Secure Reactive Fast Proxy MIPv6-Based NEtwork MObility (SRFP-NEMO) for Vehicular Ad-hoc Networks (VANETs)

被引:0
作者
Ben Ameur, Sirine [1 ]
Obaidat, Mohammad S. [2 ,3 ,4 ]
Smaoui, Salima [1 ]
Zarai, Faouzi [1 ]
机构
[1] Univ Sfax, NTS Com Res Unit, Sfax, Tunisia
[2] Nazarbayev Univ, ECE Dept, Astana, Kazakhstan
[3] Univ Jordan, KASIT, Amman, Jordan
[4] Univ Sci & Technol Beijing, Beijing, Peoples R China
关键词
Fast handover; PMIPV6; VANET; security; Mobile Networks; NEMO; AVISPA; MANAGEMENT; SCHEME; PROTOCOLS; PMIPV6;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Vehicular communication is considered as a key technology for enhancing road safety. In fact, Vehicular Ad hoc NETworks (VANETs) are regarded as the most suitable technology to provide vehicles with communication capabilities as a mean to reach this intension. Whereas, to guarantee their widest possible adoption, mobility management must be carefully investigated. Therefore, due to the low signaling costs and handover latency, the protocol Proxy Mobile IPv6 (PMIPv6) can be well deployed in these networks. In addition, to offer reachability, Internet connectivity and session continuity for a whole mobile group of nodes, the Network Mobility Basic Support Protocol (NEMO BSP) has been developed by the IETF and has gained a widespread attention. The mobility support provided by these solutions (PMIPv6 and NEMO BSP) increments the vulnerability of mobility protocols against various attacks. Consequently, many schemes have been proposed to resolve this problem. However, the majorities still suffer from many security problems, especially the fact that they do not define an optimized authentication method between communicant nodes in schemes adapting fast handover in Proxy MIPv6 with NEMO (FP-NEMO) to reduce handover latency. Thus, this article proposes a Secure Reactive Fast Proxy MIPv6-Based NEtwork MObility (SRFP-NEMO) for Vehicular Ad-hoc networks (VANETs) which ensures strong authentication between entities. Our scheme is based only on symmetric cryptography in order to resolve the constraints of the PKI cryptography. To evaluate the security performance of our proposition, we have used the AVISPA/SPAN software which guarantees that our proposed protocol is a safe scheme. The performance of our proposed protocol is, finally, evaluated and compared with other solutions.
引用
收藏
页码:27 / 57
页数:31
相关论文
共 42 条
[1]  
[Anonymous], 2016, NETWORK PROTOCOLS AL
[2]  
[Anonymous], 2008, RFC 5213
[3]  
[Anonymous], INT J APPL ENG RES
[4]  
Baek Jaejong, 2016, Journal of Information and Communication Convergence Engineering, V14, P89, DOI 10.6109/jicce.2016.14.2.089
[5]   Proxy Mobile IPv6 Handover Management in Vehicular Networks: State of the Art, Taxonomy and Directions for Future Research [J].
Balfaqih, Mohammed ;
Ismail, Mahamod ;
Nordin, Rosdiadee ;
Balfaqih, Zain A. .
WIRELESS PERSONAL COMMUNICATIONS, 2015, 84 (02) :1509-1534
[6]  
Basin D., 2005, Int. J. Inf. Secur., V4, P181, DOI [10.1007/s10207-004-0055-7, DOI 10.1007/S10207-004-0055-7]
[7]  
Ben Ameur S., 2014, 4 INT C NETW INFR DI
[8]  
Ben Ameur S., 2015, 5 INT C SIM MOD METH, P439
[9]  
Bi Y., 2016, IEEE T INTELLIGENT T, V17
[10]  
Biswas S., 2017, INT S SEC COMP COMM, P65