Improved authentication in vanets using a connected dominating set-based privacy preservation protocol

被引:0
|
作者
M. Saravanan
S. Manoj kumar
机构
[1] KPR Institute of Engineering and Technology,Computer Science and Engineering
[2] Karpagam College of Engineering,Information Technology
[3] Tamil Nadu,undefined
来源
关键词
VANET; Markov positioning-based security algorithm; Malicious node attacks;
D O I
暂无
中图分类号
学科分类号
摘要
Vehicular ad hoc networks (VANETs) provide real-time communication between vehicle units for comfortable and safe driving. VANETs are driven by the concept of broadcasting messages to other vehicle units. These messages are disseminated to other vehicles with proper security assurances that ensure authentication. In this paper, an authentication model for securing communications by authenticating vehicles in VANETs is developed, and an ECC algorithm is provided for the authentication of vehicles. Since the nodes are mobile in nature and clustered into zones, a connected dominating set-based privacy preservation (CDSPP) and routing algorithm is proposed to effectively route the packets between the authenticated vehicles. A results analysis shows that the proposed method is better than existing approaches in terms of authenticating vehicles and strictly avoids intrusions in the system. A simulation is carried out with NS 2.34 to evaluate the proposed method. The performance of the proposed method is tested with respect to various metrics, including the packet delivery ratio, latency, average routing overhead, and complexity of signature verification. The proposed CDSPP approach is compared with conventional authentication methods, including CPPA and EIBS. The result shows that the proposed CDSPP method achieves an improved packet delivery ratio and reduces the latency, average routing overhead, and signature complexity compared to those of CPPA and EIBS.
引用
收藏
页码:14630 / 14651
页数:21
相关论文
共 50 条
  • [31] Privacy-Preserving Authentication Based on PUF for VANETs
    Li, Lihui
    Deng, Hanwen
    Zhai, Zhongyi
    Peng, Sheng-Lung
    Future Internet, 2024, 16 (09):
  • [32] An Efficient Conditional Privacy-Preserving Authentication Protocol Based on Generalized Ring Signcryption for VANETs
    Luo, Ming
    Zhou, Yanzibo
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 71 (09) : 10001 - 10015
  • [33] Distributed Adaptive Connected Dominating Set Protocol for Sensor Networks
    Gupta, Arun Kumar
    Srivastava, Sanjay
    Murugan, Sunitha
    2014 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2014,
  • [34] Automatic authentication using rough set-based technique and fuzzy decision
    陈宁
    冯博琴
    王海笑
    张浩
    Journal of Harbin Institute of Technology(New series), 2009, (02) : 247 - 250
  • [35] A Navigation Route based Minimum Dominating Set Algorithm in VANETs
    Cao, Hui
    Wu, Weigang
    Chen, Yishun
    2014 INTERNATIONAL CONFERENCE ON SMART COMPUTING WORKSHOPS (SMARTCOMP WORKSHOPS), 2014, : 69 - 74
  • [36] An Improved RFID Authentication Protocol with Privacy Protection Based on Chaotic Maps
    Zhu, Hongfeng
    Zhang, Yan
    JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (06): : 1777 - 1787
  • [37] Minimum dominating set-based methods for analyzing biological networks
    Nacher, Jose C.
    Akutsu, Tatsuya
    METHODS, 2016, 102 : 57 - 63
  • [38] A Dominating Set-Based Sleep Scheduling in Energy Harvesting WBANs
    Zhang, Rongrong
    Yu, Jihong
    Guan, Yong
    Liu, Jiangchuan
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (11) : 11923 - 11934
  • [39] Dominating set-based test prioritization algorithms for regression testing
    Demir, Zafer Can
    Emrah Amrahov, Sahin
    SOFT COMPUTING, 2022, 26 (17) : 8203 - 8220
  • [40] Improved linear problem kernel for planar connected dominating set
    Luo, Weizhong
    Wang, Jianxin
    Feng, Qilong
    Guo, Jiong
    Chen, Jianer
    THEORETICAL COMPUTER SCIENCE, 2013, 511 : 2 - 12