Skip to main content
Log in

Secure and distributed certification system architecture for safety message authentication in VANET

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

Vehicular Ad hoc NETworks (VANETs) are a burgeoning research focus, aimed at creating communication among vehicles to improve the road safety and enhance driving conditions. For such networks, security is one of the most challenging issues due to their nature of wireless transmission and high topology changing frequency. In this paper, we propose a secure and distributed certification system architecture for safety message authentication in VANET, which resists against false public-key certification. To increase the availability of the authentication service, our proposal is designed through a decentralized system, supervised by a root authority. The latter authority delegates to a set of regional certification authorities the privilege of issuing public-key certificates to the vehicles. Each regional certification authority cooperates with its subordinates RSUs to sign public-key certificates using threshold signature. The main purpose of our solution is to ensure the messages authentication while respecting the imposed constraints by the real-time aspect and the nodes mobility. We demonstrate through the practical analysis and simulation results the efficiency of our solution with comparison to other concurrent protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Al-Sultan, S., Al-Doori, M. M., Al-Bayatti, A. H., & Zedan, H. (2013). A comprehensive survey on vehicular ad hoc network. Journal of Network and Computer Applications, 37, 380–392.

    Article  Google Scholar 

  2. Engoulou, R. G., Bellaïche, M., Pierre, S., & Quintero, A. (2014). VANET security surveys. Computer Communications, 44, 1–13.

    Article  Google Scholar 

  3. Mejri, M. N., Ben-Othman, J., & Hamdi, M. (2014). Survey on VANET security challenges and possible cryptographic solutions. Vehicular Communication, 1(2), 53–66.

    Article  Google Scholar 

  4. Yun, W., & Dianjun, L. (2012). An efficient threshold signature scheme based on the elliptic curve cryptosystem. In International conference on computer science and electronics engineering.

  5. Karati, S., Das, A., Roychowdhury, D., Bellur, B., Bhattacharya, D., & Iyer, A. (2014). New algorithms for batch verification of standard ECDSA signatures. Journal of Cryptographic Engineering, 4(4), 237–258.

    Article  Google Scholar 

  6. Park, Y., Sur, C., Jung, C. D., & Rhee, K. H. (2010). An efficient anonymous authentication protocol for secure vehicular communication. Journal of Information Science and Engineering, 26, 785–800.

    Google Scholar 

  7. Jung, C. D., Sur, C., Park, Y., & Rhee, K. H. (2009). A robust and efficient anonymous authentication protocol in VANETs. Journal of Communication and Networks, 11(6), 607–614.

    Article  Google Scholar 

  8. Lu, R., Lin, X., Zhu, H., Ho, P. H., & Shen, X. (2008). ECPP: Efficient conditional privacy preservation protocol for secure vehicular communication. In Proceedings of IEEE Infocom.

  9. Grover, J., Gaur, M. S., Laxmi, V., & Prajapati, N. K. (2011). A Sybil attack detection approach using neighboring vehicles in VANET. In International conference on security of information and networks

  10. Huang, D., Misra, S., Verma, M., & Xue, G. (2011). PACP: An efficient pseudonymous authentication-based conditional privacy protocol for VANETs. IEEE Transactions on Intelligent Transportation Systems, 12(3), 736–746.

    Article  Google Scholar 

  11. Chim, T. W., Yiu, S. M., Hui, L. C. K., & Li, V. O. K. (2009). Security and privacy issues for inter-vehicle communication in VANETs. In Proceedings of 6th Lnnual IEEE communication society conference on SECON workshops.

  12. Verma, K., Hasbullah, H., & Kumar, A. (2013). Prevention of DoS attacks in VANET. Wireless Personal Communications, 73(1), 95–126.

    Article  Google Scholar 

  13. Azogu, I. K., Ferreira, M. T., Larcom, J. A., & Liu, H. (2013). A new anti-jamming strategy for VANET metrics-directed security defense. In International Conference—Globecom—Vehicular netwok evolution.

  14. Karumanchi, S., Squicciarini, A., & Lin, D. (2012). Selective and confidential message exchange in vehicular ad hoc networks. Chapter Book on Network and System Security of the Series Lecture Notes in Computer Science, 7645, 445–461.

    Google Scholar 

  15. Farooq, M. U., Pasha, M., Khan, K. U. R., & Atif, M. U. H. (2012). An advanced security and data integrity protocol for vehicular ad-hoc networks. Advanced Materials Research, 403–408, 994–1001.

    Google Scholar 

  16. Li, J., Lu, H., & Guizani, M. (2015). ACPN: A novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs. IEEE Transactions on Parallel and Distributed Systems, 26(4), 938–948.

    Article  Google Scholar 

  17. Boneh, D., & Shacham, H. (2004). Group signatures with verifier-local revocation. In Proceedings of the 11th ACM conference on computer and communication security.

  18. Golle, P., Jakobsson, M., Juels, A., & Syverson, P. (2004). Universal reencryption for mixnets. In Proceedings of CT-RSA. Lecture notes in computer science (Vol. 2964).

  19. Maurer, U. M., & Yacobi, Y. (1996). A non-interactive public-key distribution system. Designs, Codes, and Cryptography, 9(3), 305–316.

    Google Scholar 

  20. Wasef, A., & Shen, X. S. (2009). ASIC: Aggregate signatures and certificates verification scheme for vehicular networks. In Global telecommunication conference.

  21. Wasef, A., & Shen, X. (2013). EMAP: Expedite message authentication protocol for vehicular ad hoc networks. IEEE Transactions on Mobile Computing, 12(1), 78–89.

    Article  Google Scholar 

  22. Vijayalakshmi, V., Sathya, M., Saranya, S., & Selvaroopini, C. (2014). Survey on various mechanisms for Secure and Efficient VANET communication. In International conference on information communication and embedded systems.

  23. Ying, B., Makrakis, D., & Mouftah, H. T. (2012). Privacy preserving broadcast message authentication protocol for VANETs. Journal of Network and Computer Applications, 36(5), 1352–1364.

    Article  Google Scholar 

  24. Hu, C., Chim, T. W., Yiu, S. M., Hui, L. C. K., & Li, V. O. K. (2012). Efficient HMAC-based secure communication for VANETs. Computer Networks, 56(9), 2292–2303.

    Article  Google Scholar 

  25. Al-Qutayri, M., Yeun, C., & Al-Hawi, F. (2010.) Security and privacy of intelligent VANETs. In A.-D. Ali (Ed.), Computer and information science. Security and privacy of intelligent VANETs, Computational intelligence and modern heuristics. Rijeka: InTech. doi:10.5772/7815.

  26. Zhang, L., Wu, Q., Solanas, A., & Ferrer, J. D. (2010). A scalable robust authentication protocol for secure vehicular communication. IEEE Transactions on Vehicular Technology, 59(4), 1606–1617.

    Article  Google Scholar 

  27. Kim, J., & Song, J. (2012). A pre-authentication method for secure communication in vehicular ad hoc networks. In 8th international conference on wireless communication, networking and mobile computing.

  28. Xiong, H., Guan, Z., Hu, J., & Chen, Z. (2010). Anonymous authentication protocols for vehicular ad hoc networks: An overview. In J. Sen (Ed.), Computer and information science. Applied cryptography and network security. Rijeka: InTech. doi:10.5772/34675.

  29. Chim, T. W., Yiu, S. M., Hui, L. C. K., & Li, V. O. K. (2010). SPECS: Secure and privacy enhancing communication schemes for VANETs. Ad Hoc Networks, 9(2), 189–203.

    Article  Google Scholar 

  30. Horng, S. J., Tzeng, S. F., Pan, Y., Fan, P., Wang, X., Li, T., et al. (2013). b-SPECS+: Batch verification for secure pseudonymous authentication in VANET. IEEE Transactions on Information Forensics and Security, 8(11), 1860–1875.

    Article  Google Scholar 

  31. Boneh, D., & Franklin, M. (2001). Identity-based encryption from the weil pairing. In Proceedings of 21st annual international cryptology conference on advanced cryptology.

  32. Maity, B. B .N. S., & Hansdah, R .C. (2013) . A protocol for authentication with multiple levels of anonymity (AMLA) in VANETs. In 27th international conference on advanced information networking and applications workshops.

  33. Liu, B., & Zhang, L. (2013). An improved identity-based batch verification scheme for VANETs. In 5th international conference on intelligent networking and collaborative systems

  34. Chim, T. W., Yiu, S. M., Hui, L. C. K., & Li, V. O. K. (2012). MLAS: Multiple level authentication scheme for VANETs. Ad Hoc Networks, 10(7), 1445–1456.

    Article  Google Scholar 

  35. Jesudoss, A., Raja, S. V. K., & Park, S. H. (2013). GRAS: A group reliant authentication scheme for V2V communication in VANET. Systemics, Cybernetics and Informatics, 11(6), 47–52.

    Google Scholar 

  36. Riley, M., Akkaya, K., & Fong, K. (2010). A survey of authentication schemes for vehicular ad hoc networks. Security and Communication Networks, 4(10), 1137–1152.

    Article  Google Scholar 

  37. Zhang, J., Zhen, W., & Xu, M. (2013). An efficient privacy-preserving authentication protocol in VANETs. In 9th international conference on mobile ad-hoc and sensor networks.

  38. Liu, J. K., Au, M. H., & Susilo, W. (2007). Self-generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model. In 2nd ACM symposium on Information, computer and communications security. New York: ACM.

  39. Darrel, H., & Scott, V. (2003). Guide to elliptic curve cryptography. New York: Springer Professional Computing Publishing Company Incorporated.

    Google Scholar 

  40. Aboobaker, A. K. K. (2010). Performance analysis of authentication protocols in vehicular ad hoc networks (VANET). Technical report, Department of Mathematics, Royal Holloway, University of London, Egham, England.

  41. Raya, M., & Hubaux, J. P. (2005). The security of vehicular ad hoc networks. In Proceedings of the 3rd ACM workshop on security of ad hoc and sensor networks.

  42. http://www.mathworks.com/.

  43. Al-kahtani, M. S. (2012). Survey on security attacks in Vehicular ad hoc networks (VANETs). In 6th international conference on signal processing and communication systems.

Download references

Acknowledgments

This work was carried out in the framework of research activities of the laboratory LIMED, which is affiliated to the Faculty of Exact Sciences of the University of Bejaia.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mawloud Omar.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Oulhaci, T., Omar, M., Harzine, F. et al. Secure and distributed certification system architecture for safety message authentication in VANET. Telecommun Syst 64, 679–694 (2017). https://doi.org/10.1007/s11235-016-0200-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-016-0200-4

Keywords

Navigation