Open Access Open Access  Restricted Access Subscription or Fee Access

Probabilistic Reputation-Based Authentication Approach in VANET


(*) Corresponding author


Authors' affiliations


DOI: https://doi.org/10.15866/irecap.v13i2.22900

Abstract


Number of vehicles on roads has recently increased significantly, leading to a sharp rise in traffic congestion. To tackle this issue, Vehicular Ad hoc Networks (VANETs) have emerged as a potential solution for various areas of the automotive industry. However, the absence of a standard authentication technique prevents vehicles from assuring that the received messages from other vehicles are genuine and not malicious. Malicious attackers may infiltrate the VANET and send false messages to other vehicles, which may then relay these messages to others. To address this security concern, we propose a reputation-based probabilistic authentication approach for VANETs, called "PR-BAA". PR-BAA aims to achieve vehicle authentication while maximizing the number of serviced vehicles and minimizing the validation time. Two values are presented: reputation value of each vehicle, which represents the trust value of the vehicle, and probability of fake, which indicates the likelihood that the vehicle is a malicious one. Based on these two values, the vehicle decides whether to verify the received packets or to take them as they are without verification. Simulation results indicate significant improvements in road and vehicle security compared to existing state-of-the-art work.
Copyright © 2023 Praise Worthy Prize - All rights reserved.

Keywords


VANETs; Vehicle Authentication; Reputation Value; Fake Value; Road Side Unit

Full Text:

PDF


References


Bouk, Safdar Hussain, Syed Hassan Ahmed, Rasheed Hussain, and Yongsoon Eun. "Named data networking's intrinsic cyber-resilience for vehicular CPS." IEEE Access 6 (2018): 60570-60585.
https://doi.org/10.1109/ACCESS.2018.2875890

Liu, Yining, Wei Guo, Qi Zhong, and Gang Yao. "LVAP: Lightweight V2I authentication protocol using group communication in VANET s." International Journal of Communication Systems 30, no. 16 (2017): e3317.
https://doi.org/10.1002/dac.3317

Muhammad, Mujahid, and Ghazanfar Ali Safdar. "Survey on existing authentication issues for cellular-assisted V2X communication." Vehicular Communications 12 (2018): 50-65.‏
https://doi.org/10.1016/j.vehcom.2018.01.008

Lu, X., Xiao, L., Xu, T., Zhao, Y., Tang, Y., & Zhuang, W. (2020). Lu, Xiaozhen, Liang Xiao, Tangwei Xu, Yifeng Zhao, Yuliang Tang, and Weihua Zhuang. "Reinforcement learning based PHY authentication for VANETs." IEEE transactions on vehicular technology 69, no. 3 (2020): 3068-3079.
https://doi.org/10.1109/TVT.2020.2967026

Thilak, K. Deepa, and A. J. F. G. C. S. Amuthan. "Cellular automata-based improved ant colony-based optimization algorithm for mitigating ddos attacks in vanets." Future Generation Computer Systems 82 (2018): 304-314.‏
https://doi.org/10.1016/j.future.2017.11.043

Lyu, Chen, et al. (2018) Fast Trust: Fast and Anonymous Spatial-Temporal Trust for Connected Cars on Expressways. 2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON) IEEE.
https://doi.org/10.1109/SAHCN.2018.8397128

Guo, Wei, Yining Liu, and Jing Wang. "FPAP: Fast pre-distribution authentication protocol for v2i." In Cloud Computing and Security: Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part II 2, pp. 25-36. Springer International Publishing, 2016.
https://doi.org/10.1007/978-3-319-48674-1_3

Yang, Anjia, Jian Weng, Nan Cheng, Jianbing Ni, Xiaodong Lin, and Xuemin Shen. "DeQoS attack: Degrading quality of service in VANETs and its mitigation." IEEE Transactions on Vehicular Technology 68, no. 5 (2019): 4834-4845.
https://doi.org/10.1109/TVT.2019.2905522

Yu, Y., Guo, L., Liu, Y., Zheng, J., & Zong, Y. (2018). An efficient SDN-based DDoS Attack Detection and Rapid Response Platform in Vehicular Networks. IEEE Access, 6, 44570-44579. ‏
https://doi.org/10.1109/ACCESS.2018.2854567

Uğur Coruh, Oğuz Bayat, "Hybrid Secure Authentication and Key Exchange Scheme for M2M Home Networks", Security and Communication Networks, vol. 2018, Article ID 6563089, 25 pages, 2018.
https://doi.org/10.1155/2018/6563089

Kushwah, Rashmi, et al. "ECDSA for data origin authentication and vehicle security in VANET." 2019 Twelfth International Conference on Contemporary Computing (IC3). IEEE, 2019.‏
https://doi.org/10.1109/IC3.2019.8844912

Lyu, Chen, Dawu Gu, Yunze Zeng, and Prasant Mohapatra. "PBA: Prediction-based authentication for vehicle-to-vehicle communications." IEEE transactions on dependable and secure computing 13, no. 1 (2015): 71-83. ‏
https://doi.org/10.1109/TDSC.2015.2399297

Kezia, M., and K. V. Anusuya. "A Comparative Analysis of Resource Allocation in VANET using DSRC and C-V2X." 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS). IEEE, 2023.‏

Samara, Ghassan. "Intelligent reputation system for safety messages in VANET." arXiv preprint arXiv:2007.12717 (2020).
https://doi.org/10.11591/ijai.v9.i3.pp439-447

Sun, C., Liu, J., Xu, X., & Ma, J. (2017). A Privacy-Preserving Mutual Authentication Resisting DoS Attacks in VANETs. IEEE Access, 5, 24012-24022.
https://doi.org/10.1109/ACCESS.2017.2768499

Priyan, M. K., & Devi, G. U. (2019). A survey on internet of vehicles: applications, technologies, challenges and opportunities. International Journal of Advanced Intelligence Paradigms, 12(1-2), 98-119. ‏
https://doi.org/10.1504/IJAIP.2019.096957

Ferrag, Mohamed Amine, Leandros A. Maglaras, Helge Janicke, Jianmin Jiang, and Lei Shu. "Authentication protocols for internet of things: a comprehensive survey." Security and Communication Networks 2017 (2017).
https://doi.org/10.1155/2017/6562953

Younis, S., Time Reversal Resonating Strength Paradigm for Physical Layer Authentication in Industrial Wireless Communication, (2021) International Journal on Communications Antenna and Propagation (IRECAP), 11 (3), pp. 216-222.
https://doi.org/10.15866/irecap.v11i3.20768

Abouhogail, R., A New Efficient Authentication Protocol for Wireless Healthcare Sensor Networks, (2021) International Journal on Engineering Applications (IREA), 9 (5), pp. 277-285.
https://doi.org/10.15866/irea.v9i5.20305

Taqieddin, E., Al-Dahoud, H., Mhaidat, K., Security Analysis and Improvement of Reconstruction Based Radio Frequency Identification Authentication Protocol, (2018) International Journal on Communications Antenna and Propagation (IRECAP), 8 (3), pp. 206-221.
https://doi.org/10.15866/irecap.v8i3.13398

Wang, Baosheng, Yi Wang, and Rongmao Chen. "A practical authentication framework for VANETs." Security and communication networks 2019 (2019).
https://doi.org/10.1155/2019/4752612

Kumar, P. M., Devi, U., Manogaran, G., Sundarasekar, R., Chilamkurti, N., & Varatharajan, R. (2018). Ant Colony Optimization Algorithm with Internet of Vehicles for Intelligent Traffic Control System, Computer Networks, 144, 154-162.
https://doi.org/10.1016/j.comnet.2018.07.001

Haibi, A., Bouazza, H., Bouya, M., El Yassini, K., Oufaska, K., Boulmalf, M., Lazaro, A., Hadjoudja, A., A New Compact Metal Mountable Dual-Band UHF RFID Tag Antenna With an Adapted Middleware for Transport and SCM Fields, (2021) International Journal on Communications Antenna and Propagation (IRECAP), 11 (2), pp. 106-117.
https://doi.org/10.15866/irecap.v11i2.20048


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize