A low computation message delivery and authentication VANET protocol

In vehicular ad hoc networks (VANET), in order to preserve the real identity of message sender from attackers, message authenticity and integrity verification should be performed swiftly. Reducing the computations and communication overhead is highly needed. The proposed protocol focuses on reducing the computation required for the road side communication V2I without affecting the security level. The proposed low computational protocol generates and exchanges symmetric key in the public channel without using Diffie-Hellman protocol in hybrid with using low computation RSA that uses Chinese Remainder Theorem (CRT-RSA) instead of using traditional RSA. The simulation experiments show that the proposed protocol decreases the computational overhead significantly with 90.6% compared to other developed protocols. Also, hypothesis of the different security requirements for the safety messages versus the non-safety (entertainment) messages is examined.

[1]  Mahmood Fathy,et al.  Vehicular Ad Hoc Networks: Current Issues and Future Challenges , 2011, AdHocNets 2011.

[2]  Shih-Wei Huang,et al.  Strongly Privacy-Preserving Communication Protocol for VANETs , 2014, 2014 Ninth Asia Joint Conference on Information Security.

[3]  Kishwer Abdul Khaliq,et al.  VANET Security Analysis on the Basis of Attacks in Authentication , 2016, LDIC.

[4]  Mohamed Hamdi,et al.  A new group Diffie-Hellman key generation proposal for secure VANET communications , 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[5]  Panagiotis Papadimitratos,et al.  SECURING VEHICULAR COMMUNICATIONS , 2006, IEEE Wireless Communications.

[6]  M. Milton Joe,et al.  Review of vehicular ad hoc network communication models including WVANET (Web VANET) model and WVANET future research directions , 2016, Wirel. Networks.

[7]  P. Mohan Kumar,et al.  Vehicular Ad Hoc Networks (VANET): Architectures, methodologies and design issues , 2016, 2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM).

[8]  Abdelhamid Mellouk,et al.  Bio‐Inspired Routing Protocols for VANETs , 2014 .

[9]  Shahnawaj Khan Region Authority ( RA ) Collaborated Certificate Organization and Management in VANET , 2014 .

[10]  D. Manivannan,et al.  RIVER: A reliable inter-vehicular routing protocol for vehicular ad hoc networks , 2012, Comput. Networks.

[11]  Nilesh Patel,et al.  Signal Strength Based Route Selection in MANETs , 2012 .

[12]  S. Godse,et al.  VANET : A Survey on Secure Routing , 2015 .

[13]  Yonghong Chen,et al.  A novel secure message delivery and authentication method for vehicular ad hoc networks , 2016, 2016 First IEEE International Conference on Computer Communication and the Internet (ICCCI).

[14]  R. Mollin RSA and Public-Key Cryptography , 2002 .

[15]  A. Kondracki,et al.  The Chinese Remainder Theorem , 2019, Certain Number-Theoretic Episodes in Algebra.

[16]  Hussein Zedan,et al.  A comprehensive survey on vehicular Ad Hoc network , 2014, J. Netw. Comput. Appl..

[17]  Mahamod Ismail,et al.  Vehicular communication ad hoc routing protocols: A survey , 2014, J. Netw. Comput. Appl..

[18]  Brijesh Kumar Chaurasia,et al.  Infrastructure based Authentication in VANETs , 2011 .

[19]  Sudip Misra,et al.  Security in Vehicular Ad Hoc Networks , 2016 .

[20]  Huirong Fu,et al.  Privacy-by-Decoy: Protecting location privacy against collusion and deanonymization in vehicular location based services , 2014, 2014 IEEE Intelligent Vehicles Symposium Proceedings.

[21]  Pin-Han Ho,et al.  GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.

[22]  Jian Shen,et al.  EIAS-CP: new efficient identity-based authentication scheme with conditional privacy-preserving for VANETs , 2016, Telecommunication Systems.

[23]  Sunilkumar S. Manvi,et al.  A survey on authentication schemes in VANETs for secured communication , 2017, Veh. Commun..

[24]  Amir Hossein Jahangir,et al.  Analysis of TESLA protocol in vehicular ad hoc networks using timed colored Petri nets , 2015, 2015 6th International Conference on Information and Communication Systems (ICICS).

[25]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[26]  Kenneth P. Laberteaux,et al.  STRONG VANET SECURITY ON A BUDGET , 2006 .

[27]  G. Shanmugasundaram,et al.  A Multilevel Clustering Using Multi-hop and Multihead in VANET , 2017 .

[29]  D. Manivannan,et al.  An efficient protocol for authenticated and secure message delivery in vehicular ad hoc networks , 2016, Veh. Commun..

[30]  S. Supriya,et al.  EFFICIENT PRIVACY PRESERVING AUTHENTICATION FOR VEHICULAR AD-HOC NETWORKS , 2015 .

[31]  Prashant Johri,et al.  Security Challenges, Authentication, Application and Trust Models for Vehicular Ad Hoc Network- A Survey , 2017 .