IJCNIS Vol. 16, No. 1, 8 Feb. 2024
Cover page and Table of Contents: PDF (size: 1033KB)
Full Text (PDF, 1033KB), PP.113-122
Views: 0 Downloads: 0
Vehicular Ad Hoc Networks, Vehicle Platoon, Privacy-preserving Authentication, Asymmetric Encryption Algorithm
In general, Vehicular Ad hoc Networks (VANETs) are permitting the communication between one vehicle with neighboring vehicles, infrastructure, and Road-Side Unit (RSU). In this, vehicle platoon is commonly known as the vehicle driving pattern it categorizes the batching of the vehicle in the on the trot fashion. It has been reviewed as an effective resolution to mitigate the reduction in traffic blockage and to widen the opulence of the travel. However, the malicious activities of any unauthorized person in VANET are increased the damage to authorized vehicles. In this manuscript, the Identity based Conditional Privacy-Preserving Authentication (ID-CPPA) signature scheme is proposed to detect the malignant command vehicle very efficiently by the consumer vehicle. In this, the proposed ID-CPPA method uses one-way hash functions for improving the efficiency of Road-Side Unit (RSU) signing and verification of a messages. In order to provide better concealment to the vehicle, Phase Truncated Fourier Transform based asymmetric encryption algorithm (PTFT-AE) is proposed. Thus, the proposed ID-CPPA-PTFT-AE approach has achieved 28.96%, 37.58%, 31.36% higher security rate and 25.8%, 37.9%, 42.6% lower delay than the existing MPDC-LPNS, PPSR-GS, and WCAA-TST methods respectively.
K. Lakshmi Narayanan, R. Naresh, "An Enhancement of Identity Based Conditional Privacy-preserving Authentication Process in Vehicular Ad Hoc Networks", International Journal of Computer Network and Information Security(IJCNIS), Vol.16, No.1, pp.113-122, 2024. DOI:10.5815/ijcnis.2024.01.09
[1]M. Mukhtaruzzaman, M. Atiquzzaman. “Clustering in vehicular ad hoc network: Algorithms and challenges”. Computers & Electrical Engineering, vol.88, pp.106851, 2020.
[2]S. Xiao, X. Ge, Q. L. Han, Y. Zhang. “Secure distributed adaptive platooning control of automated vehicles over vehicular ad-hoc networks under denial-of-service attacks”. IEEE Transactions on Cybernetics. 2021.
[3]R. Sultana, J. Grover, M. Tripathi. “Security of SDN-based vehicular ad hoc networks: State-of-the-art and challenges”. Vehicular Communications, vol. 27, pp. 100284, 2021.
[4]M .Zhou, L. Han, H. Lu, C. Fu. “Distributed collaborative intrusion detection system for vehicular Ad Hoc networks based on invariant”. Computer Networks, vol.172, pp.107174, 2020.
[5]N.A. Fida, N. Ahmad, Y. Cao, M.A. Jan, G. Ali. ‘An improved multiple manoeuver management protocol for platoon mobility in vehicular ad hoc networks’. IET Intelligent Transport Systems. vol.15, no. 7, pp.886-901, 2021.
[6]R.N. Kamoi, L.A. Júnior, F.A. Verri, C.A. Marcondes, C.H. Ferreira, R.I. Meneguette, A.M. Da Cunha. “Platoon Grouping Network Offloading Mechanism for VANETs”. IEEE Access, vol. 9, pp.53936-51, 2021.
[7]R. Hussain, F. Hussain, S. Zeadally, J. Lee. “On the adequacy of 5G security for vehicular ad hoc networks”. IEEE Communications Standards Magazine, vol.5, no. 1: pp.32-9, 2021.
[8]M.A. Al-Shareeda, M. Anbar, S. Manickam, I.H. Hasbullah. “Towards identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks”. IEEE Access. 2021.
[9]A. Alarifi, M. Amoon, M.H. Aly, W. El-Shafai. “Optical PTFT asymmetric cryptosystem-based secure and efficient cancelable biometric recognition system”. IEEE Access, vol.8, pp.221246-68, 2020.
[10]F .Mirsadeghi, M.K. Rafsanjani, B.B. Gupta. “A trust infrastructure based authentication method for clustered vehicular ad hoc networks”. Peer-to-Peer Networking and Applications, vol.14, no. 4, pp.2537-53, 2021.
[11]J. Zhou, S. Chen, K.K. Choo, Z. Cao, X. Dong. “EPNS: Efficient Privacy Preserving Intelligent Traffic Navigation from Multiparty Delegated Computation in Cloud-Assisted VANETs”. IEEE Transactions on Mobile Computing. 2021.
[12]S. Kanchan, G. Singh, N.S. Chaudhari. “SPSR-VCP: secure and privacy preserving Sign Recryption in vehicular cyber physical systems.” Journal of Ambient Intelligence and Humanized Computing, vol. 13, no. 1, pp.1-20, 2022.
[13]H. Zhong, Y. Geng, J. Cui, Y. Xu, L. Liu. “A weight-based conditional privacy-preserving authentication scheme in software-defined vehicular network”. Journal of Cloud Computing, vol. 9, no. 1, pp.1-3, 2020.
[14]S. Gyawali, Y. Qian, R.Q. Hu. “A privacy-preserving misbehavior detection system in vehicular communication networks”. IEEE Transactions on Vehicular Technology, vol. 70, no.6: pp.6147-58, 2021.
[15]T. Nandy, M.Y.I. Idris, R.M. Noor, A.K. Das, X. Li, N.A. Ghani and S. Bhattacharyya, “An enhanced lightweight and secured authentication protocol for vehicular ad-hoc network.” Computer Communications, vol. 177, pp.57-76, 2021.
[16]S.A. Eftekhari, M. Nikooghadam and M. Rafighi, Security-enhanced three-party pairwise secret key agreement protocol for fog-based vehicular ad-hoc communications. Vehicular Communications, vol. 28, pp.100306, 2021.
[17]Y. Yang, D. He, H. Wang, L. Zhou. “An efficient blockchain-based batch verification scheme for vehicular ad hoc networks”. Transactions on Emerging Telecommunications Technologies, vol.33, no. 5, pp.e3857, 2022
[18]U. Coruh and O. Bayat, “ESAR: Enhanced Secure Authentication and Revocation Scheme for Vehicular Ad Hoc Networks.” Journal of Information Security and Applications, vol. 64, pp. 103081, 2022.
[19]R. Abassi, A. Ben Chehida Douss, and D. Sauveron, “TSME: a trust-based security scheme for message exchange in vehicular Ad hoc networks.” Human-centric Computing and Information Sciences, vol. 10, no. 1, pp.1-19, 2020.