, 10(3), 471–484.MathSciNetCrossRef
20.
Zurück zum Zitat Liu, J., et al. (2016). Leveraging software-defined networking for security policy enforcement. Information Sciences, 327, 288–299.CrossRef Liu, J., et al. (2016). Leveraging software-defined networking for security policy enforcement. Information Sciences, 327, 288–299.CrossRef
21.
Zurück zum Zitat Kaur, M., Rajni, & Singh, P. (2013). An encryption algorithm to evaluate performance of V2V communication in VANET. International Journal on Cryptography and Information Security (IJCIS), 3(2), 15–22.CrossRef Kaur, M., Rajni, & Singh, P. (2013). An encryption algorithm to evaluate performance of V2V communication in VANET. International Journal on Cryptography and Information Security (IJCIS), 3(2), 15–22.CrossRef
22.
Zurück zum Zitat KadamMegha, V. (2012). Security analysis in VANETs: A survey. International Journal of Engineering Research & Technology (IJERT), 1(8), 1–6. (ISSN: 2278-0181). KadamMegha, V. (2012). Security analysis in VANETs: A survey. International Journal of Engineering Research & Technology (IJERT), 1(8), 1–6. (ISSN: 2278-0181).
23.
Zurück zum Zitat Kumaresan, G., & Adiline Macriga, T. (2014). Cluster based architecture for emergency message dissemination and collision avoidance in VANET. International Journal of Applied Engineering Research, 9(23), 22203–22220. Kumaresan, G., & Adiline Macriga, T. (2014). Cluster based architecture for emergency message dissemination and collision avoidance in VANET. International Journal of Applied Engineering Research, 9(23), 22203–22220.
24.
Zurück zum Zitat Lu, Y., Zhou, B., Jia, F., & Gerla, M. (2010) Group-based secure source authentication protocol for VANETs. In IEEE Globecom 2010 workshop on heterogeneous, multi-hop wireless and mobile networks (pp. 202–206). Lu, Y., Zhou, B., Jia, F., & Gerla, M. (2010) Group-based secure source authentication protocol for VANETs. In IEEE Globecom 2010 workshop on heterogeneous, multi-hop wireless and mobile networks (pp. 202–206).
25.
Zurück zum Zitat Hussain, R., Rezaeifar, Z., Kim, D., Tokuta, A. O., & Oh, H. (2014) On secure, privacy-aware, and efficient beacon broadcasting among one-hop neighbors in VANETs. In IEEE military communications conference (pp. 1427–1434). Hussain, R., Rezaeifar, Z., Kim, D., Tokuta, A. O., & Oh, H. (2014) On secure, privacy-aware, and efficient beacon broadcasting among one-hop neighbors in VANETs. In IEEE military communications conference (pp. 1427–1434).
26.
Zurück zum Zitat Horng, S.-J., Tzeng, S.-F., Pan, Y., Fan, P., Wang, X., Li, T., & Khan, M. K. (2013). b-SPECS+: Batch verification for secure pseudonymous authentication in VANET. IEEE Transactions on Information Forensics and Security, 8(11), 1860–1875.CrossRef Horng, S.-J., Tzeng, S.-F., Pan, Y., Fan, P., Wang, X., Li, T., & Khan, M. K. (2013). b-SPECS+: Batch verification for secure pseudonymous authentication in VANET. IEEE Transactions on Information Forensics and Security, 8(11), 1860–1875.CrossRef
27.
Zurück zum Zitat Ghaleb, F. A., Razzaque, M. A., & FauziIsnin, I. (2013) Security and privacy enhancement in VANETs using mobility pattern. In Fifth international conference on ubiquitous and future networks (ICUFN) (pp. 184–189) (ISSN: 2165-8528). Ghaleb, F. A., Razzaque, M. A., & FauziIsnin, I. (2013) Security and privacy enhancement in VANETs using mobility pattern. In Fifth international conference on ubiquitous and future networks (ICUFN) (pp. 184–189) (ISSN: 2165-8528).
Metadaten
Titel
Group Key Authentication scheme for Vanet INtrusion detection (GKAVIN)
verfasst von
G. Kumaresan
T. Adiline Macriga
Publikationsdatum
22.01.2016
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 3/2017
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-016-1197-z

Weitere Artikel der Ausgabe 3/2017

Wireless Networks 3/2017 Zur Ausgabe

Neuer Inhalt