Design of authentication protocol for wireless sensor network-based smart vehicular system

Abstract The design of authentication protocol for a smart vehicle system is proposed, where vehicles are equipped with sensors and the sinks are placed along the road to receive and/or send data to sensors. The user monitors the vehicles by collecting data from sinks and performs analysis of the data by taking necessary action (if needed). Moreover, the system is using sensors in vehicles to provide a user-friendly platform to communicate with users. Now, the exchange of authentication message between authenticated entities are two important issues for successful implementation of a smart vehicular system. In the proposed vehicular system, there are three entities involve namely users, sink and sensor. In the same architecture, there is two set of communication between user to sink and sink to sensor are needed. In short, we have proposed an architecture of data traffic/movement in vehicular sensor network and authenticate the entities. In addition, we have analyzed our protocol with respect to security attacks and found that it is strongly protected against security attacks. Furthermore, the proposed protocol is relatively better in terms of overhead such as computation and communication.

[1]  Barbara M. Masini,et al.  IEEE 802.11p for cellular offloading in vehicular sensor networks , 2015, Comput. Commun..

[2]  Víctor P. Gil Jiménez,et al.  Simple Design of Wireless Sensor Networks for Traffic Jams Avoidance , 2015, J. Sensors.

[3]  Panagiotis Papadimitratos,et al.  SECURING VEHICULAR COMMUNICATIONS , 2006, IEEE Wireless Communications.

[4]  Jaime Lloret,et al.  Oceanographic Multisensor Buoy Based on Low Cost Sensors for Posidonia Meadows Monitoring in Mediterranean Sea , 2015, J. Sensors.

[5]  Cristina Alcaraz,et al.  Key management systems for sensor networks in the context of the Internet of Things , 2011, Comput. Electr. Eng..

[6]  Hsin-Wen Wei,et al.  A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2011, Sensors.

[7]  Wei-Kuan Shih,et al.  A Robust Mutual Authentication Protocol for Wireless Sensor Networks , 2010 .

[8]  Muhammad Khurram Khan,et al.  A robust and anonymous patient monitoring system using wireless medical sensor networks , 2018, Future Gener. Comput. Syst..

[9]  Pin-Han Ho,et al.  RAISE: An Efficient RSU-Aided Message Authentication Scheme in Vehicular Communication Networks , 2008, 2008 IEEE International Conference on Communications.

[10]  Peng Gong,et al.  A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2013, Int. J. Distributed Sens. Networks.

[11]  Hoon-Jae Lee,et al.  Cryptanalysis on two user authentication protocols using smart card for wireless sensor networks , 2011, 2011 Wireless Advanced.

[12]  Marko Hölbl,et al.  A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion , 2014, Ad Hoc Networks.

[13]  Muhammad Khurram Khan,et al.  Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’ , 2010, Sensors.

[14]  Peilin Hong,et al.  A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks , 2013, J. Netw. Comput. Appl..

[15]  H. T. Mouftah,et al.  Improved two-factor user authentication in wireless sensor networks , 2010, 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications.

[16]  Manik Lal Das,et al.  Two-factor user authentication in wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.

[17]  Jiannong Cao,et al.  A dynamic user authentication scheme for wireless sensor networks , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).

[18]  Pin-Han Ho,et al.  ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[19]  Ruhul Amin,et al.  A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks , 2016, Ad Hoc Networks.

[20]  Eun-Jun Yoon,et al.  Cryptanalysis of robust mutual authentication protocol for wireless sensor networks , 2011, IEEE 10th International Conference on Cognitive Informatics and Cognitive Computing (ICCI-CC'11).

[21]  Donghoon Lee,et al.  Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2014, Sensors.

[22]  Moe Z. Win,et al.  Wireless Network Intrinsic Secrecy , 2015, IEEE/ACM Transactions on Networking.

[23]  Kakali Chatterjee,et al.  A Secure and Efficient Authentication Protocol in Wireless Sensor Network , 2015, Wirel. Pers. Commun..

[24]  Daniel Gutiérrez-Reina,et al.  On-siteDriverID: A secure authentication scheme based on Spanish eID cards for vehicular ad hoc networks , 2016, Future Gener. Comput. Syst..

[25]  Chin-Chen Chang,et al.  A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks , 2016, Wirel. Pers. Commun..

[26]  Rajesh Kannan Megalingam,et al.  Wireless Sensor Network for Vehicle Speed Monitoring and Traffic Routing System , 2010, 2010 International Conference on Mechanical and Electrical Technology.

[27]  Lixiang Li,et al.  An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks , 2016, Sensors.

[28]  Hari Om,et al.  Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines , 2016, Comput. Networks.

[29]  Cheng-Chi Lee,et al.  Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks , 2013, Multimedia Systems.