Skip to main content

SARP: secure routing protocol using anonymous authentication in vehicular Ad-hoc networks

Abstract

Vehicular Ad-hoc Network (VANET) is a collection of interconnected smart vehicles. Underlying wireless technology enables communication within vehicles as well as between road infrastructure and vehicles. Security plays a vital role during transmission of safety and important messages due to the open-access environment of VANET. Several security challenges need to be addressed in order to enable a real-time use of VANET. The significant goal of the paper is to propose a Secure Anonymous Routing Protocol (SARP) that is the extension of ACO-IBR. The SARP uses anonymous authentication methodology alongwith bilinear paring technique. The protocol verifies authenticity of the vehicles and integrity of the messages that participate in the communication process at the route discovery phase and it is resistant to various attacks. The simulation based QoS performance of the SARP routing protocol is evaluated using collision rate, packet delivery ratio, delay & throughput. SARP observed 0.023, 0.048, 0.028s less delay and 8.63, 11.52, 10.49 less overhead as compared to the ACO-IBR, GPSR and IBR. The performance is evaluated in terms of communication overhead and computational time that enhance security efficiently. It is observed that SARP requires 224.4ms computational time and 568-byte communication overhead for 100 vehicles.

This is a preview of subscription content, access via your institution.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Data availability statement

The data used to support the findings of this study are available from the corresponding author upon request.

References

  1. (2020) Pbc library - pairing-based cryptography - about. https://crypto.stanford.edu/pbc/, Accessed 03/10/2020

  2. Arif M, Wang G, Bhuiyan MZA, Wang T, Chen J (2019) A survey on security attacks in vanets: Communication, applications and challenges. Veh Commun 19:1–36

    Google Scholar 

  3. Azees M, Vijayakumar P, Deborah L (2016) Comprehensive survey on security services in vehicular ad-hoc networks. IET Intell Transp Syst 10:379–388

    Article  Google Scholar 

  4. Azees M, Vijayakumar P, Deboarh LJ (2017) Eaap: Efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad hoc networks. IEEE Trans Intell Transp Syst 18(9):2467–2476. https://doi.org/10.1109/TITS.2016.2634623

    Article  Google Scholar 

  5. Bayat M, Barmshory M, Pournaghi SM, Rahimi M, Farjami Y, Aref M (2020) A new and efficient authentication scheme for vehicular ad hoc networks. J Intell Transp Syst 24:171–183

    Article  Google Scholar 

  6. Ben Mussa SA, Manaf M, Ghafoor KZ, Doukha Z (2015) Simulation tools for vehicular ad hoc networks: A comparison study and future perspectives. In: 2015 International Conference on Wireless Networks and Mobile Communications (WINCOM), pp 1–8, https://doi.org/10.1109/WINCOM.2015.7381319

  7. Bhoi SK, Khilar PM (2014) Vehicular communication: a survey. IET Netw 3(3):204–217

    Article  Google Scholar 

  8. Boneh D (2012) Pairing-based cryptography: Past, present, and future. In: Wang X, Sako K (eds) Advances in Cryptology – ASIACRYPT 2012. Lecture notes in computer science, vol 7658. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34961-4_1

  9. Boneh D, Lynn B, Shacham H (2004) Short signatures from the weil pairing. J Cryptol 17:297–319

    MathSciNet  MATH  Article  Google Scholar 

  10. Chaum D, van Heyst E (1991) Group signatures. In: Davies DW (ed) Advances in Cryptology – EUROCRYPT ’91. Springer Berlin Heidelberg, Berlin, Heidelberg, pp 257–265

    Chapter  Google Scholar 

  11. Gao T, Li Y, Guo N, You I (2018) An anonymous access authentication scheme for vehicular ad hoc networks under edge computing. Int J Distrib Sens Netw 14(2):1–16. https://doi.org/10.1177/1550147718756581

    Article  Google Scholar 

  12. Han M, Liu S, Shidian M, Wan A (2020) Anonymous-authentication scheme based on fog computing for vanet. PLoS One 15:1–19. https://doi.org/10.1371/journal.pone.0228319

    Article  Google Scholar 

  13. Harri J, Filali F, Bonnet C (2009) Mobility models for vehicular ad hoc networks: a survey and taxonomy. IEEE Commun Surv Tutor 11(4):19–41. https://doi.org/10.1109/SURV.2009.090403

    Article  Google Scholar 

  14. He D, Zeadally S, Xu B, Huang X (2015) An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans Inf Forensics Secur 10(12):2681–2691. https://doi.org/10.1109/TIFS.2015.2473820

    Article  Google Scholar 

  15. Huang D, Misra S, Verma M, Xue G (2011) Pacp: an efficient pseudonymous authentication-based conditional privacy protocol for vanets. IEEE Trans Intell Transp Syst 12(3):736–746. https://doi.org/10.1109/TITS.2011.2156790

    Article  Google Scholar 

  16. Huang J, Fang D, Qian Y, Hu RQ (2020) Recent advances and challenges in security and privacy for v2x communications. IEEE Open J Veh Technol 1:244–266. https://doi.org/10.1109/OJVT.2020.2999885

    Article  Google Scholar 

  17. Imran S, Karthick RV, Visu P (2015) Dd-sarp: Dynamic data secure anonymous routing protocol for manets in attacking environments. In: 2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM), 39–46. https://doi.org/10.1109/ICSTM.2015.7225388

  18. Jiang S, Zhu X, Wang L (2016) An efficient anonymous batch authentication scheme based on hmac for vanets. IEEE Trans Intell Transp Syst 17(8):2193–2204. https://doi.org/10.1109/TITS.2016.2517603

    Article  Google Scholar 

  19. Kanenari T, Takahashi Y, Hashimoto Y, Kodera Y, Kusaka T, Nogami Y, Nakanishi T (2019) A comparison of relic-toolkit and elips libraries for a pairing-based homomorphic encryption. In: 2019 34th International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC), 1–4. https://doi.org/10.1109/ITC-CSCC.2019.8793446

  20. Karp B, Kung HT (2000) GPSR: greedy perimeter stateless routing for wireless networks. In: Proceedings of the 6th annual international conference on Mobile computing and networking (MobiCom'00), Association for Computing Machinery, New York, NY, USA, pp 243–254

    Google Scholar 

  21. Kenney JB (2011) Dedicated short-range communications (dsrc) standards in the united states. Proceedings of the IEEE 99(7):1162–1182. https://doi.org/10.1109/JPROC.2011.2132790

    Article  Google Scholar 

  22. Lin X, Sun X, Ho P, Shen X (2007) Gsis: a secure and privacy-preserving protocol for vehicular communications. IEEE Trans Veh Technol 56:3442–3456

    Article  Google Scholar 

  23. Liu Y, Wang L, Chen HH (2015) Message authentication using proxy vehicles in vehicular ad hoc networks. IEEE Trans Veh Technol 64(8):3697–3710. https://doi.org/10.1109/TVT.2014.2358633

    Article  Google Scholar 

  24. Lu R, Lin X, Zhu H, Ho PH, Shen X (2008) Ecpp: Efficient conditional privacy preservation protocol for secure vehicular communications. In: IEEE INFOCOM 2008 - The 27th Conference on Computer Communications, 1229–1237. https://doi.org/10.1109/INFOCOM.2008.179

  25. Lu Z, Qu G, Liu Z (2019) A survey on recent advances in vehicular network security, trust, and privacy. IEEE Transactions on Intelligent Transportation Systems 20(2):760–776. https://doi.org/10.1109/TITS.2018.2818888

    Article  Google Scholar 

  26. Manvi SS, Tangade S (2017) A survey on authentication schemes in vanets for secured communication. Veh Commun 9:19–30. https://doi.org/10.1016/j.vehcom.2017.02.001

    Article  Google Scholar 

  27. Miracl (2020) https://miracl.com/about-miracl/, Accessed 04/30/2020

  28. Raya M, Hubaux J-P (2007) Securing vehicular ad hoc networks. J Comput Secur 15(1):39–68

    Article  Google Scholar 

  29. S R, S LK (2015) Sharp: Secured hierarchical anonymous routing protocol for manets. In: 2015 International Conference on Computer Communication and Informatics (ICCCI), 1–6. https://doi.org/10.1109/ICCCI.2015.7218121

  30. Samatha B, Kumar DR, Karyemsetty N (2017) Design and simulation of vehicular adhoc network using sumo and ns 2. Adv Wirel Mobile Commun 10(5):1207–1219

    Google Scholar 

  31. Shen H, Zhao L (2011) Alert: an anonymous location-based efficient routing protocol in manets. IEEE Trans Mobile Comput 12:1079–1093

    Article  Google Scholar 

  32. Shim KA (2012) Cpas: An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Transactions on Vehicular Technology 61(4):1874–1883. https://doi.org/10.1109/TVT.2012.2186992

    Article  Google Scholar 

  33. Silva A, Reza N, Oliveira AM (2019) Improvement and performance evaluation of gpsr-based routing techniques for vehicular ad hoc networks. IEEE Access 7:21722–21733

    Article  Google Scholar 

  34. Tyagi P, Dembla D (2017) Performance analysis and implementation of proposed mechanism for detection and prevention of security attacks in routing protocols of vehicular ad-hoc network (vanet). Egypt Inf J 18(2):133–139. https://doi.org/10.1016/j.eij.2016.11.003

    Article  Google Scholar 

  35. Vijayakumar P, Azees M, Deborah LJ (2015) Cpav: Computationally efficient privacy preserving anonymous authentication scheme for vehicular ad hoc networks. In: 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing, pp 62–67. https://doi.org/10.1109/CSCloud.2015.32

  36. Wang Y, Zhong H, Xu Y, Cui J (2016) Ecpb: efficient conditional privacy-preserving authentication scheme supporting batch verification for vanets. Int J Netw Secur 18:374–382

    Google Scholar 

  37. Wei Z, Li J, Wang X, Gao CZ (2019) A lightweight privacy-preserving protocol for vanets based on secure outsourcing computing. IEEE Access 7:62785–62793. https://doi.org/10.1109/ACCESS.2019.2915794

    Article  Google Scholar 

  38. Yelure B, Sonavane S (2020) Aco-ibr: a modified intersection-based routing approach for the vanet. IET Netw 9:348–359

    Article  Google Scholar 

  39. Yelure B, Sonavane S (2021) Performance of routing protocols using mobility models in VANET. In: Deshpande P, Abraham A, Iyer B, Ma K (eds) Next generation information processing system, advances in intelligent systems and computing, vol 1162. Springer, Singapore, pp 272–280. https://doi.org/10.1007/978-981-15-4851-2_29

    Chapter  Google Scholar 

  40. Zhang J, Xu M, Liu L (2014) On the security of a secure batch verification with group testing for vanet. Int J Netw Secur 16:355–362

    Google Scholar 

Download references

Author information

Affiliations

Authors

Corresponding author

Correspondence to Bhushan Yelure.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Yelure, B., Sonavane, S. SARP: secure routing protocol using anonymous authentication in vehicular Ad-hoc networks. J Ambient Intell Human Comput (2021). https://doi.org/10.1007/s12652-021-03486-1

Download citation

Keywords

  • VANET
  • Security
  • Anonymous authentication
  • Computational time
  • Communication Overhead