A Low-Overhead Message Authentication and Secure Message Dissemination Scheme for VANETs
Abstract
:1. Introduction
- We propose a low overhead message authentication and secure message dissemination scheme for VANETs. Vehicles themselves do not authenticate messages. s are responsible for collecting, aggregating, authenticating and disseminating messages to vehicles.
- To reduce the message authentication overhead, s can select some vehicles in its region as group leaders (s) to collect/aggregate messages from vehicles in their subregions and send them to the for further aggregation and dissemination.
- Our scheme ensures authenticity and integrity of messages using digital signature based on public key cryptography.
2. Related Works
3. Proposed Approach
3.1. System Model
- DMV: We assume that all vehicles are registered with a trusted authority (), such as the Department of Motor Vehicles (), that administers the registration of the vehicles. The is assumed to be trusted and cannot be compromised. The generates its public and private keys (, ) and distributes a to all s and vehicles securely. In addition, the generates pseudo-IDs () for each vehicle, certificates corresponding to each pseudo-ID of a vehicle () where , and certificates of s () where .
- Vehicle: Each vehicle is assumed to be equipped with an On-Board Unit () for computation and communication with s as well as with other vehicles. The stores the vehicle’s public and private key pair (, ), its pseudo-IDs (), its certificates corresponding to each pseudo-ID of the vehicle ( signed by the ), and the public key of the ().
- RSU: The Road Side Units (s) are fixed entities along the roadside which facilitate V2V and V2I communication. s are connected to each other and to the , possibly through the Internet. In our scheme, a collects the messages sent by the vehicles in its region, authenticates the messages, aggregates the messages, and forwards them to vehicles within its region, as well as to vehicles in other regions as needed.
- Group Leader (): Each divides its region into sub-regions based on the density of vehicles in the region. Then, the selects one vehicle in each sub-region as a . The is responsible for collecting, authenticating, and aggregating messages sent by vehicles in its sub-region and for sending them to the . The is also responsible for receiving messages from the , authenticating them, and disseminating them to vehicles in its sub-region.
3.2. Proposed Method
- 1.
- We assume that the clocks of s, the , and the vehicles are loosely synchronized. This can be achieved using time received from a GPS. Messages are time-stamped using the local clock time to verify the freshness of the messages;
- 2.
- Certificates issued by the for the vehicles and are used for the authentication of vehicles and s;
- 3.
- We do not address the issue of determining malicious vehicles or s. Several approaches have been proposed in the literature to identify malicious entities in VANETs. Any of those approaches can be used for determining malicious vehicles. Once a vehicle is determined to be malicious, the revokes its certificate and includes the certificate in the Certificate Revocation List (). The broadcasts the to all s when it changes. The s, in turn, broadcast the to vehicles in its region;
- 4.
- When a vehicle v enters the region of an (i.e., v is within the transmission range of an ), even though v will be able to receive messages sent by the , v may not be able to send messages directly to the because the may not be within the transmission range of v. In this case v uses an underlying routing algorithm to send messages to the through other vehicles. Any of the many routing algorithms proposed in the literature can be used for that purpose.
Algorithm 1: When a vehicle v enters the region covered by an |
When a vehicle v enters the region covered by an : Verifies received in the broadcasted message using ; Retrieves from the ; Computes ; Encrypts using public key of ; Sends ) to the , where When the receives from v: Decrypts using ; Verifies using ; Retrieves from ; Verifies the signature using ; If verification succeeds { Computes ; // contains the acceptance message // for the joining message from v; // K is the symmetric key to be used between v and ; Encrypts using public key of v; Sends ) to v, where }; Else { Discards ; } When a vehicle v receives from : Decrypts using its private key to obtain ; Verifies using ; If verification succeeds { Stores ();} Else { Discards . } |
Algorithm 2:Assigning Group Leaders (s) for selected vehicles by |
determines the number of vehicles and their locations in its region: Based on the density of vehicles in the ’s region, If Density is high { selects a set of vehicles as Group Leaders (s); For each vehicle selected as a { Computes Encrypts using symmetric key K; // K is the symmetric key established between v and // the when v joined ’s region; , where ; Sends to ; } } else{ No s are selected; authenticates and process messages from all vehicles; } When a receives from : Decrypts using K; Verifies the signature using ; If verification succeeds{ Stores () as proof of leadership;} Else {Discards .} |
Algorithm 3:When vehicle v enters a sub-region covered by a Group Leader |
When v enters the region covered by a : Receives proof of leadership message from the ; Retrieves from the encrypted message using ; Computes ); Encrypts using public key of Group Leader Sends to , where ; When a receives from v: Decrypts using Verifies using ; Verifies the signature using ; If verification succeeds{ Computes ; // contains the acceptance of for v; // K is a symmetric key between v and for further // communication; Encrypts using public key of v; Sends to v, where }; Else { Discards ;} When v receives from the : Decrypts to obtain ; Verifies using ; If verification succeeds{ Stores (); } Else { Discards ; } |
Algorithm 4:Vehicle v sending a Message M to its Group Leader |
When a vehicle v wants to send a message M about an observed event: Computes ; Sends to ; // K is the symmetric key established in the // Algorithm 3. When the receives from v: Decrypts using the symmetric key K and retrieves the message M; Checks the timestamp ; Verifies the signature using public key of v; Aggregates (M) with other messages sent by other vehicles; Computes Sends to ; // K is the symmetric key established between the and // the when it entered the ’s region. When the receives from : Decrypts using the symmetric key K and retrieves the message M; Checks the timestamp ; Verifies the signature using public key of ; Aggregates (M) with other messages sent by other s; Disseminates the message to the appropriate regions through other s as well as vehicles in its region through the s. |
3.3. Some Optimizations for Our Approach
4. Results
5. Conclusions and Discussion
Author Contributions
Funding
Conflicts of Interest
References
- Al-Sultan, S.; Al-Doori, M.; Al-Bayatti, A.; Zedan, H. A comprehensive survey on vehicular Ad Hoc network. J. Netw. Comput. Appl. 2014, 37, 380–392. [Google Scholar] [CrossRef]
- Mistareehi, H.; Manivannan, D. Classification, challenges and critical comparison of proposed solutions for vehicular clouds. Int. J.-Next-Gener. Comput. 2019, 10, 1–18. [Google Scholar]
- Rawashdeh, Z.; Mahmud, S. Intersection collision avoidance system architecture. In Proceedings of the 5th IEEE Consumer Communications and Networking Conference, Las Vegas, NV, USA, 10–12 January 2008. [Google Scholar]
- Aung, N.; Zhang, W.; Dhelim, S.; Ai, Y. T-Coin: Dynamic traffic congestion pricing system for the internet of vehicles in smart cities. Information 2020, 9, 149. [Google Scholar] [CrossRef] [Green Version]
- Aung, N.; Zhang, W.; Dhelim, S.; Ai, Y. Accident prediction system based on hidden markov model for vehicular ad-hoc network in urban environments. Information 2018, 9, 311. [Google Scholar] [CrossRef] [Green Version]
- Abuashour, A.; Kadoch, M. Control overhead reduction in cluster-based VANET routing protocol. In Ad Hoc Networks. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Springer: Cham, Switzerland, 2018; Volume 223, pp. 106–115. [Google Scholar]
- Yassein, M.; Mistareehi, H. Improvement on the lifetime of the WSN using energy efficiency saving of leach protocol (New Improved LEACH). Sens. Transducers J. 2011, 130, 142–153. [Google Scholar]
- Zhang, X.; Li, Y.; Miao, Q. A cluster-based broadcast scheduling scheme for mmWave vehicular communication. IEEE Commun. Lett. 2019, 23, 1202–1206. [Google Scholar] [CrossRef]
- Singh, R.; Saluja, D.; Kumar, S. Graphical approach for V2V connectivity enhancement in clustering-based VANET. IEEE Wirel. Commun. Lett. 2021, 10, 6. [Google Scholar] [CrossRef]
- Jo, H.; Kim, I.; Lee, D. Reliable cooperative authentication for vehicular networks. IEEE Trans. Intell. Transp. Syst. 2018, 19, 1065–1079. [Google Scholar] [CrossRef]
- Lin, X.; Li, X. Achieving efficient cooperative message authentication in vehicular ad hoc networks. IEEE Trans. Veh. Technol. 2013, 62, 3339–3348. [Google Scholar]
- Cheng, H.; Liu, Y. An improved RSU-based authentication scheme for VANET. J. Internet Technol. 2020, 21, 1137–1150. [Google Scholar]
- Zang, C.; Lin, X.; Lu, R.; Ho, P. RAISE: An efficient RSU-aided message authentication scheme in vehicular communication networks. In Proceedings of the IEEE International Conference on Communications (ICC), Beijing, China, 19–23 May 2008. [Google Scholar]
- Arkian, H.; Atani, R.; Diyanat, A.; Pourkhalili, A. A cluster-based vehicular cloud architecture with learning-based resource management. J. Supercomput. 2015, 71, 1401–1426. [Google Scholar] [CrossRef]
- Dua, A.; Kumar, N.; Das, A.; Susilo, W. Secure message communication protocol among vehicles in smart city. IEEE Trans. Veh. Technol. 2018, 67, 4359–4373. [Google Scholar] [CrossRef]
- Chaqfeh, M.; Mohamed, N.; Jawhar, I.; Wu, J. Vehicular cloud data collection for intelligent transportation systems. In Proceedings of the IEEE Smart Cloud Networks and Systems, Dubai, United Arab Emirates, 19–21 December 2016. [Google Scholar]
- Azees, M.; Vijayakumar, P.; Deboarh, L. EAAP: Efficient anonymous authentication with conditional privacy-preserving scheme for vehicular adhoc networks. IEEE Trans. Intell. Transp. Syst. 2017, 18, 2467–2476. [Google Scholar] [CrossRef]
- Liu, Y.; Wang, Y.; Chang, G. Efficient privacy-preserving dual authentication and key agreement scheme for secure V2V communications in an IoV paradigm. IEEE Trans. Intell. Transp. Syst. 2017, 18, 2740–2749. [Google Scholar] [CrossRef]
- Yang, Y.; Zhang, L.; Zhao, Y.; Choo, K.; Zhang, Y. Privacy-preserving aggregation-authentication scheme for safety warning system in Fog-Cloud based VANET. IEEE Trans. Inf. Forensics Secur. 2022, 17, 317–331. [Google Scholar] [CrossRef]
- Zhang, L.; Wu, Q.; Solanas, A.; Domingo-Ferrer, J. A scalable robust authentication protocol for secure vehicular communications. IEEE Trans. Veh. Technol. 2010, 59, 1606–1617. [Google Scholar] [CrossRef] [Green Version]
- Mistareehi, H.; Islam, T.; Manivannan, D. A secure and distributed architecture for vehicular cloud. Internet Things 2021. [Google Scholar] [CrossRef]
- 1609.2-2016; IEEE Standard for Wireless Access in Vehicular Environments–Security Services for Applications and Management Messages. IEEE: Piscataway, NJ, USA, 2016; pp. 1–240.
- Nguyen, V.; Lin, P.; Hwang, R. Enhancing misbehavior detection in 5 g vehicle-to-vehicle communications. IEEE Trans. Veh. Technol. 2020, 69, 9417–9430. [Google Scholar] [CrossRef]
- Gyawali, S.; Qian, Y.; Hu, R. A privacy-preserving misbehavior detection system in vehicular communication networks. IEEE Trans. Veh. Technol. 2021, 70, 6147–6158. [Google Scholar] [CrossRef]
- Ying, B.; Makrakis, D. Pseudonym changes scheme based on candidate-location-list in vehicular networks. In Proceedings of the IEEE International Conference on Communications (ICC), London, UK, 8–12 June 2015. [Google Scholar]
- Wang, P.; Liu, Y. SEMA: Secure and efficient message authentication protocol for VANETs. IEEE Syst. J. 2021, 15, 846–855. [Google Scholar] [CrossRef]
Notation | Description |
---|---|
Identity of Entity A | |
Pseudo Identity of Entity A | |
M | A Message |
v | Vehicle v |
Timestamp | |
Private Key of Entity A | |
Public Key of Entity A | |
K | Symmetric Key established between two communicating parties |
Signature of M Signed using A’s Private Key | |
H() | Hash Function |
Encryption of M with Key K | |
Roadside unit | |
Group Leader | |
Department of Motor Vehicles | |
Certificate issued to vehicle v by the | |
Certificate issued to by the |
Operation | Time |
---|---|
0.06 | |
0.005 | |
1.274 | |
2.654 | |
1.166 | |
2.128 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Mistareehi, H.; Manivannan, D. A Low-Overhead Message Authentication and Secure Message Dissemination Scheme for VANETs. Network 2022, 2, 139-152. https://doi.org/10.3390/network2010010
Mistareehi H, Manivannan D. A Low-Overhead Message Authentication and Secure Message Dissemination Scheme for VANETs. Network. 2022; 2(1):139-152. https://doi.org/10.3390/network2010010
Chicago/Turabian StyleMistareehi, Hassan, and D. Manivannan. 2022. "A Low-Overhead Message Authentication and Secure Message Dissemination Scheme for VANETs" Network 2, no. 1: 139-152. https://doi.org/10.3390/network2010010
APA StyleMistareehi, H., & Manivannan, D. (2022). A Low-Overhead Message Authentication and Secure Message Dissemination Scheme for VANETs. Network, 2(1), 139-152. https://doi.org/10.3390/network2010010