DAKAA: Double Authentication and Key Agreement Algorithm for securing Vehicular Ad hoc Networks

Vehicular ad hoc network plays a vital role in communication paradigm that aims to provide innovative services. Vehicle-to-Vehicle communication is a realistic wireless transmission between the vehicles, which needs security services for safety communication. Priority-based authentication and fuzzy-based techniques are used to ensure the authentication process in existing works. Even though, some attack can break the authentication process such as brute force attack and private keys can also be hacked. Hence, the proposed scheme uses double authentication and key agreement algorithm (DAKAA) to prevent the unauthorized users or vehicles entering into the system to provide largest and competent private key using RSA cryptosystem in order to avert brute force attacks. The performance of DAKAA was compared with the existing schemes concerning verification delay, transmission overhead and service response time. DAKAA achieves better results due to prior detection of malicious vehicles for effective safety communication.

[1]  Shirisha Tallapally,et al.  Security enhancement on Simple Three Party PAKE Protocol , 2012, Inf. Technol. Control..

[2]  Pandi Vijayakumar,et al.  Comprehensive survey on security services in vehicular ad-hoc networks , 2016 .

[3]  E. A. Mary Anita,et al.  A survey on authentication schemes of VANETs , 2016, 2016 International Conference on Information Communication and Embedded Systems (ICICES).

[4]  T. R. Reshmi,et al.  Extended 3PAKE authentication scheme for value-added services in VANETs , 2017, Comput. Electr. Eng..

[5]  P. Mahapatra,et al.  A Survey on Identity Based Batch Verification Scheme for Privacy and Security in VANET , 2016 .

[6]  Hung-Yu Chien,et al.  ABAKA: An Anonymous Batch Authenticated and Key Agreement Scheme for Value-Added Services in Vehicular Ad Hoc Networks , 2011, IEEE Transactions on Vehicular Technology.

[7]  Wenjia Li,et al.  ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.

[8]  Sunilkumar S. Manvi,et al.  A survey: Comparative study of applications, attacks, security and privacy in VANETs , 2016, 2016 International Conference on Communication and Signal Processing (ICCSP).

[9]  Bidi Ying,et al.  Anonymous and Lightweight Authentication for Secure Vehicular Networks , 2017, IEEE Transactions on Vehicular Technology.

[10]  Arputharaj Kannan,et al.  Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.

[11]  Liehuang Zhu,et al.  2FLIP: A Two-Factor Lightweight Privacy-Preserving Authentication Scheme for VANET , 2016, IEEE Transactions on Vehicular Technology.

[12]  Mosa Ali Abu-Rgheff,et al.  An Efficient and Lightweight Intrusion Detection Mechanism for Service-Oriented Vehicular Networks , 2014, IEEE Internet of Things Journal.