Improved Mutual Authentication in VANETs

被引:0
|
作者
Rekik, Malek [1 ]
Makhlouf, Amel [1 ]
Zarai, Faouzi [1 ]
Obaidat, Mohammad S. [2 ,3 ]
机构
[1] Univ Sfax, NTSCOM Res Unit, Sfax, Tunisia
[2] Nazarbayev Univ, ECE Dept, Astana, Kazakhstan
[3] Univ Jordan, King Abdullah II Sch Informat Technol, Amman, Jordan
关键词
VANET; security; authentification; quality of service; openssl; avispa; GROUP KEY MANAGEMENT; PROTOCOL; SECURITY; SCHEME; MODEL;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Vehicular ad hoc networks (VANETs) are a key of the intelligent transport system. In fact, these networks provide many interesting services such as exchanging live messages like road conditions, targeted location based advertisements, traffic congestion and weather conditions to enhance the driving comfort. However, these benefits have become threatening or even dangerous if they are not well secured in both communications V2V (vehicle to vehicle) and V2I (Vehicles to infrastructure). Moreover, as the security must be strong, it must not degrade the Quality of Service (QoS), especially with the raised speed of vehicles in VANETs, the addition of extra messages for security, which can be very critical in terms of QoS. Existing works on this topic presents some solutions to secure VANET communications. We mention the Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks. This solution is characterized by a good quality of service compared to other solutions, but it lacks a lot of security properties. In this work, we present an enhancement to this solution to obtain a strong security and maintain the good QoS at the same time. We establish a new authentication process and add a re-authentication process to ensure both better security properties and optimal authentication delay by optimizing the amount of information and the computational delay. Security analysis proves that our scheme is secure and the result of performance validation is promising.
引用
收藏
页码:63 / 85
页数:23
相关论文
共 50 条
  • [31] A Threshold Anonymous Authentication Protocol for VANETs
    Shao, Jun
    Lin, Xiaodong
    Lu, Rongxing
    Zuo, Cong
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (03) : 1711 - 1720
  • [32] A Cooperative Message Authentication Protocol in VANETs
    Hao, Yong
    Han, Tingting
    Cheng, Yu
    2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 5562 - 5566
  • [33] Highly efficient randomized authentication in VANETs
    Kang, Jian
    Lin, Dan
    Jiang, Wei
    Bertino, Elisa
    PERVASIVE AND MOBILE COMPUTING, 2018, 44 : 31 - 44
  • [34] A Novel Secure Authentication Scheme for VANETs
    Tiwari, Dinesh
    Bhushan, Mayank
    Yadav, Ankit
    Jain, Suman
    2016 SECOND INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE & COMMUNICATION TECHNOLOGY (CICT), 2016, : 287 - 297
  • [35] Improved authentication in vanets using a connected dominating set-based privacy preservation protocol
    Saravanan, M.
    Kumar, S. Manoj
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (12): : 14630 - 14651
  • [36] An Improved Cross-Layer Privacy-Preserving Authentication in WAVE-Enabled VANETs
    Tsai, Jia-Lun
    IEEE COMMUNICATIONS LETTERS, 2014, 18 (11) : 1931 - 1934
  • [37] Improved authentication in vanets using a connected dominating set-based privacy preservation protocol
    M. Saravanan
    S. Manoj kumar
    The Journal of Supercomputing, 2021, 77 : 14630 - 14651
  • [38] Mutual Chip Authentication
    Hanzlik, Lucjan
    Kluczniak, Kamil
    Krzywiecki, Lukasz
    Kutylowski, Miroslaw
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1683 - 1689
  • [39] Fair Mutual Authentication
    Cichon, Jacek
    Majcher, Krzysztof
    Kutylowski, Miroslaw
    SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 754 - 759
  • [40] An improved mutual authentication and ownership transfer for low-cost RFID systems
    Liu, Yi
    International Journal of Advancements in Computing Technology, 2012, 4 (13) : 200 - 207