Secure and Efficient Honey List-Based Authentication Protocol for Vehicular Ad Hoc Networks

被引:39
|
作者
Lee, JoonYoung [1 ]
Kim, GeonHwan [1 ]
Das, Ashok Kumar [2 ]
Park, YoungHo [1 ]
机构
[1] Kyungpook Natl Univ, Sch Elect & Elect Engn, Daegu 41566, South Korea
[2] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
基金
新加坡国家研究基金会;
关键词
Protocols; Authentication; Security; Vehicular ad hoc networks; Wireless communication; Password; Smart cities; Internet of Vehicles (IoV); communication; security; mutual authentication; AVISPA; ROR model; Honey list; KEY MANAGEMENT PROTOCOL; USER AUTHENTICATION; AGREEMENT SCHEME; INTERNET; CHALLENGES; DESIGN;
D O I
10.1109/TNSE.2021.3093435
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Vehicular Ad Hoc Network (VANET) and Internet of Vehicle (IoV) technologies are particularly attracting attention from industrial communities because of the intelligent transportation systems of smart city technologies. Vehicle-to-vehicle (V2V) communication of VANET can guarantee traffic system management and road safety. However, V2V communication cannot manage many vehicles as a whole, so it needs to be segmented and communicated by region. Therefore, considering locality, key agreement is made for V2V communication of the same or different regions. Moreover, traditional public key infrastructure (PKI) and Kerberos systems to be applied in a real environment incur computational overhead. Therefore, we proposed a lightweight protocol for dynamic properties of vehicles for regional segmentation management and overhead resolution. In addition, because vehicle information is transmitted through public channels, our protocol uses mutual authentication and honey_list technology to ensure security against a variety of attacks. It provides verification of safety through a detailed security analysis using the formal analysis using the widely-accepted Real-Or-Random (ROR) model, and verifies formal security using the Automated Validation of Internet Security Protocols and Applications (AVISPA) software tool and non-mathematical (informal) security analysis. In addition, a detailed comparative study that the proposed scheme can be applied in the communication environment between actual vehicles as compared to other existing competing schemes.
引用
收藏
页码:2412 / 2425
页数:14
相关论文
共 50 条
  • [1] A Secure and Efficient Authentication Technique for Vehicular Ad-Hoc Networks
    Asaar, Maryam Rajabzadeh
    Salmasizadeh, Mahmoud
    Susilo, Willy
    Majidi, Akbar
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (06) : 5409 - 5423
  • [2] A Provably Secure Authentication and Key Exchange Protocol in Vehicular Ad Hoc Networks
    Wu, Tsu-Yang
    Lee, Zhiyuan
    Yang, Lei
    Chen, Chien-Ming
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [3] Secure and efficient cache-based authentication scheme for vehicular ad-hoc networks
    Pankaj Kumar
    Hari Om
    [J]. Wireless Networks, 2022, 28 : 2821 - 2836
  • [4] Secure and efficient cache-based authentication scheme for vehicular ad-hoc networks
    Kumar, Pankaj
    Om, Hari
    [J]. WIRELESS NETWORKS, 2022, 28 (07) : 2821 - 2836
  • [5] An efficient protocol for authenticated and secure message delivery in vehicular ad hoc networks
    Lim, Kiho
    Manivannan, D.
    [J]. VEHICULAR COMMUNICATIONS, 2016, 4 : 30 - 37
  • [6] An Optimized and Secure Authentication Scheme for Vehicular Ad Hoc Networks
    Rekik, M.
    Obaidat, Mohammad S.
    Makhlouf, A.
    Zarai, F.
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [7] An efficient anonymity message authentication with backward secure revocation for vehicular ad hoc networks
    Liu, Xue-Feng
    Zhang, Yu-Qing
    Wang, He
    Zhang, Guang-Hua
    [J]. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2014, 36 (01): : 94 - 100
  • [8] Efficient and Secure Certificateless Aggregate Signature-Based Authentication Scheme for Vehicular Ad Hoc Networks
    Thumbur, Gowri
    Rao, G. Srinivasa
    Reddy, P. Vasudeva
    Gayathri, N. B.
    Reddy, D. V. R. Koti
    Padmavathamma, M.
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (03) : 1908 - 1920
  • [9] UGSP: Authentication based secure protocol for ad-hoc networks
    Arora, Neelima
    Shyamasundar, R. K.
    [J]. E-BUSINESS AND TELECOMMUNICATION NETWORKS, 2006, : 233 - +
  • [10] SARP: secure routing protocol using anonymous authentication in vehicular Ad-hoc networks
    Yelure, Bhushan
    Sonavane, Shefali
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 14 (4) : 3567 - 3581