Broadcast Message Authentication Mechanism to Detect Clone and Sybil attacks in VANETâ€™s based on ID-Based Signature Scheme
Keywords:Authentication protocol, integrity verification, clone attacks, Sybil attack ID-Based Signatures.
Broadcast Communication is crucial in VANET communication, to send and receive safety messages within network. Securing these beacon message is a challenge, since they are very prone to clone and Sybil attacks. Many works have been proposed to address this problem but they failed to address how to detect and protect these messages from clone attacks and also limited to static networks with limited data sizes. To achieve this a secure authentication and attack detection mechanism can be designed. In this paper we propose a secure broadcast message authentication and attack detection mechanism with Identity â€“ Based Signatures. Experimental results proved that it can be used in both V2V and V2RSU c communications. Our scheme shown best performance compared to existing schemes in terms of packet delivery ration, detection rate and detection time.
 P. J. Fernandez Ruiz, F. B. Hidalgo, C. A. Nieto Guerra and A. F. Gomez Skarmeta, â€œMobility and security in a real VANET deployed in a heterogeneous networksâ€. â€œSecurity Comm. Networks (2012)â€.
 M. Bayat, M. Barmshoory, M. Rahimi and Md. Reza Aref, â€œA secure authentication scheme for VANETs with batch verificationâ€.
 T. W. Chim, S. M. Yiu, L. C. K. Hui, V. O. K. Li, â€œMLAS: Multiple level authentication scheme for VANETsâ€, â€œAd Hoc Networks 10 (2012), pp.1445â€“1456.
 A.Das and D. Roychoudhury, â€œAuthentication schemes for VANETs: a surveyâ€,â€ Int. J. Vehicle Information and Communication Systems, Vol. 3, No. 1â€, pp. 1-27, 2013
 M. Han, S. J. Lee and W. Bae, â€œA Secure and Efficient V2V Authentication Method in Heavy Traffic Environmentâ€.
 H. Hsiao, A. Studer, C. Chen, A. Perrig, F. Bai, B. Bellur and A. Iyer, â€œFlooding-Resilient Broadcast Authentication for VANETsâ€.
 Y. Kim and J. Lee, â€œA secure analysis of vehicular authentication security scheme of RSUs in VANETâ€, J Comput Virol Hack Tech.
 Y. Liu, Z. He, S. Zhao and L. Wang, â€œAn efficient anonymous authentication protocol using batch operations for VANETsâ€, Multimedia Tools Appl .
 Y. Liu, W. Guo, Q. Zhong and G. Yao, â€œLVAP: Lightweight V2I authentication protocol using group communication in VANETs..
 S. Mitra and A. Mondal, â€œIdentification, Authentication and Tracking Algorithm for Vehicles using VIN in Distributed VANETâ€, ICACCIâ€™12, August 3-5, 2012, Chennai, T Nadu, India, pp. 279-286, 2012.
 T. Oulhaci, M. Omar, F. Harzine and I. Harfi, â€œSecure and distributed certification system architecture for safety message authentication in VANETâ€, Telecommunication System.
 Y. Sun, Z. Feng, Q. Hu and J. Su, â€œAn efficient distributed key management scheme for group-signature based anonymous authentication in VANETâ€, Security Comm. Networks 2012; 5: pp.79â€“86
 M. Wang, D. Liu, L. Zhu, Y. Xu and F. Wang, â€œLESPP: lightweight and efficient strong privacy-preserving authentication scheme for secure VANET communicationâ€.
 Y. Xie, L. Wu, J. Shen and A. Alelaiwi, â€œEIAS-CP: new efficient identity-based authentication scheme with conditional privacy-preserving for VANETsâ€.
 Z. Zhou, H. Zhang and Z. Sun, â€œAn Improved Privacy-Aware Handoff Authentication Protocol for VANETsâ€.
 H. Zhu, T. Liu, G. Wei and H. Li, â€œPPAS: privacy protection authentication scheme for VANETâ€, â€œCluster Computingâ€.
 A. Zhou, J. Li, Q. Sun, C. Fan, T. Lei and F. Yang, â€œA security authentication method based on trust evaluation in VANETsâ€, â€œEURASIP Journal onWireless Communications and Networkingâ€, pp. 1-8.
View Full Article:
How to Cite
LicenseAuthors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under aÂ Creative Commons Attribution Licensethat allows others to share the work with an acknowledgement of the work''s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal''s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (SeeÂ The Effect of Open Access).