Broadcast Message Authentication Mechanism to Detect Clone and Sybil attacks in VANET’s based on ID-Based Signature Scheme

  • Authors

    • Kareemulla Shaik
    • Md. Ali Hussain
    2018-07-20
    https://doi.org/10.14419/ijet.v7i3.12.17770
  • Authentication protocol, integrity verification, clone attacks, Sybil attack ID-Based Signatures.
  • Broadcast Communication is crucial in VANET communication, to send and receive safety messages within network. Securing these beacon message is a challenge, since they are very prone to clone and Sybil attacks. Many works have been proposed to address this problem but they failed to address how to detect and protect these messages from clone attacks and also limited to static networks with limited data sizes.  To achieve this a secure authentication and attack detection mechanism can be designed. In this paper we propose a secure broadcast message authentication and attack detection mechanism with Identity – Based Signatures. Experimental results proved that it can be used in both V2V and V2RSU c communications.   Our scheme shown best performance compared to existing schemes in terms of packet delivery ration, detection rate and detection time.

     

     

  • References

    1. [1] P. J. Fernandez Ruiz, F. B. Hidalgo, C. A. Nieto Guerra and A. F. Gomez Skarmeta, “Mobility and security in a real VANET deployed in a heterogeneous networksâ€. “Security Comm. Networks (2012)â€.

      [2] M. Bayat, M. Barmshoory, M. Rahimi and Md. Reza Aref, “A secure authentication scheme for VANETs with batch verificationâ€.

      [3] T. W. Chim, S. M. Yiu, L. C. K. Hui, V. O. K. Li, “MLAS: Multiple level authentication scheme for VANETsâ€, “Ad Hoc Networks 10 (2012), pp.1445–1456.

      [4] A.Das and D. Roychoudhury, “Authentication schemes for VANETs: a surveyâ€,†Int. J. Vehicle Information and Communication Systems, Vol. 3, No. 1â€, pp. 1-27, 2013

      [5] M. Han, S. J. Lee and W. Bae, “A Secure and Efficient V2V Authentication Method in Heavy Traffic Environmentâ€.

      [6] H. Hsiao, A. Studer, C. Chen, A. Perrig, F. Bai, B. Bellur and A. Iyer, “Flooding-Resilient Broadcast Authentication for VANETsâ€.

      [7] Y. Kim and J. Lee, “A secure analysis of vehicular authentication security scheme of RSUs in VANETâ€, J Comput Virol Hack Tech.

      [8] Y. Liu, Z. He, S. Zhao and L. Wang, “An efficient anonymous authentication protocol using batch operations for VANETsâ€, Multimedia Tools Appl .

      [9] Y. Liu, W. Guo, Q. Zhong and G. Yao, “LVAP: Lightweight V2I authentication protocol using group communication in VANETs..

      [10] S. Mitra and A. Mondal, “Identification, Authentication and Tracking Algorithm for Vehicles using VIN in Distributed VANETâ€, ICACCI’12, August 3-5, 2012, Chennai, T Nadu, India, pp. 279-286, 2012.

      [11] T. Oulhaci, M. Omar, F. Harzine and I. Harfi, “Secure and distributed certification system architecture for safety message authentication in VANETâ€, Telecommunication System.

      [12] Y. Sun, Z. Feng, Q. Hu and J. Su, “An efficient distributed key management scheme for group-signature based anonymous authentication in VANETâ€, Security Comm. Networks 2012; 5: pp.79–86

      [13] M. Wang, D. Liu, L. Zhu, Y. Xu and F. Wang, “LESPP: lightweight and efficient strong privacy-preserving authentication scheme for secure VANET communicationâ€.

      [14] Y. Xie, L. Wu, J. Shen and A. Alelaiwi, “EIAS-CP: new efficient identity-based authentication scheme with conditional privacy-preserving for VANETsâ€.

      [15] Z. Zhou, H. Zhang and Z. Sun, “An Improved Privacy-Aware Handoff Authentication Protocol for VANETsâ€.

      [16] H. Zhu, T. Liu, G. Wei and H. Li, “PPAS: privacy protection authentication scheme for VANETâ€, “Cluster Computingâ€.

      [17] A. Zhou, J. Li, Q. Sun, C. Fan, T. Lei and F. Yang, “A security authentication method based on trust evaluation in VANETsâ€, “EURASIP Journal onWireless Communications and Networkingâ€, pp. 1-8.

  • Downloads

  • How to Cite

    Shaik, K., & Ali Hussain, M. (2018). Broadcast Message Authentication Mechanism to Detect Clone and Sybil attacks in VANET’s based on ID-Based Signature Scheme. International Journal of Engineering & Technology, 7(3.12), 1102-1111. https://doi.org/10.14419/ijet.v7i3.12.17770