An intelligent approach for building a secure decentralized public key infrastructure in VANET

被引:78
作者
Kumar, Neeraj [1 ]
Iqbal, Rahat [2 ]
Misra, Sudip [3 ]
Rodrigues, Joel J. P. C. [4 ,5 ]
机构
[1] Thapar Univ, Dept Comp Sci & Engn, Patiala 147004, Punjab, India
[2] Coventry Univ, Dept Comp & Digitial Environm, Coventry, W Midlands, England
[3] Indian Inst Technol, Sch Informat Technol, Kharagpur 721302, W Bengal, India
[4] Univ Beira Interior, Inst Telecomunicacoes, Covilha, Portugal
[5] ITMO Univ, St Petersburg, Russia
关键词
Vehicular Ad Hoc networks; Learning Automata; Security; Bayesian Coalition Game; LEARNING AUTOMATA; CLUSTERING-ALGORITHM; PRIVACY; SCHEME; AUTHENTICATION; PROTOCOL; NETWORKS;
D O I
10.1016/j.jcss.2014.12.016
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposed an efficient decentralized public key infrastructure (PKI) using the concepts of Bayesian Coalition Game (BCG) and Learning Automata (LA). LA are assumed as the players in the game, which coordinate among one another for information sharing. To preserve the confidentiality and integrity of the messages, dynamic coalition among the players of the game is formulated using symmetric key encryption and hash-based message authentication. Also, privacy preservation and certificate. revocation are included in the proposed scheme to defend against the misbehaving vehicles. For each action taken by an automaton, its action may be rewarded/penalized by the environment in which it operates. LA update their actions probability matrices by getting the reinforcement signal from the environment. The performance of the proposed scheme is evaluated with respect to various metrics in comparison to the other state-of-the-art existing schemes. The results obtained prove the superiority of the proposed scheme. (C) 2014 Elsevier Inc. All rights reserved.
引用
收藏
页码:1042 / 1058
页数:17
相关论文
共 40 条
[1]  
[Anonymous], J NETWORKS COMPUT AP
[2]  
[Anonymous], TECHNICAL REPORT
[3]  
[Anonymous], 2009, P IEEE GLOB TEL C GL
[4]   The use of learning algorithms in ATM networks call admission control problem: a methodology [J].
Atlasis, AF ;
Loukas, NH ;
Vasilakos, AV .
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 2000, 34 (03) :341-353
[5]  
Boneh D, 2011, INT C THEOR APPL CRY, P514
[6]   SPECS: Secure and privacy enhancing communications schemes for VANETs [J].
Chim, T. W. ;
Yiu, S. M. ;
Hui, Lucas C. K. ;
Li, Victor O. K. .
AD HOC NETWORKS, 2011, 9 (02) :189-203
[7]   An advanced security scheme based on clustering and key distribution in vehicular ad-hoc networks [J].
Daeinabi, Ameneh ;
Rahbar, Akbar Ghaffarpour .
COMPUTERS & ELECTRICAL ENGINEERING, 2014, 40 (02) :517-529
[8]   A systematic review on routing protocols for Vehicular Ad Hoc Networks [J].
Dua, Amit ;
Kumar, Neeraj ;
Bawa, Seema .
VEHICULAR COMMUNICATIONS, 2014, 1 (01) :33-52
[9]   On the Partially Overlapped Channel Assignment on Wireless Mesh Network Backbone: A Game Theoretic Approach [J].
Duarte, Pedro B. F. ;
Fadlullah, Zubair Md ;
Vasilakos, Athanasios V. ;
Kato, Nei .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2012, 30 (01) :119-127
[10]   PPREM: Privacy Preserving REvocation Mechanism for Vehicular Ad Hoc Networks [J].
Ganan, Carlos ;
Munoz, Jose L. ;
Esparza, Oscar ;
Mata-Diaz, Jorge ;
Alins, Juanjo .
COMPUTER STANDARDS & INTERFACES, 2014, 36 (03) :513-523