Trust Management Scheme Based on Hybrid Cryptography for Secure Communications in VANETs

被引:67
作者
Tangade, Shrikant [1 ]
Manvi, Sunilkumar S. [2 ]
Lorenz, Pascal [3 ]
机构
[1] REVA Univ, Sch Elect & Commun Engn, Bengaluru 560064, India
[2] REVA Univ, Sch Comp & Informat Technol, Bengaluru 560064, India
[3] Univ Haute Alsace, F-68008 Colmar, France
关键词
Security; trust management; identity-based (IDbased) signature; hashed message authentication code; vehicular ad hoc networks (VANETs); PRIVACY-PRESERVING AUTHENTICATION;
D O I
10.1109/TVT.2020.2981127
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Vehicular Ad hoc Networks (VANETs) are used to improve traffic management and reduce the number of road accidents by providing safety applications. However, VANETs are susceptible to a number of security attacks from malicious entities. To secure the network against these attacks, most of the researchers have proposed various security schemes based on cryptography and trust management. While both cryptography and trust management are effective to some extent, each scheme has some flaw to fully secure the network. In this paper, we propose a trust management scheme based on hybrid cryptography (TMHC) to secure VANET to a larger extent. As authentication is an integral part of trust establishment and secure communications between vehicles, the proposed TMHC integrates hybrid cryptography based authentication for efficient and robust trust management scheme. The hybrid cryptography includes, asymmetric identity-based (ID-based) digital signature and symmetric hash message authentication code (HMAC). The trusted road-side unit (RSU) evaluates trust-value, whereas, agent trusted authority (ATA) computes trust-value of vehicle based on its reward-points. The results are gained with extensive simulations to validate the proposed scheme. The results show that the proposed scheme meets security requirements and performs effectively. The communication overhead, computation overhead, storage overhead, and end-to-end delay of the proposed scheme were improved by 6% to 15%, 9% to 23%, 7% to 19%, and 4% to 15.85%, respectively, as compared to existing schemes.
引用
收藏
页码:5232 / 5243
页数:12
相关论文
共 34 条
[1]   TEAM: A Trust Evaluation and Management Framework in Context-Enabled Vehicular Ad-Hoc Networks [J].
Ahmad, Farhan ;
Franqueira, Virginia N. L. ;
Adnane, Asma .
IEEE ACCESS, 2018, 6 :28643-28660
[2]   Faith in Vehicles: A Set of Evaluation Criteria for Trust Management in Vehicular Ad-hoc Network [J].
Ahmad, Farhan ;
Hall, Jordan ;
Adnane, Asma ;
Franqueira, Virginia N. L. .
2017 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2017, :44-52
[3]  
[Anonymous], 2006, Protecting Against the Uncertain Risks of Exposure to Very Low Concentrations of Chemical Warfare Nerve Agents
[4]  
[Anonymous], 2016, 2016 1 INT C INN
[5]   A Secure and Efficient Authentication Technique for Vehicular Ad-Hoc Networks [J].
Asaar, Maryam Rajabzadeh ;
Salmasizadeh, Mahmoud ;
Susilo, Willy ;
Majidi, Akbar .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (06) :5409-5423
[6]   EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks [J].
Azees, Maria ;
Vijayakumar, Pandi ;
Deboarh, Lazarus Jegatha .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2017, 18 (09) :2467-2476
[7]   Comprehensive survey on security services in vehicular ad-hoc networks [J].
Azees, Maria ;
Vijayakumar, Pandi ;
Deborah, Lazarus Jegatha .
IET INTELLIGENT TRANSPORT SYSTEMS, 2016, 10 (06) :379-388
[8]   A secure authentication scheme for VANETs with batch verification [J].
Bayat, Majid ;
Barmshoory, Mostafa ;
Rahimi, Majid ;
Aref, Mohammd Reza .
WIRELESS NETWORKS, 2015, 21 (05) :1733-1743
[9]   Short signatures from the Weil pairing [J].
Boneh, D ;
Lynn, B ;
Shacham, H .
JOURNAL OF CRYPTOLOGY, 2004, 17 (04) :297-319
[10]   VANET security surveys [J].
Engoulou, Richard Gilles ;
Bellaiche, Martine ;
Pierre, Samuel ;
Quintero, Alejandro .
COMPUTER COMMUNICATIONS, 2014, 44 :1-13