A trust infrastructure based authentication method for clustered vehicular ad hoc networks

被引:0
作者
Fatemehsadat Mirsadeghi
Marjan Kuchaki Rafsanjani
Brij B. Gupta
机构
[1] Shahid Bahonar University of Kerman,Department of Computer Science, Faculty of Mathematics and Computer
[2] National Institute of Technology,Department of Computer Engineering
[3] Asia University,Department of Computer Science and Information Engineering
[4] Macquarie University,undefined
来源
Peer-to-Peer Networking and Applications | 2021年 / 14卷
关键词
Vehicular ad hoc networks (VANETs); Authentication; Trust management; Clustering; Monitoring;
D O I
暂无
中图分类号
学科分类号
摘要
Vehicular Ad hoc Networks (VANETs) as a subset of mobile ad hoc networks which allow communication between any vehicle with other adjacent vehicles, road side units and infrastructure. In these networks, the purpose is to enhance the security, improve the management of urban and road traffic and provide services to the passenger. Due to problems such as reliability and privacy, messages that are exchanged in the network should be confidential and secure. Therefore, we need a secure topology to maintain trust, which enables the cryptographic process. In this paper, a trust based authentication method for clustered vehicular ad hoc networks is proposed. The efficient authentication method should be able to accurately detect malicious nodes and reduced delay and overhead. The main purpose of the proposed method is to create trustworthy and stable clusters that lead to the stability of the entire network. For this purpose, we estimate the trust degree of each vehicle by combining the trust between vehicles and the trust between the vehicle and Road Side Units (RSUs), and Cluster Heads (CHs) are selected based on this estimated trust degree. Cluster Heads along with verifiers are responsible for monitoring each vehicle. On the other hand, the cluster heads provide an optimal and secure route for transmitting messages. Messages are digitally signed by the sender and encrypted using a public/private key as distributed by a Trusted Authority (TA) and decrypted by the destination; so that each message contains a certificate from a trusted authority. In this identification, the sender and receiver of the message are verified and authentication will be achieved. By simulation results, it is proves that the proposed method increases the accuracy in detecting malicious nodes and the packet delivery ratio, and decreases the delay of authentication and overhead.
引用
收藏
页码:2537 / 2553
页数:16
相关论文
共 94 条
[1]  
Kuchaki Rafsanjani M(2015)FBeeAdHoc: A secure routing protocol for BeeAdHoc based on fuzzy logic in MANETs International Journal of Electronics and Communications (AEÜ) 69 1613-1621
[2]  
Fatemidokht H(2015)Self-adaptive routing protocol with delay range for inter-vehicle case networks Soft Calculations journal 4 68-83
[3]  
Movahedi Z(2006)Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks Wirel Netw 12 709-721
[4]  
Mazandarani A(2014)A comprehensive survey on vehicular ad hoc network J Netw Comput Appl 37 380-392
[5]  
Pietro RD(2015)Survey on security issues in vehicular ad hoc Alexandria Engineering Journal 54 1115-1126
[6]  
Mancini LV(2014)VANET security surveys Comput Commun 44 1-13
[7]  
Mei A(2016)A comprehensive survey on security services in vehicular ad hoc networks (VANETs) IET Intell Transp Syst 10 379-388
[8]  
Al-Sultan S(2018)Dynamic trust model for vehicular cyber-physical systems International Journal of Network Security 20 157-167
[9]  
Al-Doori MM(2014)Clustering in vehicular ad hoc networks: taxonomy, challenges and solutions Vehicular Communications 1 134-152
[10]  
Al-Bayatti AH(2015)A survey of all existing clustering protocols in VANETs but main emphasis of survey laid on currently using protocol i.e. TCDGP International Journal of Computer Applications 118 22-31