Advertisement

Springer Nature is making SARS-CoV-2 and COVID-19 research free. View research | View latest news | Sign up for updates

Secure and distributed certification system architecture for safety message authentication in VANET

Abstract

Vehicular Ad hoc NETworks (VANETs) are a burgeoning research focus, aimed at creating communication among vehicles to improve the road safety and enhance driving conditions. For such networks, security is one of the most challenging issues due to their nature of wireless transmission and high topology changing frequency. In this paper, we propose a secure and distributed certification system architecture for safety message authentication in VANET, which resists against false public-key certification. To increase the availability of the authentication service, our proposal is designed through a decentralized system, supervised by a root authority. The latter authority delegates to a set of regional certification authorities the privilege of issuing public-key certificates to the vehicles. Each regional certification authority cooperates with its subordinates RSUs to sign public-key certificates using threshold signature. The main purpose of our solution is to ensure the messages authentication while respecting the imposed constraints by the real-time aspect and the nodes mobility. We demonstrate through the practical analysis and simulation results the efficiency of our solution with comparison to other concurrent protocols.

This is a preview of subscription content, log in to check access.

We’re sorry, something doesn't seem to be working properly.

Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

References

  1. 1.

    Al-Sultan, S., Al-Doori, M. M., Al-Bayatti, A. H., & Zedan, H. (2013). A comprehensive survey on vehicular ad hoc network. Journal of Network and Computer Applications, 37, 380–392.

  2. 2.

    Engoulou, R. G., Bellaïche, M., Pierre, S., & Quintero, A. (2014). VANET security surveys. Computer Communications, 44, 1–13.

  3. 3.

    Mejri, M. N., Ben-Othman, J., & Hamdi, M. (2014). Survey on VANET security challenges and possible cryptographic solutions. Vehicular Communication, 1(2), 53–66.

  4. 4.

    Yun, W., & Dianjun, L. (2012). An efficient threshold signature scheme based on the elliptic curve cryptosystem. In International conference on computer science and electronics engineering.

  5. 5.

    Karati, S., Das, A., Roychowdhury, D., Bellur, B., Bhattacharya, D., & Iyer, A. (2014). New algorithms for batch verification of standard ECDSA signatures. Journal of Cryptographic Engineering, 4(4), 237–258.

  6. 6.

    Park, Y., Sur, C., Jung, C. D., & Rhee, K. H. (2010). An efficient anonymous authentication protocol for secure vehicular communication. Journal of Information Science and Engineering, 26, 785–800.

  7. 7.

    Jung, C. D., Sur, C., Park, Y., & Rhee, K. H. (2009). A robust and efficient anonymous authentication protocol in VANETs. Journal of Communication and Networks, 11(6), 607–614.

  8. 8.

    Lu, R., Lin, X., Zhu, H., Ho, P. H., & Shen, X. (2008). ECPP: Efficient conditional privacy preservation protocol for secure vehicular communication. In Proceedings of IEEE Infocom.

  9. 9.

    Grover, J., Gaur, M. S., Laxmi, V., & Prajapati, N. K. (2011). A Sybil attack detection approach using neighboring vehicles in VANET. In International conference on security of information and networks

  10. 10.

    Huang, D., Misra, S., Verma, M., & Xue, G. (2011). PACP: An efficient pseudonymous authentication-based conditional privacy protocol for VANETs. IEEE Transactions on Intelligent Transportation Systems, 12(3), 736–746.

  11. 11.

    Chim, T. W., Yiu, S. M., Hui, L. C. K., & Li, V. O. K. (2009). Security and privacy issues for inter-vehicle communication in VANETs. In Proceedings of 6th Lnnual IEEE communication society conference on SECON workshops.

  12. 12.

    Verma, K., Hasbullah, H., & Kumar, A. (2013). Prevention of DoS attacks in VANET. Wireless Personal Communications, 73(1), 95–126.

  13. 13.

    Azogu, I. K., Ferreira, M. T., Larcom, J. A., & Liu, H. (2013). A new anti-jamming strategy for VANET metrics-directed security defense. In International Conference—Globecom—Vehicular netwok evolution.

  14. 14.

    Karumanchi, S., Squicciarini, A., & Lin, D. (2012). Selective and confidential message exchange in vehicular ad hoc networks. Chapter Book on Network and System Security of the Series Lecture Notes in Computer Science, 7645, 445–461.

  15. 15.

    Farooq, M. U., Pasha, M., Khan, K. U. R., & Atif, M. U. H. (2012). An advanced security and data integrity protocol for vehicular ad-hoc networks. Advanced Materials Research, 403–408, 994–1001.

  16. 16.

    Li, J., Lu, H., & Guizani, M. (2015). ACPN: A novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs. IEEE Transactions on Parallel and Distributed Systems, 26(4), 938–948.

  17. 17.

    Boneh, D., & Shacham, H. (2004). Group signatures with verifier-local revocation. In Proceedings of the 11th ACM conference on computer and communication security.

  18. 18.

    Golle, P., Jakobsson, M., Juels, A., & Syverson, P. (2004). Universal reencryption for mixnets. In Proceedings of CT-RSA. Lecture notes in computer science (Vol. 2964).

  19. 19.

    Maurer, U. M., & Yacobi, Y. (1996). A non-interactive public-key distribution system. Designs, Codes, and Cryptography, 9(3), 305–316.

  20. 20.

    Wasef, A., & Shen, X. S. (2009). ASIC: Aggregate signatures and certificates verification scheme for vehicular networks. In Global telecommunication conference.

  21. 21.

    Wasef, A., & Shen, X. (2013). EMAP: Expedite message authentication protocol for vehicular ad hoc networks. IEEE Transactions on Mobile Computing, 12(1), 78–89.

  22. 22.

    Vijayalakshmi, V., Sathya, M., Saranya, S., & Selvaroopini, C. (2014). Survey on various mechanisms for Secure and Efficient VANET communication. In International conference on information communication and embedded systems.

  23. 23.

    Ying, B., Makrakis, D., & Mouftah, H. T. (2012). Privacy preserving broadcast message authentication protocol for VANETs. Journal of Network and Computer Applications, 36(5), 1352–1364.

  24. 24.

    Hu, C., Chim, T. W., Yiu, S. M., Hui, L. C. K., & Li, V. O. K. (2012). Efficient HMAC-based secure communication for VANETs. Computer Networks, 56(9), 2292–2303.

  25. 25.

    Al-Qutayri, M., Yeun, C., & Al-Hawi, F. (2010.) Security and privacy of intelligent VANETs. In A.-D. Ali (Ed.), Computer and information science. Security and privacy of intelligent VANETs, Computational intelligence and modern heuristics. Rijeka: InTech. doi:10.5772/7815.

  26. 26.

    Zhang, L., Wu, Q., Solanas, A., & Ferrer, J. D. (2010). A scalable robust authentication protocol for secure vehicular communication. IEEE Transactions on Vehicular Technology, 59(4), 1606–1617.

  27. 27.

    Kim, J., & Song, J. (2012). A pre-authentication method for secure communication in vehicular ad hoc networks. In 8th international conference on wireless communication, networking and mobile computing.

  28. 28.

    Xiong, H., Guan, Z., Hu, J., & Chen, Z. (2010). Anonymous authentication protocols for vehicular ad hoc networks: An overview. In J. Sen (Ed.), Computer and information science. Applied cryptography and network security. Rijeka: InTech. doi:10.5772/34675.

  29. 29.

    Chim, T. W., Yiu, S. M., Hui, L. C. K., & Li, V. O. K. (2010). SPECS: Secure and privacy enhancing communication schemes for VANETs. Ad Hoc Networks, 9(2), 189–203.

  30. 30.

    Horng, S. J., Tzeng, S. F., Pan, Y., Fan, P., Wang, X., Li, T., et al. (2013). b-SPECS+: Batch verification for secure pseudonymous authentication in VANET. IEEE Transactions on Information Forensics and Security, 8(11), 1860–1875.

  31. 31.

    Boneh, D., & Franklin, M. (2001). Identity-based encryption from the weil pairing. In Proceedings of 21st annual international cryptology conference on advanced cryptology.

  32. 32.

    Maity, B. B .N. S., & Hansdah, R .C. (2013) . A protocol for authentication with multiple levels of anonymity (AMLA) in VANETs. In 27th international conference on advanced information networking and applications workshops.

  33. 33.

    Liu, B., & Zhang, L. (2013). An improved identity-based batch verification scheme for VANETs. In 5th international conference on intelligent networking and collaborative systems

  34. 34.

    Chim, T. W., Yiu, S. M., Hui, L. C. K., & Li, V. O. K. (2012). MLAS: Multiple level authentication scheme for VANETs. Ad Hoc Networks, 10(7), 1445–1456.

  35. 35.

    Jesudoss, A., Raja, S. V. K., & Park, S. H. (2013). GRAS: A group reliant authentication scheme for V2V communication in VANET. Systemics, Cybernetics and Informatics, 11(6), 47–52.

  36. 36.

    Riley, M., Akkaya, K., & Fong, K. (2010). A survey of authentication schemes for vehicular ad hoc networks. Security and Communication Networks, 4(10), 1137–1152.

  37. 37.

    Zhang, J., Zhen, W., & Xu, M. (2013). An efficient privacy-preserving authentication protocol in VANETs. In 9th international conference on mobile ad-hoc and sensor networks.

  38. 38.

    Liu, J. K., Au, M. H., & Susilo, W. (2007). Self-generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model. In 2nd ACM symposium on Information, computer and communications security. New York: ACM.

  39. 39.

    Darrel, H., & Scott, V. (2003). Guide to elliptic curve cryptography. New York: Springer Professional Computing Publishing Company Incorporated.

  40. 40.

    Aboobaker, A. K. K. (2010). Performance analysis of authentication protocols in vehicular ad hoc networks (VANET). Technical report, Department of Mathematics, Royal Holloway, University of London, Egham, England.

  41. 41.

    Raya, M., & Hubaux, J. P. (2005). The security of vehicular ad hoc networks. In Proceedings of the 3rd ACM workshop on security of ad hoc and sensor networks.

  42. 42.

    http://www.mathworks.com/.

  43. 43.

    Al-kahtani, M. S. (2012). Survey on security attacks in Vehicular ad hoc networks (VANETs). In 6th international conference on signal processing and communication systems.

Download references

Acknowledgments

This work was carried out in the framework of research activities of the laboratory LIMED, which is affiliated to the Faculty of Exact Sciences of the University of Bejaia.

Author information

Correspondence to Mawloud Omar.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Oulhaci, T., Omar, M., Harzine, F. et al. Secure and distributed certification system architecture for safety message authentication in VANET. Telecommun Syst 64, 679–694 (2017). https://doi.org/10.1007/s11235-016-0200-4

Download citation

Keywords

  • Security
  • Public-key certification
  • Threshold signature
  • Safety message authentication
  • VANET