Two-Phase Authentication Mechanism for Intelligent Transport System (TAMITS) on VANET

Authors

  • S. Supriya Assistant Professor, Department of CSE, Sathyabama Institute of Science and Technology, Chennai, Tami Nadu
  • Gopika G. S. Assistant Professor, Department of CSE ,Satyabhama Institute of Science and Technology, Chennai, Tami Nadu
  • D. Devi Assistant Professor , Department of CSE ,Sathyabama Institute of Sciencse and Technology, Chennai, Tami Nadu
  • S. Prema Assistant Professor, Department of ECE, Sri Krishna College of Technology, Coimbatore.

Keywords:

Geographical secure path routing, Throughput, bounding, Packet loss ratio

Abstract

Routing protocols in VANET are primarily determined by the vehicle's location. It is used for preventing basic collisions such as replay and position spoofing attacks. The absence of verification of the vehicle brings about harsh security collisions in VANET. Intelligent transportation systems are therefore proposed to use the Two-phase Authentication Mechanism for Intelligent Transport System (TAMITS) protocol on VANET, which uses a two-phase authentication mechanism. The vehicle's private and public keys are used to transfer data packets across the communication channel. Transmission in the VANET network is accomplished using geographic routing. This proposed solution employs two distinct rounds of location verification. The transmitted data packet is authenticated once it has been sent from the originating vehicle to its next neighboring vehicle. Finally, in the second stage, the increased distance bounding authentication approach is used to verify its location. In the VANET network, the suggested structure protects geographical routing using a location verification approach. On the basis of packet loss and delivery rates as well as throughput and end-to-end delay the TAMITS' performance is assessed. Riverbed Modeler 17.5 is used to simulate the results. By altering the number of vehicles and their speed, the proposed TAMITS protocol's performance is compared to that of the Geographical secure path routing (GSPR) protocol. Because of this, more packets can be sent to the VANET target vehicle via the TAMITS protocol.

Downloads

Download data is not yet available.

References

K. Abboud and W. Zhuang, “Stochastic modeling of single-hop cluster stability in vehicular ad hoc networks,” IEEE Trans. Veh. Technol., vol. 65, no. 1, pp. 226-240, 2016. doi:10.1109/TVT.2015.2396298.

M. Abu Talib et al., “Systematic literature review on Internet-ofVehicles communication security,” Int. J. Distrib. Sens. Netw., ISSN: 1550147718815054 14, vol. 14, no. 12, 2018. doi:10.1177/1550147718815054.

O. Abumansoor and A. Boukerche, “A secure cooperative approach for Non line-of-sight location verification in VANET,” IEEE Trans. Veh. Technol., vol. 61, no. 1, pp. 275-285, 2012. doi:10.1109/TVT.2011.2174465.

D. Ameneh and G. R. Akbar, “An advanced security scheme based on clustering and key distribution in vehicular ad-hoc networks,” Comput. Electr. Eng., vol. 40, no. 2, pp. 517-529, 2013.

M. R. Asaar et al., “A secure and efficient authentication technique for vehicular ad-hoc networks”,< ‘https://eprint.iacr. org/2016/822.pdf’ >, IEEE Trans. Veh. Technol., vol. 67, no. 6, pp. 5409-5423, 2016. doi:10.1109/TVT.2018.2822768.

M. Ayaida et al., “Joint routing and location-based service in VANETs,” J. Parallel Distrib. Comput., vol. 74, no. 2, pp. 2077-2087, 2014. doi:10.1016/j.jpdc.2013.10.004.

S. K. Bhoi and P. M. Khilar, “SIR- A secure and intelligent routing protocol for vehicular ad-hoc networks,” IET Netw., vol. 4, no. 3, pp. 185-194, 2015. doi:10.1049/iet-net.2014.0053.

G. S. Bickel, 2006, ‘Inter/Intra-Vehicle Wireless Communication’.

S. Biswas and J. Misic, “Deploying proxy signature in VANETs.”, Global telecommunication conference: 1-6, 2010. doi:10.1109/GLOCOM.2010.5683526.

Bohlooli and K. Jamshidi, “A GPS-free method for vehicle future movement directions prediction using SOM for VANET,” Appl. Intell., vol. 36, no. 3, pp. 685-697, 2012. doi:10.1007/s10489-011-0289-9.

Caballero-Gil et al., “Mutual authentication in self- organized VANETs,” Comput. Stand. Interfaces, vol. 36, no. 4, pp. 704-710, 2014. doi:10.1016/j.csi.2013.12.005.

J. Chang et al., “Performance analysis with traffic accident for cooperative active safety driving in VANET/ITS,” Wirel. Personal Commun., vol. 74, no. 2, pp. 731-755, 2014. doi:10.1007/s11277-013-1318-2.

Chaudhuri et al., “Identity based secure algorithm for VANET,” Procedia Eng., vol. 38, pp. 165-171, 2012. doi:10.1016/j.proeng.2012.06.023.

[14] B. K. Chaurasia and S. Verma, “Infrastructure based authentication in VANETs,” Int. J. Multimedia Ubiquitous Eng., vol. 6, no. 2, pp. 41-54, 2011.

L. Chen et al., “A secure ambulance communication protocol for VANET,” Wirel. Personal Commun., vol. 73, no. 3, pp. 1187-1213, 2013. doi:10.1007/s11277-013-1273-y.

T. Chen et al., “Trusted routing for VANET”, 9th International Conference on Intelligent Transport Systems Telecommunications (ITST), 2009, pp. 647-652. doi:10.1109/ITST.2009.5399276.

T. W. Chim et al., “SPECS: Secure and privacy enhancing communications schemes for VANETs,” Ad Hoc Netw., vol. 9, no. 2, pp. 189-203, 2011. doi:10.1016/j.adhoc.2010.05.005.

J. Cui et al., “An Efficient Messageauthentication Scheme Based on Edge Computing for Vehicular ad hoc Networks,” IEEE Trans. Intell. Transp. Syst., vol. 20, no. 5, pp. 1621-1632, 2019. doi:10.1109/TITS.2018.2827460.

S. Iqbal et al., “Simulating malicious attacks on VANETs for connected and autonomous vehicle cybersecurity: A machine learning dataset,” CSNDSP, pp. 332-337, 2022. doi:10.1109/CSNDSP54353.2022.9908023.

Lastovetsky, “Heterogeneity in parallel and distributed computing,” J. Parallel Distrib. Comput., vol. 73, no. 12, pp. 1523-1524, 2013. doi:10.1016/j.jpdc.2013.08.010.

X. Liu et al., “A Q-learning based adaptive congestion control for V2V communication in VANET,” Int. Wirel. Commun. Mob. Comput. (IWCMC), vol. 2022, pp. 847-852, 2022. doi:10.1109/IWCMC55113.2022.9824995.

S. J. Mohammed and S. T. Hasson, “Modeling and simulation of data dissemination in VANET based on a clustering approach.” International Conference on Computer Science and Software Engineering (CSASE) vol., vol. 2022, 2022, pp. 54-59. doi:10.1109/CSASE51777.2022.9759671.

S. Shaleesh et al., Vehicle Location Privacy Protection Mechanism Based on Location and Velocity. DASA, 2022, pp. 800-803. doi:10.1109/DASA54658.2022.9765290.

Downloads

Published

24.03.2024

How to Cite

Supriya, S. ., G. S., G. ., Devi, D. ., & Prema, S. . (2024). Two-Phase Authentication Mechanism for Intelligent Transport System (TAMITS) on VANET. International Journal of Intelligent Systems and Applications in Engineering, 12(20s), 432–439. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5155

Issue

Section

Research Article