An Efficient and Secure Authentication Approach in VANET using Location and Signature-Based Services

被引:1
|
作者
Muthumeenakshi, R. [1 ]
Balasubramanam, S. [2 ]
Singh, Charanjeet [3 ]
V. Sapkale, Pallavi [4 ]
Mukhedkar, Moresh M. [5 ]
机构
[1] PSNA Coll Engn & Technol, Kothandaraman Nagar, India
[2] Univ Kerala, Dept Futures Studies, Thiruvananthapuram, India
[3] Deenbandhu Chhotu Ram Univ Sci & Technol, Elect & Commun Dept, Murthal, India
[4] Dr DY Patil Univ Nerul, Ramrao Adik Inst Technol, Navi Mumbai, India
[5] SPPU Pune Univ, DY Patil Coll Engn, Dept Elect & Telecommun Engn, Pune, India
关键词
Authentication; encryption; location based services (LBS); roadside unit (RSU); vehicular Ad-hoc network (VANET); VEHICULAR COMMUNICATIONS; PRIVACY; SCHEME; PROTOCOL;
D O I
10.32908/ahswn.v53.8469
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, the intelligent Transportation System (ITS) has improved the safety of drivers and shared traffic information efficiently. However, privacy and security are the major concerns in vehicular ad hoc networks (VANET). Sharing of information without compromising the trusted third party (TTP) is the core concern in ITS. The location-based services (LBS) have significantly gained more benefits in tracking vehicle navigation. Authentication guarantees the effectiveness and unforgeability of LBS information. However, the location privacy of vehicle users may get affected due to the tracking of physical location. Hence, to deploy the LBS successfully, it is required to ensure the authentication mechanism in the vehicular network. Therefore, an efficient Location and Signaturebased authentication (LS-based authentication) method is developed to ensure the security and safety of the vehicle's location. Here, each vehicle in the network is authenticated based on the message and the current location information. Accordingly, the encryption and the decryption functions are employed to successfully encrypt and decrypt the LBS services. The encrypted messages are safely broadcasted to the neighbouring vehicles or RSU's based on the timestamp factor. The proposed method achieved a higher detection rate, minimum computational time, and lower memory usage of 0.815, 12.913s, and 0.104MB for 100 kb data size.
引用
收藏
页码:59 / 83
页数:25
相关论文
共 50 条
  • [41] SiSMA-SWMS: Signature-based Secure Monitoring Approach for Smart Waste Monitoring Systems
    Lama, Radhika
    Karmakar, Sandip
    SECURITY AND PRIVACY, 2024,
  • [42] Secure VANET Protocol using Hierarchical Pseudonyms with Blind Signature
    Agustina, Esti Rahmawati
    Hakim, Arif Rahman
    2017 11TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATION SYSTEMS SERVICES AND APPLICATIONS (TSSA), 2017,
  • [43] Efficient deniable authentication and its application in location-based services
    Ahene, Emmanuel
    Walker, Joojo
    Ali, Ikram
    Peasah, Kwame Ofosuhene
    Asante, Michael
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 100
  • [44] Signature-based approach to fair document exchange
    Shi, Q
    Zhang, N
    Merabti, M
    IEE PROCEEDINGS-COMMUNICATIONS, 2003, 150 (01): : 21 - 27
  • [45] Signature-based portfolio allocation: a network approach
    Gregnanin, Marco
    Zhang, Yanyi
    De Smedt, Johannes
    Gnecco, Giorgio
    Parton, Maurizio
    APPLIED NETWORK SCIENCE, 2024, 9 (01)
  • [46] Ring Signature-Based Conditional Privacy-Preserving Authentication in VANETs
    Mundhe, Pravin
    Yadav, Vijay Kumar
    Singh, Abhishek
    Verma, Shekhar
    Venkatesan, S.
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 114 (01) : 853 - 881
  • [47] A proxy signature-based handover authentication scheme for LTE wireless networks
    Qiu, Yue
    Ma, Maode
    Wang, Xilei
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 83 : 63 - 71
  • [48] Providing DoS Resistance for Signature-Based Broadcast Authentication in Sensor Networks
    Dong, Qi
    Liu, Donggang
    Ning, Peng
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2013, 12 (03)
  • [49] Feature selection for semi-fragile signature-based authentication systems
    Sun, QB
    He, DJ
    Zhou, ZC
    Ye, SM
    ITRE2003: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: RESEARCH AND EDUCATION, 2003, : 99 - 103
  • [50] Phase signature-based image authentication watermark robust to compression and coding
    Ahmed, F
    Moskowitz, IS
    MATHEMATICS OF DATA/IMAGE CODING, COMPRESSION, AND ENCRYPTION VII, WITH APPLICATIONS, 2004, 5561 : 133 - 144