Abstract
Vehicular Ad hoc Networks (VANETs) as a subset of mobile ad hoc networks which allow communication between any vehicle with other adjacent vehicles, road side units and infrastructure. In these networks, the purpose is to enhance the security, improve the management of urban and road traffic and provide services to the passenger. Due to problems such as reliability and privacy, messages that are exchanged in the network should be confidential and secure. Therefore, we need a secure topology to maintain trust, which enables the cryptographic process. In this paper, a trust based authentication method for clustered vehicular ad hoc networks is proposed. The efficient authentication method should be able to accurately detect malicious nodes and reduced delay and overhead. The main purpose of the proposed method is to create trustworthy and stable clusters that lead to the stability of the entire network. For this purpose, we estimate the trust degree of each vehicle by combining the trust between vehicles and the trust between the vehicle and Road Side Units (RSUs), and Cluster Heads (CHs) are selected based on this estimated trust degree. Cluster Heads along with verifiers are responsible for monitoring each vehicle. On the other hand, the cluster heads provide an optimal and secure route for transmitting messages. Messages are digitally signed by the sender and encrypted using a public/private key as distributed by a Trusted Authority (TA) and decrypted by the destination; so that each message contains a certificate from a trusted authority. In this identification, the sender and receiver of the message are verified and authentication will be achieved. By simulation results, it is proves that the proposed method increases the accuracy in detecting malicious nodes and the packet delivery ratio, and decreases the delay of authentication and overhead.
Similar content being viewed by others
References
Fatemidokht H, Kuchaki Rafsanjani M (2016) A secure framework for beeadhoc (bio/nature inspired MANET routing protocol) using neural networks. Bulletin of the Transilvania University of Brasov. Mathematics, Informatics, Physics. Series III, vol. 9(58), no. 2: 125–136
Kuchaki Rafsanjani M, Fatemidokht H (2015) FBeeAdHoc: A secure routing protocol for BeeAdHoc based on fuzzy logic in MANETs. International Journal of Electronics and Communications (AEÜ) 69:1613–1621
Fatemidokht H, Kuchaki Rafsanjani M (2016) F-Ant: an effective routing protocol for ant colony optimization based on fuzzy logic in vehicular ad hoc networks. Neural Computing and Applications, https://doi.org/10.1007/s00521-016-2631-y, pp. 1–11
Kaur N, Kad S (2015) A review on security related aspects in vehicular ad hoc networks", Proceedings of the International Conference on Information Security& Privacy (ICISP2015), Nagpur, India, pp. 387–394, December 11–12
Movahedi Z, Mazandarani A (2015) Self-adaptive routing protocol with delay range for inter-vehicle case networks. Soft Calculations journal 4(8):68–83
Pietro RD, Mancini LV, Mei A (2006) Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks. Wirel Netw 12(6):709–721
Varshney N, Roy T, Chaudhary N (2014) Security protocol for VANET by using digital certifcation to provide security with low bandwidth. Proceedings of the International Conference on Communication and Signal Processing. Melmaruvathur, India, pp. 768–772, April 3–5
Al-Sultan S, Al-Doori MM, Al-Bayatti AH, Zedan H (January 2014) A comprehensive survey on vehicular ad hoc network. J Netw Comput Appl 37:380–392
Mokhtar B, Azab M (2015) Survey on security issues in vehicular ad hoc. Alexandria Engineering Journal 54(4):1115–1126
Engoulou RG, Bellaïche M, Pierre S, Quintero A (2014) VANET security surveys. Comput Commun 44:1–13
Azees M, Vijayakumar P, Deborah LJ (2016) A comprehensive survey on security services in vehicular ad hoc networks (VANETs). IET Intell Transp Syst 10(6):379–388
Zhao H, Sun D, Yue H, Zhao M, Cheng S (2018) Dynamic trust model for vehicular cyber-physical systems. International Journal of Network Security 20(1):157–167
Bali RS, Kumar N, Rodrigues JJPC (2014) Clustering in vehicular ad hoc networks: taxonomy, challenges and solutions. Vehicular Communications 1(3):134–152
Dawande JR, Silakari S, Deen A (2015) A survey of all existing clustering protocols in VANETs but main emphasis of survey laid on currently using protocol i.e. TCDGP. International Journal of Computer Applications 118(6):22–31
A. MS (2007) Public key cryptography – application algorithms and mathematical explanations. Tata Elxi Ltd, India, May 2007
http://ce.sharif.edu/courses/94-95 (Available at: November 2015)
Mejri MN, Ben-Othman J, Hamdi M (2014) Survey on VANET security challenges and possible cryptographic solutions. Vehicular Communications 1(2):53–66
Minhas UF, Zhang J, Tran T, Cohen R, Cheriton DR (2011) A multi-faceted approach to modeling agent trust for effective communication in the application of mobile ad hoc vehicular networks. IEEE Trans Syst Man Cybern Part C Appl Rev 41(3):407–420
Mármol FG, Pérez GM (2012) TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks. J Netw Comput Appl 35(3):934–941
Li W, Song H (2016) ART: an attack-resistant trust management scheme for securing vehicular ad hoc networks. IEEE Trans Intell Transp Syst 17(4):960–969
Hu H, Lu R, Zhang Z, Shao J (2017) REPLACE: a reliable trust-based platoon service recommendation scheme in VANET. IEEE Trans Veh Technol 66(2):1786–1797
Zhizhong J, Chuanhe H, Liya X, Bo W, Xi C, Xiying F (2012) A trusted opportunistic routing algorithm for VANET", Proceedings of the Third International Conference on Networking and Distributed Computing (ICNDC), Hangzhou, China, pp. 86–90, October 21–24, 2012
Chen T, Mehani O, Boreli R (2009) Trusted routing for VANET", Proceedings of the9th International Conference on Intelligent Transport Systems Telecommunications (ITST), https://doi.org/10.1109/ITST.2009.5399276, Lille, France, October 20–22, 2009
Daeinabi A, Rahbar AG (2014) An advanced security scheme based on clustering and key distribution in vehicular ad hoc networks. Computers & Electrical Engineering journal 40(2):517–529
Chim TW, Yiu SM, Hui LCK, Li VOK (2014) VSPN: VANET-based secure and privacy-preserving navigation. IEEE Trans Comput 63(2):510–524
Kerrache CA, Lagraa N, Calafate CT, Cano JC, Manzoni P (2016) T-VNets: a novel trust architecture for vehicular networks using the standardized messaging services of ETSI ITS. Comput Commun 93:68–83
Sugumar R, Rengarajan A, Jayakumar C (2016) Trust based authentication technique for cluster based vehicular ad hoc networks (VANET). Wirel Netw 22(5):1–10
Barba CT, Aguiar LU, Igartua MA, Arnau JP, Monedero DR, Forné J, Pallarès E (2013) A collaborative protocol for anonymous reporting in vehicular ad hoc networks. Computer Standards & Interfaces 36(1):188–197
Chuang MC, Lee JF (2014) TEAM: trust-extended authentication mechanism for vehicular ad hoc networks. IEEE Syst J 8(3):749–758
Zhou A, Li J, Sun Q, Fan C, Lei T, Yang F (2015) A security authentication method based on trust evaluation in VANETs. J Wireless Com Network. https://doi.org/10.1186/s13638-015-0257-x
Soleymani A, Goudarzi S, Anisi MH, Kama N, Ismail SA, Azmi A, Zareei M, Abdullah AH (2020) A trust model using edge nodes and a cuckoo filter for securing VANET under the NLoS condition. Symmetry 12:1–22. https://doi.org/10.3390/sym12040609
G. Khayat, G. Mastorakis, J. Mongay Batalla, H. Maalouf, E. Pallis, "VANET clustering based on weighted trusted cluster head selection ", IEEE International Wireless Communications and Mobile Computing, https://doi.org/10.1109/IWCMC48107.2020.9148339, pp. 623–628, 2020
Thi Kim OT, Nguyen VD, Hong CS (2014) Which network simulation tool is better for simulating vehicular ad hoc network? Proceedings of the Korean Information Science Conference 134(1):930–932
Hussain MDM, Beg MMS (2019) Using vehicles as fog infrastructures for transportation cyber-physical systems (T-CPS): Fog computing for vehicular networks. International Journal of Software Science and Computational Intelligence (IJSSCI) 11(1):47–69
Hiraishi H (2018) Passenger condition based route-planning for cognitive vehicle system. International Journal of Software Science and Computational Intelligence (IJSSCI) 10(2):25–35
Pljonkin AP (2019) Vulnerability of the synchronization process in the quantum key distribution system. International Journal of Cloud Applications and Computing (IJCAC) 9(1):50–58
Alhaidary M, Rahman SMM, Mohammed Z, Shamim Hossain M, Alamri A, Haque MSM, Gupta BB (2018) Vulnerability analysis for the authentication protocols in trusted computing platforms and a proposed enhancement of the offpad protocol. IEEE Access 6:6071–6081
Kaushik S, Gandhi C (2019) Ensure hierarchal identity based data security in cloud environment. International Journal of Cloud Applications and Computing (IJCAC) 9(4):21–36
Gupta BB (Ed.). (2018). Computer and cyber security: principles, algorithm, applications, and perspectives. CRC Press
Author information
Authors and Affiliations
Corresponding author
Additional information
This article is part of the Topical Collection: Special Issue on Network In Box, Architecture, Networking and Applications
Guest Editor: Ching-Hsien Hsu
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Mirsadeghi, F., Rafsanjani, M.K. & Gupta, B.B. A trust infrastructure based authentication method for clustered vehicular ad hoc networks. Peer-to-Peer Netw. Appl. 14, 2537–2553 (2021). https://doi.org/10.1007/s12083-020-01010-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-020-01010-4