Skip to main content
Log in

Trust based authentication technique for cluster based vehicular ad hoc networks (VANET)

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Since Vehicular ad hoc networks (VANETs) are vulnerable to various kinds of attacks, there is a need to fulfill the security requirements like message privacy, integrity, and authentication. The authentication technique is said to be efficient if it detects compromised nodes accurately with less complexity, reduced authentication delay, and keying overhead. In this paper, a trust-based authentication scheme for cluster-based VANETs is proposed. The vehicles are clustered, and the trust degree of each node is estimated. The trust degree is a combination of direct trust degree and indirect trust degree. Based on this estimated trust degree, cluster heads are selected. Then, each vehicle is monitored by a set of verifiers, and the messages are digitally signed by the sender and encrypted using a public/ private key as distributed by a trusted authority and decrypted by the destination. This verifies the identity of sender as well as receiver thus providing authentication to the scheme. By simulation results, we prove that the proposed technique provides high security with less overhead and delay.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Network simulator, http://www.isi.edu/nsnam/ns.

  2. Qin, H., Li, Z. Wang, Y., Lu, X., Zhang, W. S., & Wang, G. (2010). An integrated network of roadside sensors and vehicles for driving safety: Concept, design and experiments. In IEEE International Conference on Pervasive Computing and Communications (PerCom).

  3. Feng, W., Alshaer, H., & Elmirghani, J. M. H. (2010). Green information and communication technology: Energy efficiency in a motorway model. IET Communications, 4(7), 850–860.

    Article  Google Scholar 

  4. Pradeep, B., Manohara Pai, M. M., Boussedjra, M., & Mouzna, J. (2009). Global public key algorithm for secure location service in VANET. In 9th International Conference on Intelligent Transport Systems Telecommunications, (ITST).

  5. Rivas, D. A., Barcelo-Ordinas, J. M., Zapata, M. G., & Morillo-Pozo, J. D. (2011). Security on VANETs: Privacy, misbehaving nodes, false information and secure data aggregation. Journal of Network and Computer Applications, 34(6), 1942–1955.

    Article  Google Scholar 

  6. Nayyar, Z., Khattak, M. A. K., Saqib, N. A., & Rafique, N. (2015). Secure clustering in vehicular ad hoc networks. International Journal of Advanced Computer Science and Applications (IJACSA), 6(9), 285–291.

    Google Scholar 

  7. Feng, W., & Elmirghani, J. M. H. (2009). Green ICT: Energy efficiency in a motorway model. In Third International Conference on Next Generation Mobile Applications, Services and Technologies.

  8. Plößl, Klaus, & Federrath, Hannes. (2008). A privacy aware and efficient security infrastructure for vehicular ad hoc networks. Computer Standards and Interfaces, 30, 390–397.

    Article  Google Scholar 

  9. Mokhtara, Bassem, & Azab, Mohamed. (2015). Survey on security issues in vehicular ad hoc networks. Alexandria Engineering Journal, 54(4), 1115–1126.

    Article  Google Scholar 

  10. Qian, Y., & Moayeri, N. (2008). Design secure and application-oriented VANET. In IEEE Vehicular Technology Conference, VTC Spring.

  11. Fathian, M., & Jafarian-Moghaddam, A. R. (2015). New clustering algorithms for vehicular ad-hoc network in a highway communication environment. Wireless Networks, 21(8), 2765–2780.

    Article  Google Scholar 

  12. Daeinabi, A., & Rahbar, A. G. (2013). An advanced security scheme based on clustering and key distribution in vehicular ad-hoc networks. Computers and Electrical Engineering.

  13. Gañán, C., Muñoz, J. L., Esparza, O., Mata-Díaz, J., & Alins, J. (2014). PPREM: Privacy preserving REvocation mechanism for vehicular ad hoc networks. Computer Standards and Interfaces, 36, 513–523.

    Article  Google Scholar 

  14. Zhizhong, J., Chuanhe, H., Liya, X., Bo, W., Xi, C., & Xiying, F. (2012). A trusted opportunistic routing algorithm for VANET. In IEEE Third International Conference on In Networking and Distributed Computing (ICNDC), pp. 86–90.

  15. Chen, T., Mehani, O., & Boreli, R. (2009). Trusted routing for VANET. In IEEE 9th International Conference on Intelligent Transport Systems Telecommunications, (ITST).

  16. Chim, T. W., Yiu, S. M., Hui, L. C. K., & Li, V. O. K. (2014). VSPN: VANET-based secure and privacy-preserving navigation. IEEE Transactions on Computers, 63(2), 1–14.

    Article  MathSciNet  Google Scholar 

  17. Barba, C. T., Aguiar, L. U., Igartua, M. A., Parra-Arnau, J., Rebollo-Monedero, D., Forné, J., et al. (2013). A collaborative protocol for anonymous reporting in vehicular ad hoc networks. Computer Standards and Interfaces, 36, 188–197.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Sugumar.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sugumar, R., Rengarajan, A. & Jayakumar, C. Trust based authentication technique for cluster based vehicular ad hoc networks (VANET). Wireless Netw 24, 373–382 (2018). https://doi.org/10.1007/s11276-016-1336-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-016-1336-6

Keywords

Navigation