Infrastructure based Authentication in VANETs
نویسندگان
چکیده
In a vehicular ad-hoc networks (VANETs), the veracity of a message requires authentication of the source vehicle. In this work, a technique for mutual authentication of a vehicle and road side unit (RSU) that preserves the privacy of the vehicle is proposed. The technique relies on the traffic authorities and assumes a hierarchical structure comprising a central trusted authority (TA) with state level trusted authorities (STA) and city level trusted authorities (CTA). Vehicles and RSU have public private key pairs and each vehicleCTA and RSU – CTA share a symmetric key. An RSU can be malicious and a vehicle can be malicious and a vehicle can communicate with a CTA only via an RSU and vice-versa. This requires message exchange in the RSU mediated communication between vehicles and CTAs to be confidential. The process is bandwidth efficient and needs only one request-reply message pair between vehicle and the (RSUCTA-STA-TA) infrastructure. The time taken is in the order of milliseconds which constitutes only a small portion of the stay time of a vehicle within an RSU region.
منابع مشابه
An Efficient Authentication Scheme with Privacy Preserving for 1 Vehicular Ad - Hoc Networks
2 Vehicular ad hoc networks (VANETs) provide opportunities to exchange traffic information among 3 vehicles and infrastructures enhancing the transportation safety and driving experiences. Due to 4 the criticality of exchanged information, message authentication which will not expose the privacy 5 of vehicles is required. The majority of current authentication schemes for VANETs depend 6 primar...
متن کاملAn ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاملPublic Key Infrastructure (PKI) using Symmetric Key Cryptography (SC) in VANETs
Vehicular Ad-Hoc Network (VANETs) provides the vehicle to vehicle (V2V) communication for the safety application. There are many security requirements in VANETs. ECDSA algorithm fulfils all the security requirements but it’s come with the processing overhead and there is a chance of computation based DoS attack. However the VANETs are the time constrained each safety message should be reached a...
متن کاملQuick Message Authentication Protocol for Vehicular AD HOC Networks
Public Key Infrastructure (PKI) plays very important role in Vehicular Ad hoc Networks (VANETs). In this system; confirmation of received message can be done by checking the sender’s certificate is included in the Certificate Revocation Lists (CRLs), which means checking its revocation status, then, substantiating the sender’s certificate, and finally validating the sender’s signature. Since th...
متن کاملBroadcasting Message Authentication Protocol for Vehicular Ad Hoc Networks Using Cluster Technique
It is well recognized that security plays a vital for the trustworthy operation of vehicular ad hoc networks (VANETs). One of the critical sanctuary issues is the revocation of misbehaving vehicles, which is essential for the prevention of malicious vehicles from other vehicles. Vehicular ad hoc networks (VANETs) adopt the Public Key infrastructure (PKI) and Certificate Revocation Lists (CRLs) ...
متن کاملNon line of Sight Location Verification in EMAP for Vehicular Ad Hoc Networks
The security in VANETs is improvised with the involvement of Public Key Infrastructure (PKI) and Certificate Revocation List (CRL) through message authentication and the data transmissions are improved through NLOS. The direct communications between vehicles are blocked with interference of obstacles like trucks, buildings. These problems are overcome through NLOS conditions such as location ve...
متن کامل