ESAR: Enhanced Secure Authentication and Revocation Scheme for Vehicular Ad Hoc Networks

被引:0
|
作者
Coruh, Uğur [1 ]
Bayat, Oğuz [2 ]
机构
[1] Department of Computer Engineering, Recep Tayyip Erdogan University, Rize, Turkey
[2] Institute of Graduate Studies, Altinbas University, Istanbul, Turkey
关键词
Public key cryptography - Authentication - Vehicles - Anomaly detection - Sensitive data - Network security;
D O I
暂无
中图分类号
学科分类号
摘要
Vehicle Ad Hoc Network (VANET) systems that use Public Key Infrastructure (PKI) experience significant delays when checking Certificate Revocation Lists (CRLs) and performing key pair-based asymmetric cryptographic operations. This paper offers a fast and secure mechanism for revocation checking, processing and PKI key pair updating called the Enhanced Secure Authentication and Revocation (ESAR) scheme for VANETs. The ESAR Vehicle-To-Vehicle (V2V) authentication method applies Keyed-Hash-based Message Authentication Code (H-MAC) cryptogram validation for On-Board-Unit (OBU) revocation checks instead of the CRL search. We examined the ESAR together with a similar VANET scheme and achieved better results. We selected the Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks (EMAP), which, upon a review of the literature, was seen to offer fewer countermeasures to provide resistance to most attacks. In addition, we completed the missing parts of the EMAP scheme with performance improvements and we compared it with other schemes in terms of security. Our ESAR scheme includes the following improvements. (1) The unauthorized update protection of sensitive assets is handled by revocation key sender verification and revocation version validation. (2) Privacy concerns are addressed by the use of keyed trimmed H-MAC-based pseudo ID creation. (3) Reliable data transmission issues are resolved by including missing message identification tags. (4) Performance concerns are addressed by eliminating and combining network requests to offer fast security key revocation. We targeted system performance and durability and also attack resistance using anomaly detection improvements. We ran three simulations: the standard (using CRL only), the proposed (ESAR), and the existing (EMAP) methods. According to the findings of our simulation analysis, our proposed system was more efficient in terms of performance and network congestion than the other examined methods. © 2021
引用
收藏
相关论文
共 50 条
  • [21] A New Certificateless and Secure Authentication Scheme for Ad hoc Networks
    Shaghayegh Bakhtiari-Chehelcheshmeh
    Mehdi Hosseinzadeh
    Wireless Personal Communications, 2017, 94 : 2833 - 2851
  • [22] Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks
    Wu, Tsu-Yang
    Lee, Zhiyuan
    Yang, Lei
    Luo, Jia-Ning
    Tso, Raylin
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (07): : 6992 - 7020
  • [23] Efficient and Secure Certificateless Aggregate Signature-Based Authentication Scheme for Vehicular Ad Hoc Networks
    Thumbur, Gowri
    Rao, G. Srinivasa
    Reddy, P. Vasudeva
    Gayathri, N. B.
    Reddy, D. V. R. Koti
    Padmavathamma, M.
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (03) : 1908 - 1920
  • [24] On-siteDriverlD: A secure authentication scheme based on Spanish eID cards for vehicular ad hoc networks
    Sanchez-Garcia, J.
    Garcia-Campos, J. M.
    Reina, D. G.
    Toral, S. L.
    Barrero, F.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 64 : 50 - 60
  • [25] An Efficient Cross-Layer Authentication Scheme for Secure Communication in Vehicular Ad-Hoc Networks
    Shawky, Mahmoud A.
    Bottarelli, Mirko
    Epiphaniou, Gregory
    Karadimas, Petros
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (07) : 8738 - 8754
  • [26] Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks
    Tsu-Yang Wu
    Zhiyuan Lee
    Lei Yang
    Jia-Ning Luo
    Raylin Tso
    The Journal of Supercomputing, 2021, 77 : 6992 - 7020
  • [27] Quantum Identity Authentication Scheme of Vehicular Ad-Hoc Networks
    Chen, Zhiya
    Zhou, Kunlin
    Liao, Qin
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2019, 58 (01) : 40 - 57
  • [28] An Efficient Successive Authentication Scheme for Vehicular Ad-hoc Networks
    Saha, Sanjay
    Elahi, Md. Mamun
    Islam, Md. Mahfuzul
    Ahmed, Shabbir
    2017 20TH INTERNATIONAL CONFERENCE OF COMPUTER AND INFORMATION TECHNOLOGY (ICCIT), 2017,
  • [29] Traceable Anonymous Authentication Scheme for Vehicular Ad-hoc Networks
    Kim, Zeen
    Yim, Junhyun
    Kim, Jangseong
    Kim, Kwangjo
    Shon, Taeshik
    2011 NINTH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS WORKSHOPS (ISPAW), 2011, : 250 - 255
  • [30] Quantum Identity Authentication Scheme of Vehicular Ad-Hoc Networks
    Zhiya Chen
    Kunlin Zhou
    Qin Liao
    International Journal of Theoretical Physics, 2019, 58 : 40 - 57