Two-Phase Authentication Mechanism for Intelligent Transport System (TAMITS) on VANET
Keywords:
Geographical secure path routing, Throughput, bounding, Packet loss ratioAbstract
Routing protocols in VANET are primarily determined by the vehicle's location. It is used for preventing basic collisions such as replay and position spoofing attacks. The absence of verification of the vehicle brings about harsh security collisions in VANET. Intelligent transportation systems are therefore proposed to use the Two-phase Authentication Mechanism for Intelligent Transport System (TAMITS) protocol on VANET, which uses a two-phase authentication mechanism. The vehicle's private and public keys are used to transfer data packets across the communication channel. Transmission in the VANET network is accomplished using geographic routing. This proposed solution employs two distinct rounds of location verification. The transmitted data packet is authenticated once it has been sent from the originating vehicle to its next neighboring vehicle. Finally, in the second stage, the increased distance bounding authentication approach is used to verify its location. In the VANET network, the suggested structure protects geographical routing using a location verification approach. On the basis of packet loss and delivery rates as well as throughput and end-to-end delay the TAMITS' performance is assessed. Riverbed Modeler 17.5 is used to simulate the results. By altering the number of vehicles and their speed, the proposed TAMITS protocol's performance is compared to that of the Geographical secure path routing (GSPR) protocol. Because of this, more packets can be sent to the VANET target vehicle via the TAMITS protocol.
Downloads
References
K. Abboud and W. Zhuang, “Stochastic modeling of single-hop cluster stability in vehicular ad hoc networks,” IEEE Trans. Veh. Technol., vol. 65, no. 1, pp. 226-240, 2016. doi:10.1109/TVT.2015.2396298.
M. Abu Talib et al., “Systematic literature review on Internet-ofVehicles communication security,” Int. J. Distrib. Sens. Netw., ISSN: 1550147718815054 14, vol. 14, no. 12, 2018. doi:10.1177/1550147718815054.
O. Abumansoor and A. Boukerche, “A secure cooperative approach for Non line-of-sight location verification in VANET,” IEEE Trans. Veh. Technol., vol. 61, no. 1, pp. 275-285, 2012. doi:10.1109/TVT.2011.2174465.
D. Ameneh and G. R. Akbar, “An advanced security scheme based on clustering and key distribution in vehicular ad-hoc networks,” Comput. Electr. Eng., vol. 40, no. 2, pp. 517-529, 2013.
M. R. Asaar et al., “A secure and efficient authentication technique for vehicular ad-hoc networks”,< ‘https://eprint.iacr. org/2016/822.pdf’ >, IEEE Trans. Veh. Technol., vol. 67, no. 6, pp. 5409-5423, 2016. doi:10.1109/TVT.2018.2822768.
M. Ayaida et al., “Joint routing and location-based service in VANETs,” J. Parallel Distrib. Comput., vol. 74, no. 2, pp. 2077-2087, 2014. doi:10.1016/j.jpdc.2013.10.004.
S. K. Bhoi and P. M. Khilar, “SIR- A secure and intelligent routing protocol for vehicular ad-hoc networks,” IET Netw., vol. 4, no. 3, pp. 185-194, 2015. doi:10.1049/iet-net.2014.0053.
G. S. Bickel, 2006, ‘Inter/Intra-Vehicle Wireless Communication’.
S. Biswas and J. Misic, “Deploying proxy signature in VANETs.”, Global telecommunication conference: 1-6, 2010. doi:10.1109/GLOCOM.2010.5683526.
Bohlooli and K. Jamshidi, “A GPS-free method for vehicle future movement directions prediction using SOM for VANET,” Appl. Intell., vol. 36, no. 3, pp. 685-697, 2012. doi:10.1007/s10489-011-0289-9.
Caballero-Gil et al., “Mutual authentication in self- organized VANETs,” Comput. Stand. Interfaces, vol. 36, no. 4, pp. 704-710, 2014. doi:10.1016/j.csi.2013.12.005.
J. Chang et al., “Performance analysis with traffic accident for cooperative active safety driving in VANET/ITS,” Wirel. Personal Commun., vol. 74, no. 2, pp. 731-755, 2014. doi:10.1007/s11277-013-1318-2.
Chaudhuri et al., “Identity based secure algorithm for VANET,” Procedia Eng., vol. 38, pp. 165-171, 2012. doi:10.1016/j.proeng.2012.06.023.
[14] B. K. Chaurasia and S. Verma, “Infrastructure based authentication in VANETs,” Int. J. Multimedia Ubiquitous Eng., vol. 6, no. 2, pp. 41-54, 2011.
L. Chen et al., “A secure ambulance communication protocol for VANET,” Wirel. Personal Commun., vol. 73, no. 3, pp. 1187-1213, 2013. doi:10.1007/s11277-013-1273-y.
T. Chen et al., “Trusted routing for VANET”, 9th International Conference on Intelligent Transport Systems Telecommunications (ITST), 2009, pp. 647-652. doi:10.1109/ITST.2009.5399276.
T. W. Chim et al., “SPECS: Secure and privacy enhancing communications schemes for VANETs,” Ad Hoc Netw., vol. 9, no. 2, pp. 189-203, 2011. doi:10.1016/j.adhoc.2010.05.005.
J. Cui et al., “An Efficient Messageauthentication Scheme Based on Edge Computing for Vehicular ad hoc Networks,” IEEE Trans. Intell. Transp. Syst., vol. 20, no. 5, pp. 1621-1632, 2019. doi:10.1109/TITS.2018.2827460.
S. Iqbal et al., “Simulating malicious attacks on VANETs for connected and autonomous vehicle cybersecurity: A machine learning dataset,” CSNDSP, pp. 332-337, 2022. doi:10.1109/CSNDSP54353.2022.9908023.
Lastovetsky, “Heterogeneity in parallel and distributed computing,” J. Parallel Distrib. Comput., vol. 73, no. 12, pp. 1523-1524, 2013. doi:10.1016/j.jpdc.2013.08.010.
X. Liu et al., “A Q-learning based adaptive congestion control for V2V communication in VANET,” Int. Wirel. Commun. Mob. Comput. (IWCMC), vol. 2022, pp. 847-852, 2022. doi:10.1109/IWCMC55113.2022.9824995.
S. J. Mohammed and S. T. Hasson, “Modeling and simulation of data dissemination in VANET based on a clustering approach.” International Conference on Computer Science and Software Engineering (CSASE) vol., vol. 2022, 2022, pp. 54-59. doi:10.1109/CSASE51777.2022.9759671.
S. Shaleesh et al., Vehicle Location Privacy Protection Mechanism Based on Location and Velocity. DASA, 2022, pp. 800-803. doi:10.1109/DASA54658.2022.9765290.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.