Affiliation:
1. Science and Research Branch, Islamic Azad University, Tehran, Iran
2. Naein Branch, Islamic Azad University
Abstract
AbstractIn the recent research of vehicular ad-hoc networks (VANETs), new practical goals are pursued. They provide real-world communications between vehicles and make them reliable and easy-used. The VANETs have a fundamental role in reducing traffic accidents and improving traffic on the roads. Authentication in VANETs is a critical security service, and vehicles should be protected from breaking their personal information. Vehicles can be traced and investigated in the event of an accident or liability arising out of non-repudiation when the vehicle is faced with a rush of incoming messages. Hence, the roadside units' (RSUs) efficiency is reduced and causes delays in checking messages. This study presents an authentication framework using proxy vehicles for VANETs. Reducing the computational cost and proficiency increment are the features of the proposed method on the RSUs side. The proposed framework supports managing the revocation list. The Vehicle-to-Infrastructure (V2I) and Vehicle-to-Vehicle (V2V) authentication protocols are guaranteed and designed in this proposed framework, to show this, a merged V2I and V2V authentication is presented and embedded in the proposed framework. The designed protocol applies offline and online signatures to check messages and the revocation key to prevent malicious messages from being sent, and the time limit to use the network. The analysis shows that the suggested protocol is more feasible and reasonable for use in VANETs.
Publisher
Research Square Platform LLC
Reference45 articles.
1. Zeadally S, Hunt R, Chen YS, Irwin A, Hassan A. Vehicular ad hoc networks (VANETS): status, results, and challenges. Telecommunication Systems. (2012) Aug 1;50 (4):217 – 41.
2. "Routing in vehicular ad hoc networks: A survey;Li Fan;" IEEE Vehicular technology magazine,2007
3. "Analytical models for understanding space, backoff, and flow correlation in CSMA wireless networks;Shi Zhefu;" Wireless networks,2013
4. Securing vehicular ad hoc networks;Raya M;Jour. Comput. Secur.,2007
5. "Privacy-preserving and lightweight key agreement protocol for V2G in the social internet of things;Shen Jian;" IEEE Internet of things Journal,2017