Abstract
The authentication process is a key component to increase security in a vehicle network. Most of the authentication protocols proposed in the literature are based on asymmetric cryptography, and specifically on the use of the RSA algorithm. In addition, the use of digital certificates and a public key infrastructure is considered. Therefore, the authentication process is often complex. In order to propose a secure solution, without the use of digital certificates and the RSA algorithm, a mutual authentication protocol based on the Diffie-Hellman algorithm is presented to establish a session key between vehicle (OBU) and road unit (RSU). From the session key, a secure communication channel can be established to transmit the identifier of each participant and the respective security parameters. To perform the authentication process, the entities perform low-cost computational operations such as hash and XOR functions. Once the mutual authentication protocol is completed, the vehicle and the road unit can exchange messages securely.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
N.A. Balaji, R. Sukumar, M. Parvathy, Enhanced dual authentication and key management scheme for data authentication in vehicular ad hoc network. Comput. Electr. Eng. 76, 94–110 (2019)
K. Lim, K.M. Tuladhar, X. Wang, W. Liu, A Scalable and Secure Key Distribution Scheme for Group Signature-Based Authentication in VANET, in 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON) (IEEE, 2017), pp 478–483
H. Tan, D. Choi, P Kim, S. Pan, I. Chung, Secure certificateless authentication and road message dissemination protocol in VANETs. Wireless Communications and Mobile Computing (2018)
O. Chikhaoui, A.B. Chehida, R. Abassi, S.G. El Fatmi, A Formal Ticket-Based Authentication Scheme for VANETs. in Artificial Intelligence and Security Challenges in Emerging Networks (IGI Global, 2019), pp 188–220
S. Jiang, X. Zhu, L. Wang, An efficient anonymous batch authentication scheme based on HMAC for VANETs. IEEE Trans. Intell. Transp. Syst. 17(8), 2193–2204 (2016)
C. Lai, D. Zheng, Q. Zhao, X. Jiang, SEGM: A secure group management framework in integrated VANET-cellular networks. Veh. Commun. 11, 33–45 (2018)
S. Paul, S. Kumar, R.R. Suman, A quantum secure entity authentication protocol design for network security. Int. J. Info. Sec. Privacy (IJISP) 13(4), 1–11 (2019)
U. Rajput, F. Abbas, H. Oh, A hierarchical privacy preserving pseudonymous authentication protocol for VANET. IEEE Access 4, 7770–7784 (2016)
C. Vásquez, et al., Conglomerates of Bus Rapid Transit in Latin American Countries, ed. by A. Pandian, K. Ntalianis, R. Palanisamy, Intelligent Computing, Information and Control Systems. ICICCS 2019. Advances in Intelligent Systems and Computing, vol 1039 (Springer, Cham, 2020), pp. 188–220
N. Malik, P. Nanda, A. Arora, X. He, D. Puthal, Blockchain Based Secured Identity Authentication and Expeditious Revocation Framework for Vehicular Networks. in 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) (IEEE, 2018), pp. 674–679
T. Gao, S. Deng, A Pseudonym Ring Building Scheme for Anonymous Authentication in VANETs. in International Conference on Broadband and Wireless Computing, Communication and Applications (Springer, Cham, 2018), pp. 481–489
M. Ma, D. He, H. Wang, N. Kumar, K.K.R. Choo, An efficient and provably secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks. IEEE Int. Things J. 6(5), 8065–8075 (2019)
L.F. Roman, P.R. Gondim, Authentication protocol in CTNs for a CWD-WPT charging system in a cloud environment. Ad Hoc Netw. 97, 102004 (2020)
X. Li, Y. Han, J. Gao, J. Niu, Secure hierarchical authentication protocol in VANET. IET Inf. Secur. 14(1), 99–110 (2019)
A. Viloria G. Wang, M. Gaitan, Segmentation of Sales for a Mobile Phone Service Through CART Classification Tree Algorithm. in V. Vijayakumar, V. Neelanarayanan, P. Rao, J. Light, Proceedings of 6th International Conference on Big Data and Cloud Computing Challenges. Smart Innovation, Systems and Technologies, vol 164 (Springer, Singapore, 2020)
A. Viloria, et al., Hybrid Cloud Computing Architecture Based on Open Source Technology. in G. Wang, M. Bhuiyan, S. De Capitani di Vimercati, Y. Ren, Dependability in Sensor, Cloud, and Big Data Systems and Applications. DependSys 2019. Communications in Computer and Information Science, vol 1123 (Springer, Singapore, 2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Viloria, A., Lezama, O.B.P., Varela, N. (2021). Low-Cost Information Transfer System Between Vehicles on Roads. In: Sengodan, T., Murugappan, M., Misra, S. (eds) Advances in Electrical and Computer Technologies. ICAECT 2020. Lecture Notes in Electrical Engineering, vol 711. Springer, Singapore. https://doi.org/10.1007/978-981-15-9019-1_41
Download citation
DOI: https://doi.org/10.1007/978-981-15-9019-1_41
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-9018-4
Online ISBN: 978-981-15-9019-1
eBook Packages: Computer ScienceComputer Science (R0)