Abstract
Background and Objective: The inter-vehicle communication is a potential issue for improving
road safety, detecting traffic accidents, etc. in vehicular ad hoc network. The communication
among the vehicles in VANET must be protected from the dissemination of message by unauthorized
vehicles and the alteration of the message by misbehaving vehicles.
Methods: In this paper, a low overhead digital watermark based vehicle revocation scheme is proposed.
The sender vehicle generates a message and a random number after observing an event. It generates
a deformed version of the generated message and message digest, and concatenates them. The
watermark bits are generated by the sender vehicle from its unique identification and the random
number. The sender vehicle embeds the watermark bits in the concatenated form of the message digest
and deformed version of the generated message, and broadcasts the embedded message for its
neighbours. The neighbour vehicles extract the required information from the received embedded
message to verify the authentication of the sender vehicle and to identify whether the sender vehicle is
an alteration attacker. It revokes unauthentic vehicles and vehicles that are identified as alteration attacker
from vehicular ad-hoc network without any dependency on the trusted third party. The cracking
probability and cracking time are used to measure the robustness of the scheme. The cracking probability
and cracking time are measured to set the design guideline regarding the size of the watermark.
The qualitative performance of the scheme is measured in terms of storage, communication and computation
overhead. The significant reduction of all such overheads is observed by comparing the qualitative
performance of the proposed scheme with two existing schemes.
Conclusion and Results: Thus, the proposed scheme is a low overhead solution of securing vehicular
ad hoc network. Performance of the scheme is also studied quantitatively in terms of the time of verifying
vehicle authentication at the receiving end, delay in message dissemination at the sending end
and delay in message reception at the receiving end. The quantitative performance is also compared
with two of the existing schemes.
Keywords:
Authentication, message digest, OBU, RSU, V2V communication, VANET.
Graphical Abstract
[2]
Sakhreliya S, Pandya N. Public key infrastructure (PKI) using symmetric key cryptography (SC) in VANETs. Int J Comp Sci Info Technol 2014; 5: 310.
[3]
Huang JL, Yeh YL, Chien HY. ABAKA: an anonymous batch authenticated and key agreement scheme for value-added services in vehicular Ad Hoc networks. IEEE Trans Vehicle Technol 2011; 60(1): 130-57.
[4]
Studer A, Shi E, Bai F, Perrig A. Tacking together efficient authentication, revocation, and privacy in VANETs.6th Annual Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Network. IEEE 2009; 11: pp. 1-9.
[5]
Kamboj D, Kumar V, Vaid R. Secure and authenticated vehicle navigation system. J Sci Technol 2015; 8(28): 1-7.
[6]
Caballero-Gil P, Fernandez FM, Caballero-Gil C. Tree-based revocation for certificate less authentication in vehicular ad hoc network. Int J Comp Commun 2014; 9: 14-21.
[7]
Abdulhussain SH. Enhanced management of certificate caching and revocation lists in VANET. Int J Comp Appl 2013; 83(12): 38-47.
[8]
Foster D, Lohr H, Zibuschka J, Kargl F. REWIRE: revocation without resolution: a privacy friendly revocation mechanism for vehicular ad hoc networks. International Conference on Trust and Trustworthy Computing 2015; 15: 193208.
[9]
Mondal A, Mitra S. Identification, authentication and tracking algorithm for vehicles using vin in centralized VANET. International Conference of Communication, Network and Computing (CNC) Proceedings published by Springer LNICST 2012; 118: 115-20.
[10]
Xiao Y. Security in sensor networks. Auerbach Publications, Taylor and Francis Group 2006.
[11]
Kahate A. Cryptography and network security McGrill Education. (India): Pvt. Ltd 3rd Edition 2013.
[13]
Mondal A, Mitra S. TDHA: a Timestamp defined hash algorithm for message authentication in VANET. International Conference on Computational Modelling and Security (CMS) Proceedings published by Elsevier in the Procedia Computer Science 2016; 15: 182-9.
[15]
Chaurasia BK, Verma S. Infrastructure based authentication in VANETs. Int J Multimedia Eng 2011; 6(2): 41-53.
[16]
Kim SH, Lee IY. A secure and efficient vehicle-to-vehicle communication scheme using bloom filter in VANETs. Int J Sec Appl 2014; 8(2): 9-24.
[17]
Chaurasia BK, Verma S. Infrastructure Based Authentication in VANET. Int J Multimedia Ubiquitous Eng Sec Appl 2011; 8(2): 9-24.