Skip to main content

Low-Cost Information Transfer System Between Vehicles on Roads

  • Conference paper
  • First Online:
Advances in Electrical and Computer Technologies (ICAECT 2020)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 711))

  • 1019 Accesses

Abstract

The authentication process is a key component to increase security in a vehicle network. Most of the authentication protocols proposed in the literature are based on asymmetric cryptography, and specifically on the use of the RSA algorithm. In addition, the use of digital certificates and a public key infrastructure is considered. Therefore, the authentication process is often complex. In order to propose a secure solution, without the use of digital certificates and the RSA algorithm, a mutual authentication protocol based on the Diffie-Hellman algorithm is presented to establish a session key between vehicle (OBU) and road unit (RSU). From the session key, a secure communication channel can be established to transmit the identifier of each participant and the respective security parameters. To perform the authentication process, the entities perform low-cost computational operations such as hash and XOR functions. Once the mutual authentication protocol is completed, the vehicle and the road unit can exchange messages securely.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. N.A. Balaji, R. Sukumar, M. Parvathy, Enhanced dual authentication and key management scheme for data authentication in vehicular ad hoc network. Comput. Electr. Eng. 76, 94–110 (2019)

    Article  Google Scholar 

  2. K. Lim, K.M. Tuladhar, X. Wang, W. Liu, A Scalable and Secure Key Distribution Scheme for Group Signature-Based Authentication in VANET, in 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON) (IEEE, 2017), pp 478–483

    Google Scholar 

  3. H. Tan, D. Choi, P Kim, S. Pan, I. Chung, Secure certificateless authentication and road message dissemination protocol in VANETs. Wireless Communications and Mobile Computing (2018)

    Google Scholar 

  4. O. Chikhaoui, A.B. Chehida, R. Abassi, S.G. El Fatmi, A Formal Ticket-Based Authentication Scheme for VANETs. in Artificial Intelligence and Security Challenges in Emerging Networks (IGI Global, 2019), pp 188–220

    Google Scholar 

  5. S. Jiang, X. Zhu, L. Wang, An efficient anonymous batch authentication scheme based on HMAC for VANETs. IEEE Trans. Intell. Transp. Syst. 17(8), 2193–2204 (2016)

    Article  Google Scholar 

  6. C. Lai, D. Zheng, Q. Zhao, X. Jiang, SEGM: A secure group management framework in integrated VANET-cellular networks. Veh. Commun. 11, 33–45 (2018)

    Google Scholar 

  7. S. Paul, S. Kumar, R.R. Suman, A quantum secure entity authentication protocol design for network security. Int. J. Info. Sec. Privacy (IJISP) 13(4), 1–11 (2019)

    Article  Google Scholar 

  8. U. Rajput, F. Abbas, H. Oh, A hierarchical privacy preserving pseudonymous authentication protocol for VANET. IEEE Access 4, 7770–7784 (2016)

    Article  Google Scholar 

  9. C. Vásquez, et al., Conglomerates of Bus Rapid Transit in Latin American Countries, ed. by A. Pandian, K. Ntalianis, R. Palanisamy, Intelligent Computing, Information and Control Systems. ICICCS 2019. Advances in Intelligent Systems and Computing, vol 1039 (Springer, Cham, 2020), pp. 188–220

    Google Scholar 

  10. N. Malik, P. Nanda, A. Arora, X. He, D. Puthal, Blockchain Based Secured Identity Authentication and Expeditious Revocation Framework for Vehicular Networks. in 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) (IEEE, 2018), pp. 674–679

    Google Scholar 

  11. T. Gao, S. Deng, A Pseudonym Ring Building Scheme for Anonymous Authentication in VANETs. in International Conference on Broadband and Wireless Computing, Communication and Applications (Springer, Cham, 2018), pp. 481–489

    Google Scholar 

  12. M. Ma, D. He, H. Wang, N. Kumar, K.K.R. Choo, An efficient and provably secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks. IEEE Int. Things J. 6(5), 8065–8075 (2019)

    Article  Google Scholar 

  13. L.F. Roman, P.R. Gondim, Authentication protocol in CTNs for a CWD-WPT charging system in a cloud environment. Ad Hoc Netw. 97, 102004 (2020)

    Article  Google Scholar 

  14. X. Li, Y. Han, J. Gao, J. Niu, Secure hierarchical authentication protocol in VANET. IET Inf. Secur. 14(1), 99–110 (2019)

    Article  Google Scholar 

  15. A. Viloria G. Wang, M. Gaitan, Segmentation of Sales for a Mobile Phone Service Through CART Classification Tree Algorithm. in V. Vijayakumar, V. Neelanarayanan, P. Rao, J. Light, Proceedings of 6th International Conference on Big Data and Cloud Computing Challenges. Smart Innovation, Systems and Technologies, vol 164 (Springer, Singapore, 2020)

    Google Scholar 

  16. A. Viloria, et al., Hybrid Cloud Computing Architecture Based on Open Source Technology. in G. Wang, M. Bhuiyan, S. De Capitani di Vimercati, Y. Ren, Dependability in Sensor, Cloud, and Big Data Systems and Applications. DependSys 2019. Communications in Computer and Information Science, vol 1123 (Springer, Singapore, 2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amelec Viloria .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Viloria, A., Lezama, O.B.P., Varela, N. (2021). Low-Cost Information Transfer System Between Vehicles on Roads. In: Sengodan, T., Murugappan, M., Misra, S. (eds) Advances in Electrical and Computer Technologies. ICAECT 2020. Lecture Notes in Electrical Engineering, vol 711. Springer, Singapore. https://doi.org/10.1007/978-981-15-9019-1_41

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-9019-1_41

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-9018-4

  • Online ISBN: 978-981-15-9019-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics