Group Key Authentication scheme for Vanet INtrusion detection (GKAVIN)

Security must be provided in VANET as it is open to various attacks due to malicious vehicle, Brute force attack, misbehaving and faulty nodes, malicious users, and malicious nodes. The attacks can be occurred due to the lack of authentication. To overcome this problem, in this paper, we propose to develop a group key authentication and misbehaviour detection in VANET. Initially, we form clusters with three types of nodes within a certain transmission range namely Unique Node, Sub Unique Node, and Normal Node. Handshaking can be performed followed by message signing. The message is verified, and then group key is generated with subsequent key generation at each time slot. Finally, location information and time about vehicles can be used to detect malicious behaviours. Simulation results show that the proposed technique can achieve more packet delivery ratio with reduced delay, overhead, and packet drop.

[1]  Mario Gerla,et al.  Group-based secure source authentication protocol for VANETs , 2010, 2010 IEEE Globecom Workshops.

[2]  Athanasios V. Vasilakos,et al.  Mobile Cloud Computing: A Survey, State of Art and Future Directions , 2013, Mobile Networks and Applications.

[3]  Xiaolei Dong,et al.  Security and privacy for storage and computation in cloud computing , 2014, Inf. Sci..

[4]  Athanasios V. Vasilakos,et al.  Information centric network: Research challenges and opportunities , 2015, J. Netw. Comput. Appl..

[5]  Athanasios V. Vasilakos,et al.  Provably secure three-party authenticated key agreement protocol using smart cards , 2014, Comput. Networks.

[6]  Athanasios V. Vasilakos,et al.  A security and trust framework for virtualized networks and software-defined networking , 2016, Secur. Commun. Networks.

[7]  Mrs.Kadam Megha Security Analysis in VANETs: A Survey , 2012 .

[8]  Nanhay Singh,et al.  SECURITY CHALLENGES , ISSUES AND THEIR SOLUTIONS FOR VANET , 2013 .

[9]  Athanasios V. Vasilakos,et al.  Survey on channel reciprocity based key establishment techniques for wireless systems , 2015, Wirel. Networks.

[10]  Yen-Fu Liu,et al.  Secure Communication Scheme of VANET with Privacy Preserving , 2011, 2011 IEEE 17th International Conference on Parallel and Distributed Systems.

[11]  Athanasios V. Vasilakos,et al.  Reliable Multicast with Pipelined Network Coding Using Opportunistic Feeding and Routing , 2014, IEEE Transactions on Parallel and Distributed Systems.

[12]  Athanasios V. Vasilakos,et al.  DTRAB: Combating Against Attacks on Encrypted Protocols Through Traffic-Feature Analysis , 2010, IEEE/ACM Transactions on Networking.

[13]  Hassan Artail,et al.  REACT: Secure and efficient data acquisition in VANETs , 2011, 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[14]  Vinh Hoa La,et al.  SECURITY ATTACKS AND SOLUTIONS IN VEHICULAR AD HOC NETWORKS : A SURVEY , 2014 .

[15]  Ping Yu,et al.  Electronic Health Record , 2012, Encyclopedia of Gerontology and Population Aging.

[16]  Athanasios V. Vasilakos,et al.  Leveraging software-defined networking for security policy enforcement , 2016, Inf. Sci..

[17]  Parminder Singh,et al.  An Encryption Algorithm to Evaluate Performance of V2V Communication in Vanet , 2013 .

[18]  Athanasios V. Vasilakos,et al.  Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.

[19]  Gongjun Yan,et al.  Securing Vehicular Ad-hoc Networks Against Malicious Drivers: A Probabilistic Approach , 2011, 2011 International Conference on Complex, Intelligent, and Software Intensive Systems.

[20]  Athanasios V. Vasilakos,et al.  SecCloud: Bridging Secure Storage and Computation in Cloud , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops.

[21]  Kannikar Siriwong Na Ayutaya,et al.  A Novel Message Fabrication Detection for Beaconless Routing in VANETs , 2009, 2009 International Conference on Communication Software and Networks.

[22]  Prajwal Gaikwad,et al.  Passive IP Traceback: Disclosing the Locations of IP Spoofers from Path Backscatter , 2017 .

[23]  Athanasios V. Vasilakos,et al.  A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..

[24]  Pingzhi Fan,et al.  b-SPECS+: Batch Verification for Secure Pseudonymous Authentication in VANET , 2013, IEEE Transactions on Information Forensics and Security.

[25]  Donghyun Kim,et al.  On Secure , Privacy-aware , and Efficient Beacon Broadcasting among One-hop Neighbors in Vehicular Adhoc Networks , 2014 .

[26]  Fuad A. Ghaleb,et al.  Security and privacy enhancement in VANETs using mobility pattern , 2013, 2013 Fifth International Conference on Ubiquitous and Future Networks (ICUFN).

[27]  Madhavi Sinha,et al.  Overview on vehicular ad hoc network and its security issues , 2014, 2014 International Conference on Computing for Sustainable Global Development (INDIACom).