Skip to main content

Secure Data Transmission in VANET Using Authentication Schemes—A Comprehensive Analysis

  • Conference paper
  • First Online:
Proceedings of Third International Conference on Intelligent Computing, Information and Control Systems

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1415))

  • 526 Accesses

Abstract

Vehicle ad hoc networks (VANETs), a subset of MANETs in which mobile devices serve as nodes, and in which cars serve as nodes, are used for information transmission between vehicles and roadside units (RSU). It aids the driver's ability to drive safely. VANET also provides alerts in the case of an accident, extreme weather conditions, or traffic safety concerns among other things. Due to the lack of infrastructure and poor VANET infrastructures, security issues such as collision attacks, man-in-the-middle attacks, and verification identification will occur frequently. Continuous communication channels can be reliably establish a secure data transmission. In this overview, this research work has discussed about the security issues by implementing VANET. In addition, the security aspects of automatic switching are also analyzed. A network authentication scheme is used to establish safety, and no attack can ensure safe communication between vehicles without collision.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Anita EAM, Jenefa J (2016) A survey on authentication schemes of VANETs. Int Conf Inf Commun Embed Syst (ICICES) 2016:1–7. https://doi.org/10.1109/ICICES.2016.7518946

    Article  Google Scholar 

  2. Jenefa J, Mary Anita EA (2019) An enhanced secure authentication scheme for vehicular ad hoc networks without pairings. Wirel Pers Commun 106:535–554. https://doi.org/10.1007/s11277-019-06178-4

  3. Jenefa J, Mary Anita EA (2018) Secure vehicular communication using ID based signature scheme. Wirel Pers Commun 98:1383–1411. https://doi.org/10.1007/s11277-017-4923-7

  4. Abusalah L (2008) A survey of secure mobile ad hoc routing protocols. IEEE Commun Surv Tutor 10(4, Fourth Quarter):78–93

    Google Scholar 

  5. Khokhar A, Abusalah L, Guizani M (2008) An efficient message authentication scheme for vehicular communications. IEEE Trans Veh Technol 57(6)

    Google Scholar 

  6. Mary Anita A, Sajini S (2019) A survey of collision avoidance in TDMA based mac protocols for vehicular Adhoc networks. Int J EngTechnol 8(3):386–389. ISSN 2227-524X

    Google Scholar 

  7. Pandey PK, Kansal V, Swaroop A (2020) Vehicular ad hoc networks (VANETs): architecture, challenges, and applications. IGI Global Publisher of Timely Knowledge

    Google Scholar 

  8. Kumar N et al (2014) An intelligent approach for building a secure decentralized public key infrastructure in VANET. J Comput Syst Sci. https://doi.org/10.1016/j.jcss.2014.12.016

  9. Khalique A, Singh K, Sood S (2014) Implementation of elliptic curve digital signature algorithm. Int J Comput Appl (0975-8887) 2(2):21–27

    Google Scholar 

  10. Zho J et al (2019) Light weight privacy preserving authentication from efficient multi key secured outsourced computation for location based services in VANET. IEEE Trans Inform Forens Secur 15:420–434

    Google Scholar 

  11. Ravi K, Kulkarni SA (2013) A secure message authentication scheme for V ANET using ECDSA. Department of Computer Science, K.L. S. Gogte Institute of Technology, Belgaum

    Google Scholar 

  12. Klein-Berndt L, A quick guide to AODV routing. Wireless Communications Technologies Group, National Institute of Standards and Technology

    Google Scholar 

  13. Lee KC (2010) Survey of routing protocols in vehicular ad hoc networks. UCLA, USA Mario Gerla, UCLA, USA

    Google Scholar 

  14. Jacob IJ, Ebby Darney P (2021) Artificial bee colony optimization algorithm for enhancing routing in wireless networks. J Artif Intel 3(1):62–71

    Google Scholar 

  15. Zeadally S, Hun R, Chen Y-S, Irwin A, Hassan A (2010) Vehicular ad hoc networks (VANETS): status, results, and challenges. Springer Science+Business Media, LLC

    Google Scholar 

  16. Bhumkar SP, Deotare VV, Babar RV (2020) Accident avoidance and detection on highways. Int J Eng Trends Technol 3(2)

    Google Scholar 

  17. Bang J-H, Lee J-R (2020) Collision avoidance method using vector-based mobility model in TDMA-based vehicular ad hoc networks. Appl Sci 10:4181. https://doi.org/10.3390/app10124181

  18. Al-Shareeda MA et al (2020) An efficient identity-based conditional privacy-preserving authentication scheme for secure communication in a vehicular ad hoc network. Symmetry 12:1687. https://doi.org/10.3390/sym12101687

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sajini, S., Mary Anita, E.A., Janet, J. (2022). Secure Data Transmission in VANET Using Authentication Schemes—A Comprehensive Analysis. In: Pandian, A.P., Palanisamy, R., Narayanan, M., Senjyu, T. (eds) Proceedings of Third International Conference on Intelligent Computing, Information and Control Systems. Advances in Intelligent Systems and Computing, vol 1415. Springer, Singapore. https://doi.org/10.1007/978-981-16-7330-6_40

Download citation

Publish with us

Policies and ethics