Advertisement

Abstract

In Vehicular ad-hoc networks (VANET) there is need to tackle various security concerns before they employed. VANET provides safe journey with the help of various secure services and applications thereby plays a critical role in creating Intelligent Transportation system (ITS). Security and privacy problems should be considered prior to their placement to make sure that the secure communication in VANET but along with secure & efficient authentication, Privacy preservation should be also considered to tackle with various complicated communication scenarios [1]. An extensive survey on various privacy preserving in VANET schemes like 2-Flip, EAAP, NECPPA, VSPN, SPACF & PSPPS is done in this paper and an efficient privacy preserving scheme is withdrawn from it on the basis of communication overhead, Message delay & various performance metrics. Extensive review shows that the 2-Flip Privacy Preservation scheme satisfy almost every performance metrics and have least message delay & commination overhead.

Keywords

Vehicular Ad Hoc Networks (VANET) 2FLIP (Two-Factor Lightweight Privacy-preserving authentication scheme) Location based service (LBS) 

References

  1. 1.
    Wang, F., Xu, Y., Zhang, H.: 2FLIP: a two-factor lightweight privacy-preserving authentication scheme for VANET. IEEE Trans. Veh. Technol. 65(2) (2016)CrossRefGoogle Scholar
  2. 2.
    Bao, S., Hathal, W., Cruickshank, H., Sun, Z., Asuquo, P., Lei, A.: A lightweight authentication and privacy preserving scheme for VANETs using TESLA and bloom filters. Springer, ICT Express (2017)Google Scholar
  3. 3.
    de Sales, T.B.M., Perkusich, A., de Sales, L.M., de Almeida, H.O., Soares, G., de Sales, M.: ASAP-V: A Privacy-Preserving Authentication and Sybil Detection Protocol for VANETs. Springer (2016) Google Scholar
  4. 4.
    Zhong, H., Huang, B., Cui, J., Xu, Y., Liu, L.: Conditional privacy-preserving authentication using registration list in vehicular ad hoc networks. In: IEEE Special Section on Internet-of-Things (Iot) Big Data Trust Management, vol. 6 (2018)CrossRefGoogle Scholar
  5. 5.
    Azees, A., Vijayakumar, P., Deboarh, L.J.: EAAP: efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad hoc networks. IEEE Trans. Intell. Transp. Syst. 18(9) (2017)CrossRefGoogle Scholar
  6. 6.
    Pournaghi, S.M., Zahednejad, B., Bayat, M., Farjami, Y.: NECPPA: a novel and efficient conditional privacy-preserving authentication scheme for VANET. J. Comput. Netw. 134, 78–92 (2018)CrossRefGoogle Scholar
  7. 7.
    He, D., Zeadally, S., Xu, B., Huang, X.: An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans. Inf. Forensics Secur 10(12) (2015)Google Scholar
  8. 8.
    Xie, Y., Wu, L., Zhang, Y., Shen, J.: Efficient and secure authentication scheme with conditional privacy-preserving for VANETs. Chin. J. Electron. 25(5) (2016)CrossRefGoogle Scholar
  9. 9.
    Zhong, H., Wen, J., Cui, J., Zhang, S.: Efficient conditional privacy-preserving and authentication scheme for secure service provision in VANET. Tsinghua Sci. Technol. 21(6), 620–629 (2016)CrossRefGoogle Scholar
  10. 10.
    Cui, J., Zhang, J., Zhong H., Xu, Y.: SPACF: a secure privacy-preserving authentication scheme for VANET with cuckoo filter. IEEE Trans. Veh. Technol. 66(11) (2017)CrossRefGoogle Scholar
  11. 11.
    Fei, T.W. Chim, S.M. Yiu, Hui, L.C.K., Li, V.O.K.: VSPN: VANET-based secure and privacy-preserving navigation. IEEE Trans. Comput. 63(2), (2014)Google Scholar
  12. 12.
    Zhang, L., Wu, Q., Qin, B., Domingo-Ferrer, J., Liu, B.: Practical secure and privacy-preserving scheme for value-added applications in VANETs. Comput. Commun. 71, 50–60 (2015)CrossRefGoogle Scholar
  13. 13.
    Al-Sultan, S., Al-Doori, M.M., Al-Bayatti, A.H., Zeden, H.: A comprehensive survey on vehicular ad hoc network. J. Netw. Comput. Appl. 37, 380–392 (2013)CrossRefGoogle Scholar
  14. 14.
    Mohanty, S., Jena, D.: Secure data aggregation in vehicular-adhoc networks: a survey. In: 2nd International Conference on Communication, Computing and Security [ICCCS-2012] Procedoa Technology, vol. 6, pp. 922–929 (2012)CrossRefGoogle Scholar
  15. 15.
    Sumra, I.A., Hasbullah, H.B., Ab Manan, J.-L.: Using grades mechanism to differentiate users in vehicular ad hoc network (VANET). In: 1st International Conference on Future Trends in Computing and Communication Technologies (2012)Google Scholar
  16. 16.
    Goudarzi, S., Abdullah, A.H., Mandala, S., Soleymani, S.A. Baee, M.A.R., Anisi, M.H., Aliyu, M.: A system review of security in vehicular ad hoc network. In: 2nd Symposium on Wireless Sensors and Cellular Networks (WSCN 2013) in Jeddah, Saudi Arabia, paper no. 0144261225-13-016 held on December 2013Google Scholar
  17. 17.
    Moharrum, M.A., Al Daraiseh, A.A.: Toward secure vehicular ad-hoc networks: a survey. IETE Tech. Rev. 29(1), 80–89 (2012)CrossRefGoogle Scholar
  18. 18.
    Rivas, D.A., Barcelo-Ordinad, J.M., Zapata, M.G., Morillo-Pozo, J.D.: Security on VANETs: privacy, misbehaving nodes, false information and secure data aggregation. J. Netw. Comput. Appl. 34, 1942–1955 (2011)CrossRefGoogle Scholar
  19. 19.
    Al-Qutayri, M., Yeun, C., Al-Hawi, F.: Security and privacy of intelligent VANETs. J. Comput. Intell. Mod. Heuristics, 348 (2010)Google Scholar
  20. 20.
    De Fuentes, J.M., Gonzalez-Tablas, A.I., Ribagorda, A.: Overview of security issues in vehicular ad-hoc networks. In: Handbook of Research on Mobility and Computing (2010)Google Scholar
  21. 21.
    Chim, T.W., Yiu, S.M., Hui, L.C.K., Li, V.O.K.: SPECS: secure and privacy enhancing communications schemes for VANETs. Ad Hoc Netw. 9(2), 189–203 (2011)CrossRefGoogle Scholar
  22. 22.
    Zeadally, S., Hunt, R., Chen, Y.-S., Irwin, A., Hassan, A.: Vehicular ad hoc networks (VANETs): status, results, and challenges. Telecomm. Syst. 50(4), 217–241 (2012)CrossRefGoogle Scholar
  23. 23.
    Ghosh, M., Varghese, A., Gupta, A., Kherani, A.A., Muthaiah, S.N.: Detecting misbehaviours in VANET with integrated root-cause analysis. Ad Hoc Netw. 8(7), 778–790 (2010)CrossRefGoogle Scholar
  24. 24.
    Toor, Y., Muhlethaler, P., Laouiti, A.: Vehicle ad hoc networks: applications and related technical issues. IEEE Commun. Surv. Tutor. 10(3), 74–87 (2008)CrossRefGoogle Scholar
  25. 25.
    Boukerche, A., Foliveira, H.A.B., Nakamura, E.F., Loureiro, A.A.F.: Vehicular ad hoc networks: a new challenge for localization-based systems. Comput. Commun. 31(12), 2838–2849 (2008)CrossRefGoogle Scholar
  26. 26.
    Agarwal, P., Bhardwaj, N.: A review on trust model in vehicular ad-hoc network. Int. J. Grid Distrib. Comput. 9(4), 325–334 (2016)CrossRefGoogle Scholar
  27. 27.
    Chuang, M.-C., Lee, J.-F.: Team: trust-extended authentication mechanism for vehicular ad hoc networks. IEEE Syst. J. 8, 749–758 (2014)CrossRefGoogle Scholar
  28. 28.
    Liu, Y., Wang, Y., Chang, G.: Efficient privacy-preserving dual authentication and key agreement scheme for secure V2V communications in an IoV paradigm. IEEE Trans. Intell. Transp. Syst. (2017)Google Scholar
  29. 29.
    Jiang, D., Taliwal, V., Meier, A., Holfelder, W., Herrtwich, R.: Design of 5.9 GHz DSRC-based vehicular safety communication. IEEE Wirel. Commun. 13(5), 36–43 (2006)CrossRefGoogle Scholar
  30. 30.
    Li, J., Lu, H., Guizani, M.: ACPN: a novel authentication framework with conditional privacy-preservation and non-repudiation for vanets. IEEE Trans. Parallel Distrib. Syst. 26(4), 938–948 (2015)CrossRefGoogle Scholar
  31. 31.
    Hubaux, J., Capkun, S., Luo, J.: The security and privacy of smart vehicles. IEEE Secur. Priv. 2(3), 49–55 (2004)CrossRefGoogle Scholar
  32. 32.
    Lin, X., Sun, X., Ho, P., Shen, X.: GSIS: a secure and privacy preserving protocol for vehicular communications. IEEE Trans. Veh. Technol. 56(6), 3442–3456 (2007)CrossRefGoogle Scholar
  33. 33.
    Liu, B., Zhang, L.: An improved identity-based batch verification scheme for VANETs. In: 5th International Conference on Intelligent Networking and Collaborative Systems (INCos 2013), pp. 809–814 (2013)Google Scholar
  34. 34.
    Wang, F., Zeng, D., Yang, L.: Smart cars on smart roads: an IEEE intelligent transportation systems society update. IEEE Pervasive Comput. 5(4), 68–69 (2006)CrossRefGoogle Scholar
  35. 35.
    Oh, H., Yae, C., Ahn, D., Cho, H.: 5.8 GHz DSRC packet communication system for ITS services. In: Proceedings of the IEEE VTS 50th vehicular technology Conference (VTC1999), pp. 2223–2227, September 1999Google Scholar
  36. 36.
    Leontiadis, I., Costa, P., Mascolo, C.: Extending access point connectivity through opportunistic routing in vehicular networks. In: Proceedings of the IEEE INFOCOM 2010, March 2010Google Scholar
  37. 37.
    Zhang, C., Lu, R., Lin, X., Ho, P.H., Shen, X.: An efficient identity-based batch verification scheme for vehicular sensor networks. In: Proceedings of the IEEE INFOCOM 2008, pp. 816–824, April 2008Google Scholar
  38. 38.
    Lu, R., Lin, X., Zhu, H., Shen, X.: SPARK: a new VANET based smart parking scheme for large parking lots. In: Proceedings of the IEEE INFOCOM 2009, pp. 1413–1421, April 2009Google Scholar
  39. 39.
    Raya, M., Hubaux, J.-P.: Securing vehicular ad hoc networks. J. Comput. Secur. 15(1), 39–68 (2007)CrossRefGoogle Scholar
  40. 40.
    Lu, R., Lin, X., Zhu, H., Ho, P.-H., Shen, X.: ECPP: efficient conditional privacy preservation protocol for secure vehicular communications. In: Proceedings of the INFOCOM 2008, pp. 1903–1911 (2008)Google Scholar
  41. 41.
    He, D., Zeadally, S., Kumar, N., Lee, J.-H.: Anonymous authentication for wireless body area networks with provable security. IEEE Syst. J. 11, 2590–2601 (2016)CrossRefGoogle Scholar
  42. 42.
    Guo, P., Wang, J., Li, B., Lee, S.: A variable threshold-value authentication architecture for wireless mesh networks. J. Intern. Technol. 15(6), 929–936 (2014)Google Scholar
  43. 43.
    Papadimitratos, P., Buttyan, L., Holczer, T., Schoch, E., Freudiger, J., Raya, M., Ma, Z., Kargl, F., Kung, A., Hubaux, J.-P.: Secure vehicular communication systems: design and architecture. IEEE Commun. Mag. 46(11), 100–109 (2008)CrossRefGoogle Scholar
  44. 44.
    Ahmed-Zaid, F., et al.: Vehicle safety communications-applications (VSC-A) final report. CAMP-VS Consort, Farmington Hills, MI, USA, NHTSA Pub. DOT HS 811 492A, vol. 3 (2011)Google Scholar
  45. 45.
    Intelligent Transport Systems (ITS): Security, ITS Communications Security Architecture and Security Management, ETSI TS 102 940, V0.0.13, March 2012Google Scholar
  46. 46.
    Chim, T., Yiu, S., Hui, L.C., Li, V.O.: SPECS: secure and privacy enhancing communications for VANET. Ad Hoc Netw. 9(2), 189–203 (2010)CrossRefGoogle Scholar
  47. 47.
    Hwang, R., Hsiao, Y., Liu, Y.: Secure communication scheme of VANET with privacy preserving. In: Proceedings of the IEEE 17th International Conference on Parallel and Distributed Systems (ICPADS 2011), pp. 654–659, December 2011Google Scholar
  48. 48.
    Wasef, A., Shen, X.: PPGCV: privacy preserving group communications protocol for vehicular ad hoc networks. In: Proceedings of the IEEE International Conference on Communication (ICC 2008), pp. 1458–1463, May 2008Google Scholar
  49. 49.
    Englund, C., Chen, L., Vinel, A., Lin, S.Y.: Future Applications of VANETs. Springer, Cham (2015)CrossRefGoogle Scholar
  50. 50.
    Lu, H., Li, J.: Privacy-preserving authentication schemes for vehicular ad hoc networks: A survey. Wirel. Commun. Mob. Comput. 16(6), 643–655 (2016)CrossRefGoogle Scholar
  51. 51.
    Di Pietro, R., Guarino, S., Verde, N.V., Domingo-Ferrer, J.: Security in wireless ad-hoc networks: a survey. Comput. Commun. 51, 1–20 (2014)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.SVKM’s NMIMS MPSTMEShirpurIndia

Personalised recommendations