Skip to main content
Erschienen in: Wireless Networks 2/2024

26.09.2023 | Original Paper

PKI-SMR: PKI based secure multipath routing for unmanned military vehicles (UMV) in VANETs

verfasst von: Pavan Kumar Pandey, Vineet Kansal, Abhishek Swaroop

Erschienen in: Wireless Networks | Ausgabe 2/2024

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Vehicular ad hoc networks (VANETs) are widely used in several Internet of Things (IoT) scenarios due to their unique characteristics which include quick and infrastructure less deployment. However, several challenges are associated with these characteristics such as highly mobile nodes, scalability issue, unreliable communication links, etc. The designing of secure and efficient routing is one of major research challenge in VANETs. In the current paper, multipath secured routing approach has been proposed for maintaining two most reliable and secured paths at the same time between source and destination vehicles. Using reactive routing principles multiple paths are derived between source and destination. Then, connection termination time (CTT) and path legitimacy index (PLI) are two parameters which are considered for selecting two best choices among all derived paths named Principal and Subordinate paths. Furthermore, discussed approach focuses on major security requirements such as confidentiality, privacy in communication and also prevents system from Blackhole and Wormhole attacks. The Public Key Infrastructure (PKI) based approach has been used to ensure security. The performance of the approach has been discussed and compared with other similar multipath approaches.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Basagni, S., Conti, M., & Giordano, S. (2013). Mobile Ad hoc networking: Cutting edge directions. Willey IEEE Press Publisher.CrossRef Basagni, S., Conti, M., & Giordano, S. (2013). Mobile Ad hoc networking: Cutting edge directions. Willey IEEE Press Publisher.CrossRef
2.
Zurück zum Zitat Bouchama, N., Aïssani, D., Djellab, N., & Nouali-Taboudjemat, N. (2019). A critical review of quality of service models in mobile ad hoc networks. International Journal of Ad Hoc and Ubiquitous Computing, 31(1), 49–70.CrossRef Bouchama, N., Aïssani, D., Djellab, N., & Nouali-Taboudjemat, N. (2019). A critical review of quality of service models in mobile ad hoc networks. International Journal of Ad Hoc and Ubiquitous Computing, 31(1), 49–70.CrossRef
3.
Zurück zum Zitat Tyagi, N., Rana, A., & Kansal, V. (2019). Creating elasticity with enhanced weighted optimization load balancing algorithm in cloud computing. In Amity International Conference on Artificial Intelligence (AICAI). IEEE Explore (pp. 600–604). Tyagi, N., Rana, A., & Kansal, V. (2019). Creating elasticity with enhanced weighted optimization load balancing algorithm in cloud computing. In Amity International Conference on Artificial Intelligence (AICAI). IEEE Explore (pp. 600–604).
4.
Zurück zum Zitat Liang, W., Li, Z., Zhang, H., Wang, S., & Bie, R. (2015). Vehicular ad hoc networks: architectures, research issues, methodologies, challenges, and trends. International Journal of Distributed Sensor Networks, 11(8), 745303.CrossRef Liang, W., Li, Z., Zhang, H., Wang, S., & Bie, R. (2015). Vehicular ad hoc networks: architectures, research issues, methodologies, challenges, and trends. International Journal of Distributed Sensor Networks, 11(8), 745303.CrossRef
5.
Zurück zum Zitat Khanna, A., Rodrigues, J. J. P. C., Gupta, N., Swaroop, A., Gupta, D., Saleem, K., & de Albuquerque, V. H. C. (2019). A mutual exclusion algorithm for flying Ad Hoc networks. Computers & Electrical Engineering, 76, 82–93.CrossRef Khanna, A., Rodrigues, J. J. P. C., Gupta, N., Swaroop, A., Gupta, D., Saleem, K., & de Albuquerque, V. H. C. (2019). A mutual exclusion algorithm for flying Ad Hoc networks. Computers & Electrical Engineering, 76, 82–93.CrossRef
6.
Zurück zum Zitat Tyagi, N., Rana, A., & Kansal, V. (2020). Load distribution challenges with virtual computing. In V. Solanki, M. Hoang, Z. Lu, & P. Pattnaik (Eds.), Intelligent computing in engineering, advances in intelligent systems and computing (Vol. 1125, pp. 51–56). Springer.CrossRef Tyagi, N., Rana, A., & Kansal, V. (2020). Load distribution challenges with virtual computing. In V. Solanki, M. Hoang, Z. Lu, & P. Pattnaik (Eds.), Intelligent computing in engineering, advances in intelligent systems and computing (Vol. 1125, pp. 51–56). Springer.CrossRef
7.
Zurück zum Zitat Pandey, P. K., Kansal, V., & Swaroop, A. (2020). Vehicular Ad Hoc networks (VANETs): Architecture, challenges, and applications. In U. Shanker & S. Pandey (Eds.), Handling priority inversion in time-constrained distributed databases hershey (pp. 224–239). IGI Global.CrossRef Pandey, P. K., Kansal, V., & Swaroop, A. (2020). Vehicular Ad Hoc networks (VANETs): Architecture, challenges, and applications. In U. Shanker & S. Pandey (Eds.), Handling priority inversion in time-constrained distributed databases hershey (pp. 224–239). IGI Global.CrossRef
8.
Zurück zum Zitat Varshney, S., Kumar, C., Swaroop, A., Khanna, A., Gupta, D., Rodrigues, J. J. P. C., Pinheiro, P. R., & De Albuquerque, V. H. C. (2018). Energy efficient management of pipelines in buildings using linear wireless sensor networks. Sensors, 18(8), 2618.ADSCrossRefPubMedPubMedCentral Varshney, S., Kumar, C., Swaroop, A., Khanna, A., Gupta, D., Rodrigues, J. J. P. C., Pinheiro, P. R., & De Albuquerque, V. H. C. (2018). Energy efficient management of pipelines in buildings using linear wireless sensor networks. Sensors, 18(8), 2618.ADSCrossRefPubMedPubMedCentral
9.
Zurück zum Zitat Gupta, S., Rana, A., Kansal, V. (2020). Optimization in wireless sensor network using soft computing. In Advances in intelligent systems and computing (Vol. 1090, pp. 801–810). Springer. Gupta, S., Rana, A., Kansal, V. (2020). Optimization in wireless sensor network using soft computing. In Advances in intelligent systems and computing (Vol. 1090, pp. 801–810). Springer.
10.
Zurück zum Zitat Boussoufa-Lahlah, S., Semchedine, F., & Bouallouche-Medjkoune, L. (2018). Geographic routing protocols for vehicular ad hoc networks (VANETs): A survey. Vehicular Communications, 11, 20–31.CrossRef Boussoufa-Lahlah, S., Semchedine, F., & Bouallouche-Medjkoune, L. (2018). Geographic routing protocols for vehicular ad hoc networks (VANETs): A survey. Vehicular Communications, 11, 20–31.CrossRef
11.
Zurück zum Zitat Hassan, Z., Mehmood, A., Maple, C., Khan, M. A., & Aldegheishem, A. (2020). Intelligent detection of black hole attacks for secure communication in autonomous and connected vehicles. IEEE Access, 8, 199618–199628.CrossRef Hassan, Z., Mehmood, A., Maple, C., Khan, M. A., & Aldegheishem, A. (2020). Intelligent detection of black hole attacks for secure communication in autonomous and connected vehicles. IEEE Access, 8, 199618–199628.CrossRef
12.
Zurück zum Zitat Makhlouf, A. M., & Guizani, M. (2019). “SE-AOMDV: Secure and efficient AOMDV routing protocol for vehicular communications. International Journal of Information Security, 18(5), 665–676.CrossRef Makhlouf, A. M., & Guizani, M. (2019). “SE-AOMDV: Secure and efficient AOMDV routing protocol for vehicular communications. International Journal of Information Security, 18(5), 665–676.CrossRef
13.
Zurück zum Zitat Altayeb, M., & Mahgoub, I. (2013). A survey of vehicular ad hoc networks routing protocols. International Journal of Innovation and Applied Studies, 3(3), 829–846. Altayeb, M., & Mahgoub, I. (2013). A survey of vehicular ad hoc networks routing protocols. International Journal of Innovation and Applied Studies, 3(3), 829–846.
14.
Zurück zum Zitat Pandey, P. K., Swaroop, A., & Kansal, V. (2019). A concise survey on recent routing protocols for vehicular ad hoc networks (VANETs). In International conference on computing, communication, and intelligent systems (ICCCIS) (pp. 188–193). Pandey, P. K., Swaroop, A., & Kansal, V. (2019). A concise survey on recent routing protocols for vehicular ad hoc networks (VANETs). In International conference on computing, communication, and intelligent systems (ICCCIS) (pp. 188–193).
15.
Zurück zum Zitat Tyagi, N., Rana, A., & Kansal, V. (2018). Resourceful system-level optimized placement of virtual machines for cloud computing. In 4th international conference on applied and theoretical computing and communication technology (iCATccT). IEEE Explore (pp. 99–102). Tyagi, N., Rana, A., & Kansal, V. (2018). Resourceful system-level optimized placement of virtual machines for cloud computing. In 4th international conference on applied and theoretical computing and communication technology (iCATccT). IEEE Explore (pp. 99–102).
16.
Zurück zum Zitat Dua, A., Kumar, N., & Bawa, S. (2014). A systematic review on routing protocols for Vehicular Ad Hoc Networks. Vehicular Communications, 1(1), 33–52.CrossRef Dua, A., Kumar, N., & Bawa, S. (2014). A systematic review on routing protocols for Vehicular Ad Hoc Networks. Vehicular Communications, 1(1), 33–52.CrossRef
17.
Zurück zum Zitat Johnson, D. B., & Maltz, D. A. (1996). Dynamic source routing in ad hoc wireless networks. In T. Imielinski & H. Korth (Eds.), Mobile computing, Ch. 5 (p. 353). Kluwer. Johnson, D. B., & Maltz, D. A. (1996). Dynamic source routing in ad hoc wireless networks. In T. Imielinski & H. Korth (Eds.), Mobile computing, Ch. 5 (p. 353). Kluwer.
18.
Zurück zum Zitat Osman, M. M. A., Syed-Yusof, S. K., Abd Malik, N. N. N., & Zubair, S. (2018). A survey of clustering algorithms for cognitive radio ad hoc networks. Wireless Network, 24, 1451–1475.CrossRef Osman, M. M. A., Syed-Yusof, S. K., Abd Malik, N. N. N., & Zubair, S. (2018). A survey of clustering algorithms for cognitive radio ad hoc networks. Wireless Network, 24, 1451–1475.CrossRef
19.
Zurück zum Zitat Pandey, P. K., Kansal, V., & Swaroop, A. (2021). IBRP: An infrastructure-based routing protocol using static clusters in urban VANETs. In A. Khanna, A. K. Singh, & A. Swaroop (Eds.), Recent studies on computational intelligence. Studies in computational intelligence. (Vol. 921). Springer. Pandey, P. K., Kansal, V., & Swaroop, A. (2021). IBRP: An infrastructure-based routing protocol using static clusters in urban VANETs. In A. Khanna, A. K. Singh, & A. Swaroop (Eds.), Recent studies on computational intelligence. Studies in computational intelligence. (Vol. 921). Springer.
20.
Zurück zum Zitat Baker, T., Garcia-Campos, J. M., Reina, D. G., Toral, S., Tawfik, H., Al-Jumeily, D., & Hussain, A. (2018). GreeAODV: An energy efficient routing protocol for vehicular ad hoc net-works. Intelligent Computing Methodologies, 10956, 670–681.CrossRef Baker, T., Garcia-Campos, J. M., Reina, D. G., Toral, S., Tawfik, H., Al-Jumeily, D., & Hussain, A. (2018). GreeAODV: An energy efficient routing protocol for vehicular ad hoc net-works. Intelligent Computing Methodologies, 10956, 670–681.CrossRef
21.
Zurück zum Zitat Marina, M. K., & Das, S. R. (2002). Ad hoc on-demand multipath distance vector routing. SIGMOBILE Mobile Computing and Communications, 6(3), 92–93.CrossRef Marina, M. K., & Das, S. R. (2002). Ad hoc on-demand multipath distance vector routing. SIGMOBILE Mobile Computing and Communications, 6(3), 92–93.CrossRef
22.
Zurück zum Zitat Abbas, F., Fan, P., & Khan, Z. (2018). A novel reliable low-latency multipath routing scheme for vehicular ad hoc networks. J Wireless Com Network, 296, 1–19. Abbas, F., Fan, P., & Khan, Z. (2018). A novel reliable low-latency multipath routing scheme for vehicular ad hoc networks. J Wireless Com Network, 296, 1–19.
23.
Zurück zum Zitat Mittal, S., Kaur, R., & Purohit, K. C. (2016). Enhancing the data transfer rate by creating alternative path for AODV routing protocol in VANET. In 2nd international conference on advances in computing, communication, & automation (ICACCA) (fall), Bareilly, (pp. 1–5). Mittal, S., Kaur, R., & Purohit, K. C. (2016). Enhancing the data transfer rate by creating alternative path for AODV routing protocol in VANET. In 2nd international conference on advances in computing, communication, & automation (ICACCA) (fall), Bareilly, (pp. 1–5).
24.
Zurück zum Zitat Tilwari, V., Maheswar, R., Jayarajan, P., et al. (2020). MCLMR: a multicriteria based multipath routing in the mobile ad hoc networks. Wireless Personal Communications, 112, 2461–2483.CrossRef Tilwari, V., Maheswar, R., Jayarajan, P., et al. (2020). MCLMR: a multicriteria based multipath routing in the mobile ad hoc networks. Wireless Personal Communications, 112, 2461–2483.CrossRef
25.
Zurück zum Zitat Pandey, P. K., Kansal, V., & Swaroop, A. (2021). ALMR: Alternate link based multipath reactive routing protocol for vehicular ad hoc networks (VANETs). Adhoc & Sensor Wireless Networks, 50, 27–53. Pandey, P. K., Kansal, V., & Swaroop, A. (2021). ALMR: Alternate link based multipath reactive routing protocol for vehicular ad hoc networks (VANETs). Adhoc & Sensor Wireless Networks, 50, 27–53.
26.
Zurück zum Zitat Mansour, A., Malik, K. M., Alkaff, A., & Kanaan, H. (2020). ALMS: Asymmetric lightweight centralized group key management protocol for VANETs. IEEE Transactions on Intelligent Transportation Systems, 22(3), 1663–1678.CrossRef Mansour, A., Malik, K. M., Alkaff, A., & Kanaan, H. (2020). ALMS: Asymmetric lightweight centralized group key management protocol for VANETs. IEEE Transactions on Intelligent Transportation Systems, 22(3), 1663–1678.CrossRef
27.
Zurück zum Zitat Xu, G., Li, X., Jiao, L., Wang, W., Liu, A., Su, C., & Cheng, X. (2020). BAGKD: a batch authentication and group key distribution protocol for vanets. IEEE Communications Magazine, 58(7), 35–41.CrossRef Xu, G., Li, X., Jiao, L., Wang, W., Liu, A., Su, C., & Cheng, X. (2020). BAGKD: a batch authentication and group key distribution protocol for vanets. IEEE Communications Magazine, 58(7), 35–41.CrossRef
28.
Zurück zum Zitat Shen, X., Huang, C., Pu, W., & Wang, D. (2022). A lightweight authentication with dynamic batch-based group key management using LSTM in VANET. Security and Communication Networks, 2022, Article ID 9779670. Shen, X., Huang, C., Pu, W., & Wang, D. (2022). A lightweight authentication with dynamic batch-based group key management using LSTM in VANET. Security and Communication Networks, 2022, Article ID 9779670.
29.
Zurück zum Zitat Kumar, A., Varadarajan, V., Kumar, A., Dadheech, P., Choudhary, S. S., Kumar, V. A., Veluvolu, K. C., & K. C. (2021). Black hole attack detection in vehicular ad-hoc network using secure AODV routing algorithm. Microprocessors and Microsystems, 80, 103.CrossRef Kumar, A., Varadarajan, V., Kumar, A., Dadheech, P., Choudhary, S. S., Kumar, V. A., Veluvolu, K. C., & K. C. (2021). Black hole attack detection in vehicular ad-hoc network using secure AODV routing algorithm. Microprocessors and Microsystems, 80, 103.CrossRef
30.
Zurück zum Zitat Gandhimathi, L., & Murugaboopathi, G. (2021). Mobile malicious node detection using mobile agent in cluster-based wireless sensor networks. Wireless Personal Communications, 117(2), 1209–1222.CrossRef Gandhimathi, L., & Murugaboopathi, G. (2021). Mobile malicious node detection using mobile agent in cluster-based wireless sensor networks. Wireless Personal Communications, 117(2), 1209–1222.CrossRef
31.
Zurück zum Zitat Dhanaraj, R. K., Islam, S. H., & Rajasekar, V. (2022). A cryptographic paradigm to detect and mitigate blackhole attack in VANET environments. Wireless Networks, 28, 3127–3142.CrossRef Dhanaraj, R. K., Islam, S. H., & Rajasekar, V. (2022). A cryptographic paradigm to detect and mitigate blackhole attack in VANET environments. Wireless Networks, 28, 3127–3142.CrossRef
32.
Zurück zum Zitat Pandey, P. K., Kansal, V., Swaroop, A. (2022). OCSR: Overlapped cluster-based scalable routing approach for vehicular ad hoc networks (VANETs). Wireless Communications and Mobile Computing, 2022, Article ID 1426815. Pandey, P. K., Kansal, V., Swaroop, A. (2022). OCSR: Overlapped cluster-based scalable routing approach for vehicular ad hoc networks (VANETs). Wireless Communications and Mobile Computing, 2022, Article ID 1426815.
33.
Zurück zum Zitat Thorncharoensri, P., Susilo, W., Chow, Y. (2022). Secure and efficient communication in VANETs using level-based access control. Wireless Communications and Mobile Computing, 2022, Article ID 8736531. Thorncharoensri, P., Susilo, W., Chow, Y. (2022). Secure and efficient communication in VANETs using level-based access control. Wireless Communications and Mobile Computing, 2022, Article ID 8736531.
Metadaten
Titel
PKI-SMR: PKI based secure multipath routing for unmanned military vehicles (UMV) in VANETs
verfasst von
Pavan Kumar Pandey
Vineet Kansal
Abhishek Swaroop
Publikationsdatum
26.09.2023
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 2/2024
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-023-03503-5

Weitere Artikel der Ausgabe 2/2024

Wireless Networks 2/2024 Zur Ausgabe

Neuer Inhalt