Skip to main content
Erschienen in: Wireless Networks 2/2018

29.07.2016

Trust based authentication technique for cluster based vehicular ad hoc networks (VANET)

verfasst von: R. Sugumar, A. Rengarajan, C. Jayakumar

Erschienen in: Wireless Networks | Ausgabe 2/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Since Vehicular ad hoc networks (VANETs) are vulnerable to various kinds of attacks, there is a need to fulfill the security requirements like message privacy, integrity, and authentication. The authentication technique is said to be efficient if it detects compromised nodes accurately with less complexity, reduced authentication delay, and keying overhead. In this paper, a trust-based authentication scheme for cluster-based VANETs is proposed. The vehicles are clustered, and the trust degree of each node is estimated. The trust degree is a combination of direct trust degree and indirect trust degree. Based on this estimated trust degree, cluster heads are selected. Then, each vehicle is monitored by a set of verifiers, and the messages are digitally signed by the sender and encrypted using a public/ private key as distributed by a trusted authority and decrypted by the destination. This verifies the identity of sender as well as receiver thus providing authentication to the scheme. By simulation results, we prove that the proposed technique provides high security with less overhead and delay.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Qin, H., Li, Z. Wang, Y., Lu, X., Zhang, W. S., & Wang, G. (2010). An integrated network of roadside sensors and vehicles for driving safety: Concept, design and experiments. In IEEE International Conference on Pervasive Computing and Communications (PerCom). Qin, H., Li, Z. Wang, Y., Lu, X., Zhang, W. S., & Wang, G. (2010). An integrated network of roadside sensors and vehicles for driving safety: Concept, design and experiments. In IEEE International Conference on Pervasive Computing and Communications (PerCom).
3.
Zurück zum Zitat Feng, W., Alshaer, H., & Elmirghani, J. M. H. (2010). Green information and communication technology: Energy efficiency in a motorway model. IET Communications, 4(7), 850–860.CrossRef Feng, W., Alshaer, H., & Elmirghani, J. M. H. (2010). Green information and communication technology: Energy efficiency in a motorway model. IET Communications, 4(7), 850–860.CrossRef
4.
Zurück zum Zitat Pradeep, B., Manohara Pai, M. M., Boussedjra, M., & Mouzna, J. (2009). Global public key algorithm for secure location service in VANET. In 9th International Conference on Intelligent Transport Systems Telecommunications, (ITST). Pradeep, B., Manohara Pai, M. M., Boussedjra, M., & Mouzna, J. (2009). Global public key algorithm for secure location service in VANET. In 9th International Conference on Intelligent Transport Systems Telecommunications, (ITST).
5.
Zurück zum Zitat Rivas, D. A., Barcelo-Ordinas, J. M., Zapata, M. G., & Morillo-Pozo, J. D. (2011). Security on VANETs: Privacy, misbehaving nodes, false information and secure data aggregation. Journal of Network and Computer Applications, 34(6), 1942–1955.CrossRef Rivas, D. A., Barcelo-Ordinas, J. M., Zapata, M. G., & Morillo-Pozo, J. D. (2011). Security on VANETs: Privacy, misbehaving nodes, false information and secure data aggregation. Journal of Network and Computer Applications, 34(6), 1942–1955.CrossRef
6.
Zurück zum Zitat Nayyar, Z., Khattak, M. A. K., Saqib, N. A., & Rafique, N. (2015). Secure clustering in vehicular ad hoc networks. International Journal of Advanced Computer Science and Applications (IJACSA), 6(9), 285–291. Nayyar, Z., Khattak, M. A. K., Saqib, N. A., & Rafique, N. (2015). Secure clustering in vehicular ad hoc networks. International Journal of Advanced Computer Science and Applications (IJACSA), 6(9), 285–291.
7.
Zurück zum Zitat Feng, W., & Elmirghani, J. M. H. (2009). Green ICT: Energy efficiency in a motorway model. In Third International Conference on Next Generation Mobile Applications, Services and Technologies. Feng, W., & Elmirghani, J. M. H. (2009). Green ICT: Energy efficiency in a motorway model. In Third International Conference on Next Generation Mobile Applications, Services and Technologies.
8.
Zurück zum Zitat Plößl, Klaus, & Federrath, Hannes. (2008). A privacy aware and efficient security infrastructure for vehicular ad hoc networks. Computer Standards and Interfaces, 30, 390–397.CrossRef Plößl, Klaus, & Federrath, Hannes. (2008). A privacy aware and efficient security infrastructure for vehicular ad hoc networks. Computer Standards and Interfaces, 30, 390–397.CrossRef
9.
Zurück zum Zitat Mokhtara, Bassem, & Azab, Mohamed. (2015). Survey on security issues in vehicular ad hoc networks. Alexandria Engineering Journal, 54(4), 1115–1126.CrossRef Mokhtara, Bassem, & Azab, Mohamed. (2015). Survey on security issues in vehicular ad hoc networks. Alexandria Engineering Journal, 54(4), 1115–1126.CrossRef
10.
Zurück zum Zitat Qian, Y., & Moayeri, N. (2008). Design secure and application-oriented VANET. In IEEE Vehicular Technology Conference, VTC Spring. Qian, Y., & Moayeri, N. (2008). Design secure and application-oriented VANET. In IEEE Vehicular Technology Conference, VTC Spring.
11.
Zurück zum Zitat Fathian, M., & Jafarian-Moghaddam, A. R. (2015). New clustering algorithms for vehicular ad-hoc network in a highway communication environment. Wireless Networks, 21(8), 2765–2780.CrossRef Fathian, M., & Jafarian-Moghaddam, A. R. (2015). New clustering algorithms for vehicular ad-hoc network in a highway communication environment. Wireless Networks, 21(8), 2765–2780.CrossRef
12.
Zurück zum Zitat Daeinabi, A., & Rahbar, A. G. (2013). An advanced security scheme based on clustering and key distribution in vehicular ad-hoc networks. Computers and Electrical Engineering. Daeinabi, A., & Rahbar, A. G. (2013). An advanced security scheme based on clustering and key distribution in vehicular ad-hoc networks. Computers and Electrical Engineering.
13.
Zurück zum Zitat Gañán, C., Muñoz, J. L., Esparza, O., Mata-Díaz, J., & Alins, J. (2014). PPREM: Privacy preserving REvocation mechanism for vehicular ad hoc networks. Computer Standards and Interfaces, 36, 513–523.CrossRef Gañán, C., Muñoz, J. L., Esparza, O., Mata-Díaz, J., & Alins, J. (2014). PPREM: Privacy preserving REvocation mechanism for vehicular ad hoc networks. Computer Standards and Interfaces, 36, 513–523.CrossRef
14.
Zurück zum Zitat Zhizhong, J., Chuanhe, H., Liya, X., Bo, W., Xi, C., & Xiying, F. (2012). A trusted opportunistic routing algorithm for VANET. In IEEE Third International Conference on In Networking and Distributed Computing (ICNDC), pp. 86–90. Zhizhong, J., Chuanhe, H., Liya, X., Bo, W., Xi, C., & Xiying, F. (2012). A trusted opportunistic routing algorithm for VANET. In IEEE Third International Conference on In Networking and Distributed Computing (ICNDC), pp. 86–90.
15.
Zurück zum Zitat Chen, T., Mehani, O., & Boreli, R. (2009). Trusted routing for VANET. In IEEE 9th International Conference on Intelligent Transport Systems Telecommunications, (ITST). Chen, T., Mehani, O., & Boreli, R. (2009). Trusted routing for VANET. In IEEE 9th International Conference on Intelligent Transport Systems Telecommunications, (ITST).
16.
Zurück zum Zitat Chim, T. W., Yiu, S. M., Hui, L. C. K., & Li, V. O. K. (2014). VSPN: VANET-based secure and privacy-preserving navigation. IEEE Transactions on Computers, 63(2), 1–14.MathSciNetCrossRef Chim, T. W., Yiu, S. M., Hui, L. C. K., & Li, V. O. K. (2014). VSPN: VANET-based secure and privacy-preserving navigation. IEEE Transactions on Computers, 63(2), 1–14.MathSciNetCrossRef
17.
Zurück zum Zitat Barba, C. T., Aguiar, L. U., Igartua, M. A., Parra-Arnau, J., Rebollo-Monedero, D., Forné, J., et al. (2013). A collaborative protocol for anonymous reporting in vehicular ad hoc networks. Computer Standards and Interfaces, 36, 188–197.CrossRef Barba, C. T., Aguiar, L. U., Igartua, M. A., Parra-Arnau, J., Rebollo-Monedero, D., Forné, J., et al. (2013). A collaborative protocol for anonymous reporting in vehicular ad hoc networks. Computer Standards and Interfaces, 36, 188–197.CrossRef
Metadaten
Titel
Trust based authentication technique for cluster based vehicular ad hoc networks (VANET)
verfasst von
R. Sugumar
A. Rengarajan
C. Jayakumar
Publikationsdatum
29.07.2016
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 2/2018
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-016-1336-6

Weitere Artikel der Ausgabe 2/2018

Wireless Networks 2/2018 Zur Ausgabe

Neuer Inhalt