Skip to main content
Log in

A trust infrastructure based authentication method for clustered vehicular ad hoc networks

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Vehicular Ad hoc Networks (VANETs) as a subset of mobile ad hoc networks which allow communication between any vehicle with other adjacent vehicles, road side units and infrastructure. In these networks, the purpose is to enhance the security, improve the management of urban and road traffic and provide services to the passenger. Due to problems such as reliability and privacy, messages that are exchanged in the network should be confidential and secure. Therefore, we need a secure topology to maintain trust, which enables the cryptographic process. In this paper, a trust based authentication method for clustered vehicular ad hoc networks is proposed. The efficient authentication method should be able to accurately detect malicious nodes and reduced delay and overhead. The main purpose of the proposed method is to create trustworthy and stable clusters that lead to the stability of the entire network. For this purpose, we estimate the trust degree of each vehicle by combining the trust between vehicles and the trust between the vehicle and Road Side Units (RSUs), and Cluster Heads (CHs) are selected based on this estimated trust degree. Cluster Heads along with verifiers are responsible for monitoring each vehicle. On the other hand, the cluster heads provide an optimal and secure route for transmitting messages. Messages are digitally signed by the sender and encrypted using a public/private key as distributed by a Trusted Authority (TA) and decrypted by the destination; so that each message contains a certificate from a trusted authority. In this identification, the sender and receiver of the message are verified and authentication will be achieved. By simulation results, it is proves that the proposed method increases the accuracy in detecting malicious nodes and the packet delivery ratio, and decreases the delay of authentication and overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Fatemidokht H, Kuchaki Rafsanjani M (2016) A secure framework for beeadhoc (bio/nature inspired MANET routing protocol) using neural networks. Bulletin of the Transilvania University of Brasov. Mathematics, Informatics, Physics. Series III, vol. 9(58), no. 2: 125–136

  2. Kuchaki Rafsanjani M, Fatemidokht H (2015) FBeeAdHoc: A secure routing protocol for BeeAdHoc based on fuzzy logic in MANETs. International Journal of Electronics and Communications (AEÜ) 69:1613–1621

    Article  Google Scholar 

  3. Fatemidokht H, Kuchaki Rafsanjani M (2016) F-Ant: an effective routing protocol for ant colony optimization based on fuzzy logic in vehicular ad hoc networks. Neural Computing and Applications, https://doi.org/10.1007/s00521-016-2631-y, pp. 1–11

  4. Kaur N, Kad S (2015) A review on security related aspects in vehicular ad hoc networks", Proceedings of the International Conference on Information Security& Privacy (ICISP2015), Nagpur, India, pp. 387–394, December 11–12

  5. Movahedi Z, Mazandarani A (2015) Self-adaptive routing protocol with delay range for inter-vehicle case networks. Soft Calculations journal 4(8):68–83

    Google Scholar 

  6. Pietro RD, Mancini LV, Mei A (2006) Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks. Wirel Netw 12(6):709–721

    Article  Google Scholar 

  7. Varshney N, Roy T, Chaudhary N (2014) Security protocol for VANET by using digital certifcation to provide security with low bandwidth. Proceedings of the International Conference on Communication and Signal Processing. Melmaruvathur, India, pp. 768–772, April 3–5

  8. Al-Sultan S, Al-Doori MM, Al-Bayatti AH, Zedan H (January 2014) A comprehensive survey on vehicular ad hoc network. J Netw Comput Appl 37:380–392

    Article  Google Scholar 

  9. Mokhtar B, Azab M (2015) Survey on security issues in vehicular ad hoc. Alexandria Engineering Journal 54(4):1115–1126

    Article  Google Scholar 

  10. Engoulou RG, Bellaïche M, Pierre S, Quintero A (2014) VANET security surveys. Comput Commun 44:1–13

    Article  Google Scholar 

  11. Azees M, Vijayakumar P, Deborah LJ (2016) A comprehensive survey on security services in vehicular ad hoc networks (VANETs). IET Intell Transp Syst 10(6):379–388

    Article  Google Scholar 

  12. Zhao H, Sun D, Yue H, Zhao M, Cheng S (2018) Dynamic trust model for vehicular cyber-physical systems. International Journal of Network Security 20(1):157–167

    Google Scholar 

  13. Bali RS, Kumar N, Rodrigues JJPC (2014) Clustering in vehicular ad hoc networks: taxonomy, challenges and solutions. Vehicular Communications 1(3):134–152

    Article  Google Scholar 

  14. Dawande JR, Silakari S, Deen A (2015) A survey of all existing clustering protocols in VANETs but main emphasis of survey laid on currently using protocol i.e. TCDGP. International Journal of Computer Applications 118(6):22–31

    Article  Google Scholar 

  15. A. MS (2007) Public key cryptography – application algorithms and mathematical explanations. Tata Elxi Ltd, India, May 2007

  16. http://ce.sharif.edu/courses/94-95 (Available at: November 2015)

  17. Mejri MN, Ben-Othman J, Hamdi M (2014) Survey on VANET security challenges and possible cryptographic solutions. Vehicular Communications 1(2):53–66

    Article  Google Scholar 

  18. Minhas UF, Zhang J, Tran T, Cohen R, Cheriton DR (2011) A multi-faceted approach to modeling agent trust for effective communication in the application of mobile ad hoc vehicular networks. IEEE Trans Syst Man Cybern Part C Appl Rev 41(3):407–420

    Article  Google Scholar 

  19. Mármol FG, Pérez GM (2012) TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks. J Netw Comput Appl 35(3):934–941

    Article  Google Scholar 

  20. Li W, Song H (2016) ART: an attack-resistant trust management scheme for securing vehicular ad hoc networks. IEEE Trans Intell Transp Syst 17(4):960–969

    Article  Google Scholar 

  21. Hu H, Lu R, Zhang Z, Shao J (2017) REPLACE: a reliable trust-based platoon service recommendation scheme in VANET. IEEE Trans Veh Technol 66(2):1786–1797

    Article  Google Scholar 

  22. Zhizhong J, Chuanhe H, Liya X, Bo W, Xi C, Xiying F (2012) A trusted opportunistic routing algorithm for VANET", Proceedings of the Third International Conference on Networking and Distributed Computing (ICNDC), Hangzhou, China, pp. 86–90, October 21–24, 2012

  23. Chen T, Mehani O, Boreli R (2009) Trusted routing for VANET", Proceedings of the9th International Conference on Intelligent Transport Systems Telecommunications (ITST), https://doi.org/10.1109/ITST.2009.5399276, Lille, France, October 20–22, 2009

  24. Daeinabi A, Rahbar AG (2014) An advanced security scheme based on clustering and key distribution in vehicular ad hoc networks. Computers & Electrical Engineering journal 40(2):517–529

    Article  Google Scholar 

  25. Chim TW, Yiu SM, Hui LCK, Li VOK (2014) VSPN: VANET-based secure and privacy-preserving navigation. IEEE Trans Comput 63(2):510–524

    Article  MathSciNet  Google Scholar 

  26. Kerrache CA, Lagraa N, Calafate CT, Cano JC, Manzoni P (2016) T-VNets: a novel trust architecture for vehicular networks using the standardized messaging services of ETSI ITS. Comput Commun 93:68–83

    Article  Google Scholar 

  27. Sugumar R, Rengarajan A, Jayakumar C (2016) Trust based authentication technique for cluster based vehicular ad hoc networks (VANET). Wirel Netw 22(5):1–10

    Google Scholar 

  28. Barba CT, Aguiar LU, Igartua MA, Arnau JP, Monedero DR, Forné J, Pallarès E (2013) A collaborative protocol for anonymous reporting in vehicular ad hoc networks. Computer Standards & Interfaces 36(1):188–197

    Article  Google Scholar 

  29. Chuang MC, Lee JF (2014) TEAM: trust-extended authentication mechanism for vehicular ad hoc networks. IEEE Syst J 8(3):749–758

    Article  Google Scholar 

  30. Zhou A, Li J, Sun Q, Fan C, Lei T, Yang F (2015) A security authentication method based on trust evaluation in VANETs. J Wireless Com Network. https://doi.org/10.1186/s13638-015-0257-x

  31. Soleymani A, Goudarzi S, Anisi MH, Kama N, Ismail SA, Azmi A, Zareei M, Abdullah AH (2020) A trust model using edge nodes and a cuckoo filter for securing VANET under the NLoS condition. Symmetry 12:1–22. https://doi.org/10.3390/sym12040609

    Article  Google Scholar 

  32. G. Khayat, G. Mastorakis, J. Mongay Batalla, H. Maalouf, E. Pallis, "VANET clustering based on weighted trusted cluster head selection ", IEEE International Wireless Communications and Mobile Computing, https://doi.org/10.1109/IWCMC48107.2020.9148339, pp. 623–628, 2020

  33. Thi Kim OT, Nguyen VD, Hong CS (2014) Which network simulation tool is better for simulating vehicular ad hoc network? Proceedings of the Korean Information Science Conference 134(1):930–932

    Google Scholar 

  34. Hussain MDM, Beg MMS (2019) Using vehicles as fog infrastructures for transportation cyber-physical systems (T-CPS): Fog computing for vehicular networks. International Journal of Software Science and Computational Intelligence (IJSSCI) 11(1):47–69

    Article  Google Scholar 

  35. Hiraishi H (2018) Passenger condition based route-planning for cognitive vehicle system. International Journal of Software Science and Computational Intelligence (IJSSCI) 10(2):25–35

    Article  Google Scholar 

  36. Pljonkin AP (2019) Vulnerability of the synchronization process in the quantum key distribution system. International Journal of Cloud Applications and Computing (IJCAC) 9(1):50–58

    Article  Google Scholar 

  37. Alhaidary M, Rahman SMM, Mohammed Z, Shamim Hossain M, Alamri A, Haque MSM, Gupta BB (2018) Vulnerability analysis for the authentication protocols in trusted computing platforms and a proposed enhancement of the offpad protocol. IEEE Access 6:6071–6081

    Article  Google Scholar 

  38. Kaushik S, Gandhi C (2019) Ensure hierarchal identity based data security in cloud environment. International Journal of Cloud Applications and Computing (IJCAC) 9(4):21–36

    Article  Google Scholar 

  39. Gupta BB (Ed.). (2018). Computer and cyber security: principles, algorithm, applications, and perspectives. CRC Press

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Brij B. Gupta.

Additional information

This article is part of the Topical Collection: Special Issue on Network In Box, Architecture, Networking and Applications

Guest Editor: Ching-Hsien Hsu

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mirsadeghi, F., Rafsanjani, M.K. & Gupta, B.B. A trust infrastructure based authentication method for clustered vehicular ad hoc networks. Peer-to-Peer Netw. Appl. 14, 2537–2553 (2021). https://doi.org/10.1007/s12083-020-01010-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-020-01010-4

Keywords

Navigation