International Journal of Modern Education and Computer Science (IJMECS)

ISSN: 2075-0161 (Print), ISSN: 2075-017X (Online)

Published By: MECS Press

IJMECS Vol.11, No.1, Jan. 2019

Efficient Authentication and Privacy Mechanism to protect legitimate Vehicles in IEEE 802.11p Standard

Full Text (PDF, 703KB), PP.39-44

Views:87   Downloads:2


Deepak Verma, Parminder Singh

Index Terms



VANETs is the open model which stimulate in academia and industry oriented researches. However, the model is open and there are many violations in a communication of vehicle to vehicle (V2V) and Vehicle to Infrastructure (V2I). Any anonymous user may extract the useful information. Researchers have proposed many research proposal and solved issues related to VANET. The security is the major concern and to avoid mishappening in driving the vehicle. We proposed the authentication system that provides safety of the driver during travel on the roads. The proposed results deliver the following features: 1) Reliability of VANET model 2) Road Safety 3) Privacy of the vehicles 4) Authentication of message delivery to adjacent nodes. Finally, we provide a view point of how to detect the attacks and withdraw malicious node more efficiently. 

Cite This Paper

Deepak Verma, Parminder Singh, "Efficient Authentication and Privacy Mechanism to protect legitimate Vehicles in IEEE 802.11p Standard", International Journal of Modern Education and Computer Science(IJMECS), Vol.11, No.1, pp. 39-44, 2019.DOI: 10.5815/ijmecs.2019.01.05


[1]Q. Kang, X. Liu, Y. Yao, Z. Wang, and Y. Li, “Efficient authentication and access control of message dissemination over vehicular ad hoc network,” Neurocomputing, vol. 181, pp. 132–138, 2016.

[2]W. Li and H. Song, “ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks,” IEEE Trans. Intell. Transp. Syst., vol. 17, no. 4, pp. 960–969, 2016.

[3]B. Ying, D. Makrakis, and H. T. Mouftah, “Privacy preserving broadcast message authentication protocol for VANETs,” J. Netw. Comput. Appl., vol. 36, no. 5, pp. 1352–1364, 2013.

[4]M. M. Abd-eldayem, “ORIGINAL ARTICLE A proposed HTTP service based IDS,” Egypt. Informatics J., vol. 15, no. 1, pp. 13–24, 2014.

[5]F. Cunha et al., “Data communication in VANETs: Protocols, applications and challenges,” Ad Hoc Networks, vol. 44, pp. 90–103, 2016.

[6]C. Caballero-Gil, P. Caballero-Gil, and J. Molina-Gil, “Mutual authentication in self-organized VANETs,” Comput. Stand. Interfaces, vol. 36, no. 4, pp. 704–710, 2014.

[7]M. H. Eiza, T. Owens, Q. Ni, and S. Member, “Secure and Robust Multi - Constrained QoS aware Routing Algorithm for VANETs,” IEEE Trans. Dependable Sec. Comput., vol. 13, no. 1, pp. 1–14, 2014.

[8]F. Qu, Z. Wu, F. Wang, and W. Cho, “A Security and Privacy Review of VANETs,” IEEE Trans. Intell. Transp. Syst., vol. 16, no. 6, pp. 2985–2996, 2015.

[9]P. A. Sumayya and P. S. Shefeena, “VANET Based Vehicle Tracking Module for Safe and Efficient Road Transportation System,” Procedia - Procedia Comput. Sci., vol. 46, no. Icict 2014, pp. 1173–1180, 2015.

[10]A. Ltifi, A. Zouinkhi, and M. S. Bouhlel, “Trust-based Scheme for Alert Spreading in VANET,” Procedia Comput. Sci., vol. 73, no. Awict, pp. 282–289, 2015.

[11]R. Muthumeenakshi, T. R. Reshmi, and K. Murugan, “Extended 3PAKE authentication scheme for value-added services in VANETs,” Comput. Electr. Eng., vol. 59, pp. 27–38, 2017.

[12]D. B. Rawat, M. Garuba, L. Chen, and Q. Yang, “On the security of information dissemination in the Internet-of-Vehicles,” Tsinghua Sci. Technol., vol. 22, no. 4, pp. 437–445, 2017.

[13]B. Subba, S. Biswas, and S. Karmakar, “A game theory based multi layered intrusion detection framework for VANET,” Futur. Gener. Comput. Syst., vol. 82, pp. 12–28, 2018.

[14]H. Hasrouny, A. E. Samhat, C. Bassil, and A. Laouiti, “VANet security challenges and solutions: A survey,” Veh. Commun., vol. 7, pp. 7–20, 2017.

[15]S. Sattar, H. Khaliq, M. Saleem, S. Mumtaz, and J. Rodriguez, “Reliability and energy-e ffi ciency analysis of safety message broadcast in VANETs,” Comput. Commun., vol. 119, no. June 2017, pp. 118–126, 2018.

[16]X. Li, Y. Yu, G. Sun, and K. Chen, “SECURITY AND PRIVACY OF CONNECTED VEHICULAR CLOUD Connected Vehicles ’ Security from the Perspective of the In-Vehicle Network,” no. June, pp. 58–63, 2018.

[17]R. Kolandaisamy et al., “A Multivariant Stream Analysis Approach to Detect and Mitigate DDoS Attacks in Vehicular Ad Hoc Networks,” vol. 2018, 2018.