VANET Communication System with HENON Based Privacy Preserving Authentication

Authors

  • M. S. Bennet Praba Department of Computer Science and Engineering, SRM Institute of Science and Technology, BharathiSalai, Ramapuram, Chennai, 600089, India
  • S. S. Subashka Ramesh Department of Computer Science and Engineering, SRM Institute of Science and Technology, Chennai, BharathiSalai, Ramapuram, Chennai, 600089, India

Keywords:

Embedded VANET devices, Henon-Chaotic Maps (HCM), Network Centric, PBC, BAN

Abstract

It is extremely difficult to ensure the security of the Vehicular Internet of Things (VIoT) because of how diverse and infrastructure-free it is deployed, which exposes it to a variety of security concerns. There is an urgent need for a mutual authentication method among the linked devices to solve this problem and safeguard sensitive data inside the deployed region. However, when used in VIoT systems, previous methods have significant computational costs and insecure connectivity. Therefore, it is essential to provide an authentication system that protects privacy and can successfully protect VANET devices from attacks. In order to provide private and secure authentication between VANET devices, this study offers a special, compact, and secure protocol based on network-centric Henon Chaotic Maps (NC-HCM). The proposed method enables real devices to vary their keys for each transmission iteration while ensuring secure transmission of sensitive data from the source to the destination. The security level of the proposed model is assessed and analysed formally using the Burrows-Abadi-Needham Logic (BAN). The given model is also thoroughly verified using AVISPA and the Profverif tool. The results of the investigation show that the suggested strategy acts as a strong deterrent against both active and passive attacks. It successfully protects the VANET devices and guarantees the veracity, integrity, and secrecy of the data sent.

Downloads

Download data is not yet available.

References

M. S. Sheikh, J. Liang, and W. Wang, “Security and privacy in vehicular ad hoc network and vehicle cloud computing: a survey,” Wireless Communications and Mobile Computing, vol. 202025 pages, Article ID 5129620, 2020

A. Irshad, M. Usman, S. A. Chaudhry, H. Naqvi, and M. Shafiq, “A provably secure and efficient authenticated key agreement scheme for energy internet based vehicle-to-grid technology framework,” IEEE Transactions on Industry Applications, vol. 99, p. 1, 2020.

S. M. Faisal and T. Zaidi, “Timestamp based detection of sybil attack in vanet,” IJ Network Security, vol. 22, no. 3, pp. 397–408, 2020.

Z. Ali, S. A. Chaudhry, M. S. Ramzan, and F. Al-Turjman, “Securing smart city surveillance: a lightweight authentication mechanism for unmanned vehicles,” IEEE Access, vol. 8, pp. 43711–743724, 2020.

S. A. Chaudhry, T. Shon, F. Al-Turjman, and M. H. Alsharif, “Correcting design flaws: an improved and cloud assisted key agreement scheme in cyber physical systems,” Computer Communications, vol. 153, pp. 527–537, 2020.

Q. Zeng, Y. Tang, Z. Yu, and W. Xu, “A geographical routing protocol based on link connectivity analysis for urban VANETs,” Journal of Internet Technology, vol. 21, no. 1, pp. 41–49, 2020.

M. Sohail, R. Ali, M. Kashif et al., “Trustwalker: an efficient trust assessment in vehicular internet of things (viot) with security consideration,” Sensors, vol. 20, no. 14, Article ID 3945, 2020

M. Arif, G. Wang, M. Z. A. Bhuiyan, T. Wang, and J. Chen, “A survey on security attacks in VANETs: communication, applications and challenges,” Vehicular Communications, vol. 19, Article ID 100179, 2019.

Z. Afzal and M. Kumar, “Security of vehicular ad-hoc networks (vanet): a survey,” Journal of Physics: Conference Series, vol. 1427, no. 1, Article ID 012015, 2020.

A. Awang, K. Husain, N. Kamel, and S. Aissa, “Routing in vehicular ad-hoc networks: a Survey on single- and cross-layer design techniques, and perspectives,” IEEE Access, vol. 5, pp. 9497–9517, 2017.

X. Li, Y. Han, J. Gao, and J. Niu, “Secure hierarchical authentication protocol in vanet,” IET Information Security, vol. 14, no. 1, pp. 99–110, 2019.

Z. A. Abdulkader, A. Abdullah, M. Taufik Abdullah, and Z. Ahmad Zukarnain, “Vehicular ad hoc networks and security issues: survey,” Modern Applied Science, vol. 11, no. 5, Article ID 30, 2017.

A. Kumar and M. Bansal, “A review on vanet security attacks and their countermeasure,” in Proceedings of the 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC), pp. 580–585, IEEE, Solan, India, September 2017.

S. Hussain and S. A. Chaudhry, ““Comments on “biometricsbased privacy-preserving user authentication scheme for cloud-based industrial internet of things deployment”” IEEE Internet of 9ings Journal, vol. 6, no. 6, pp. 10 936–10 940, 2019.

N. K. Chaubey, “Security analysis of vehicular ad hoc networks (VANETs): a comprehensive study,” International Journal of Security and Its Applications, vol. 10, no. 5, pp. 261–274, 2016.

M. B. Mansour, C. Salama, H. K. Mohamed, and S. A. Hammad, “Vanet security and privacy-an overview,” International Journal of Network Security & Its Applications, vol. 10, no. 2, pp. 13–34, 2018.

A. Suman and C. Kumar, “A behavioral study of sybil attack on vehicular network,” in Proceedings of the 2016 3rd International Conference on Recent Advances in Information Technology (RAIT), pp. 56–60, IEEE, Dhanbad, India, March 2016.

A. N. Upadhyaya and J. Shah, “Attacks on vanet security,” International Journal of Computer Engineering and Software Technology, vol. 9, no. 1, pp. 8–19, 2018.

K. Mahmood, J. Arshad, S. A. Chaudhry, and S. Kumari, “An enhanced anonymous identity-based key agreement protocol for smart grid advanced metering infrastructure,” International Journal of Communication Systems, vol. 32, no. 16, Article ID e4137, 2019.

A. Quyoom, R. Ali, D. N. Gouttam, and H. Sharma, “A novel mechanism of detection of denial of service attack (dos) in vanet using malicious and irrelevant packet detection algorithm (mipda),” in Proceedings of the International Conference on Computing, Communication & Automation, pp. 414–419, IEEE, Noida, India, May 2015.

Vaqur, M. ., Kumar, R. ., Singh, R. ., Umang, U., Gehlot, A. ., Vaseem Akram, S. ., & Joshi, K. . (2023). Role of Digitalization in Election Voting Through Industry 4.0 Enabling Technologies. International Journal on Recent and Innovation Trends in Computing and Communication, 11(2), 123–130. https://doi.org/10.17762/ijritcc.v11i2.6136

T. Zaidi and S. Faisal, “An overview: various attacks in vanet,” in Proceedings of the 2018 4th International Conference on Computing Communication and Automation (ICCCA), pp. 1–6, IEEE, Greater Noida, India, December 2018.

H. El Hadj Kalil, A. D. Kora and S. Boumerdassi, "Security in VANETs: Lightweight Protocol for Group-of-Vehicles Masters (LPGVM)," 2020 22nd International Conference on Advanced Communication Technology (ICACT), 2020, pp. 6-11, doi: 10.23919/ICACT48636.2020.9061225.

Z. Wei, J. Li, X. Wang and C. -Z. Gao, "A Lightweight Privacy-Preserving Protocol for VANETs Based on Secure Outsourcing Computing," in IEEE Access, vol. 7, pp. 62785-62793, 2019, doi: 10.1109/ACCESS.2019.2915794.

S. Son, J. Lee, Y. Park, Y. Park and A. K. Das, "Design of Blockchain-Based Lightweight V2I Handover Authentication Protocol for VANET," in IEEE Transactions on Network Science and Engineering, vol. 9, no. 3, pp. 1346-1358, 1 May-June 2022, doi: 10.1109/TNSE.2022.3142287.

X. Li, T. Liu, M. S. Obaidat, F. Wu, P. Vijayakumar and N. Kumar, "A Lightweight Privacy-Preserving Authentication Protocol for VANETs," in IEEE Systems Journal, vol. 14, no. 3, pp. 3547-3557, Sept. 2020, doi: 10.1109/JSYST.2020.2991168.

A. Mansour, K. M. Malik, A. Alkaff and H. Kanaan, "ALMS: Asymmetric Lightweight Centralized Group Key Management Protocol for VANETs," in IEEE Transactions on Intelligent Transportation Systems, vol. 22, no. 3, pp. 1663-1678, March 2021, doi: 10.1109/TITS.2020.2975226.

R. I. Abdelfatah, N. M. Abdal-Ghafour and M. E. Nasr, "Secure VANET Authentication Protocol (SVAP) Using Chebyshev Chaotic Maps for Emergency Conditions," in IEEE Access, vol. 10, pp. 1096-1115, 2022, doi: 10.1109/ACCESS.2021.3137877.

M. Umar, S. H. Islam, K. Mahmood, S. Ahmed, Z. Ghaffar and M. A. Saleem, "Provable Secure Identity-Based Anonymous and Privacy-Preserving Inter-Vehicular Authentication Protocol for VANETS Using PUF," in IEEE Transactions on Vehicular Technology, vol. 70, no. 11, pp. 12158-12167, Nov. 2021, doi: 10.1109/TVT.2021.3118892.

Pathak, D. G. ., Angurala, D. M. ., & Bala, D. M. . (2020). Nervous System Based Gliomas Detection Based on Deep Learning Architecture in Segmentation. Research Journal of Computer Systems and Engineering, 1(2), 01:06. Retrieved from https://technicaljournals.org/RJCSE/index.php/journal/article/view/3

W. Othman, M. Fuyou, K. Xue and A. Hawbani, "Physically Secure Lightweight and Privacy-Preserving Message Authentication Protocol for VANET in Smart City," in IEEE Transactions on Vehicular Technology, vol. 70, no. 12, pp. 12902-12917, Dec. 2021, doi: 10.1109/TVT.2021.3121449.

J. Zhou, Z. Cao, Z. Qin, X. Dong and K. Ren, "LPPA: Lightweight Privacy-Preserving Authentication From Efficient Multi-Key Secure Outsourced Computation for Location-Based Services in VANETs," in IEEE Transactions on Information Forensics and Security, vol. 15, pp. 420-434, 2020, doi: 10.1109/TIFS.2019.2923156.

S. Lv and Y. Liu, "PLVA: Privacy-Preserving and Lightweight V2I Authentication Protocol," in IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 7, pp. 6633-6639, July 2022, doi: 10.1109/TITS.2021.3059638.

J. Zhang and Q. Zhang, "On the Security of a Lightweight Conditional Privacy-Preserving Authentication in VANETs," in IEEE Transactions on Information Forensics and Security, doi: 10.1109/TIFS.2021.3066277.

G Bindu, R .A Karthika, “Design of High Secured Multi Scroll Attractor Based Henon Map Chaotic Encryption Scheme for VANET Communication,” Journal Engineering Research, pp. 1-16, 2021, https://doi.org/10.36909/jer.ICETET.14973.

Adhikary, K., Bhushan, S., Kumar, S. et al. Hybrid Algorithm to Detect DDoS Attacks in VANETs. Wireless Pers Commun 114, 3613–3634 (2020). https://doi.org/10.1007/s11277-020-07549-y

Properties of Henon maps'

Downloads

Published

01.07.2023

How to Cite

Praba, M. S. B. ., & Ramesh, S. S. S. . (2023). VANET Communication System with HENON Based Privacy Preserving Authentication. International Journal of Intelligent Systems and Applications in Engineering, 11(7s), 340–349. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/2959