Software-Defined Network enabled Vehicle to Vehicle secured data transmission protocol in VANETs

被引:23
作者
Amin, Ruhul [1 ]
Pali, Isha [2 ]
Sureshkumar, Venkatasamy [3 ]
机构
[1] Dr Shyama Prasad Mukherjee Int Inst Informat Tech, Dept Comp Sci & Engn, Naya Raipur, India
[2] NIIT Univ, Dept Comp Sci & Engn, Neemrana, India
[3] PSG Coll Technol, Dept Appl Math & Computat Sci, Coimbatore, Tamil Nadu, India
关键词
SDN; RSU compromisation attack; Scyther simulation; ANONYMOUS AUTHENTICATION SCHEME; ROAMING SERVICE; VERIFICATION; SDN;
D O I
10.1016/j.jisa.2020.102729
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software-Defined Network (SDN) improves the performance of the network model by managing the whole system through a programmed software. Nowadays, the concept of SDN can be applied in several application areas such as Wireless Sensor Network (WSN), Internet of Things (IoT) communications, cloud-fog computing, Vehicular Ad-hoc Networks (VANETs), etc. To improve the overall network performance, we have integrated SDN technology in the VANET system for Vehicle to Vehicle(V2V) communication. Security is a major concern in the SDN enabled VANET system. The main objective of this paper is to design an authentication protocol which will establish a common session key for secure communication. Further, this paper provides a solution to protect against the RSU compromisation attack which is always a challenging task. The simulation using the Scyther tool confirms that all the private information is being protected during the protocol run. Moreover, informal security analysis shows that the protocol has no security weaknesses. Besides, the proposed protocol achieves better performance in the aspect of security features and also in terms of computation and communication overheads.
引用
收藏
页数:13
相关论文
共 37 条
[1]   Security in Software Defined Networks: A Survey [J].
Ahmad, Ijaz ;
Namal, Suneth ;
Ylianttila, Mika ;
Gurtov, Andrei .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2317-2346
[2]   Security of Software Defined Networks: A survey [J].
Alsmadr, Izzat ;
Xu, Dianxiang .
COMPUTERS & SECURITY, 2015, 53 :79-108
[3]   A secure authentication scheme for VANETs with batch verification [J].
Bayat, Majid ;
Barmshoory, Mostafa ;
Rahimi, Majid ;
Aref, Mohammd Reza .
WIRELESS NETWORKS, 2015, 21 (05) :1733-1743
[4]   A Cross-Layer Approach to Privacy-Preserving Authentication in WAVE-Enabled VANETs [J].
Biswas, Subir ;
Misic, Jelena .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2013, 62 (05) :2182-2192
[5]   An efficient cryptographic protocol verifier based on prolog rules [J].
Blanchet, B .
14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2001, :82-96
[6]  
Cheon JH, 2007, LECT NOTES COMPUT SC, V4450, P442
[7]   Feasibility of multi-protocol attacks [J].
Cremers, Cas .
FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, :287-294
[8]  
Cremers CJF, 2008, LECT NOTES COMPUT SC, V5123, P414
[9]  
Cremers CasJ.F., 2006, Generalizing Needham-Schroeder-Lowe for multi-party authentication
[10]   A Secure and Efficient Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care [J].
Das, Ashok Kumar ;
Goswami, Adrijit .
JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (03)