Open Access Open Access  Restricted Access Subscription or Fee Access

EBV: Expectation based Validation for Vehicle-to-Vehicle Communication

B. Sam, S. Muthu Kumar

Abstract


In vehicular systems, communicate correspondences are basically critical, the same number of security related applications depend on single-bounce guide messages communicate to neighbor vehicles. Be that as it may, it turns into a testing issue to plan a communicate verification conspire for secure vehicle-to-vehicle communication. Particularly when an expansive number of reference points touch base in a brief span, vehicles are powerless against calculation based Denial of Service (DoS) attack that unreasonable signature check depletes their computational assets. In this paper, we propose a proficient communicate confirmation conspire called Expectation based Validation (EBV) to guard against calculation based DoS attack, as well as oppose parcel misfortunes caused by high portability of vehicles. Rather than most existing confirmation conspires, our EBV is a proficient and lightweight plan since it is principally based on symmetric cryptography. To additionally lessen the confirmation delay for some crisis applications, EBV is intended to misuse the sender vehicle's capacity to foresee future reference points ahead of time. What's more, to counteract memory-based DoS attack, EBV just stores abbreviated re-keyed Message Authentication Codes (Macintoshes) of signatures without diminishing security. We dissect the security of our plan and reproduce EBV under changing vehicular system situations. The outcomes show that EBV quick checks very nearly 99% messages with low stockpiling cost in high-thickness activity situations as well as in lossy remote conditions.


Keywords


VANETs, Broadcast Communication, Signatures, DoS Attacks, Expectation Based Validation

Full Text:

PDF

References


Dedicated Short Range Communications (DSRC), http://grouper.ieee.org/groups/scc32/dsrc/index.html.

F. Bai, H. Krishnan, V. Sadekar, G. Holland, and T. Elbatt, “Towards characterizing and classifying communication-based automotive applications from a wireless networking perspective,” in Proceedings of IEEE Workshop on Automotive Networking and Applications (AutoNet), pp. 1-25, 2006.

Parno and A. Perrig, “Challenges in securing vehicular networks,” in Proceedings of the Fourth Workshop Hot Topics in Networks (HotNets-IV), Nov. 2005.

S. B. Lee, G. Pan, J. S. Park, M. Gerla, and S. Lu, “Secure incentives for commercial ad dissemination in vehicular networks,” in Proceedings of ACM Mobihoc, pp. 150-159, 2007.

M. Raya and J. P. Hubaux, “Securing vehicular ad hoc networks,” Journal of Computer Security, vol. 15, no. 1, pp. 39-68 , 2007.

IEEE Std 1609.2-2013 - IEEE standard for wireless access in vehicular environments - Security services for applications and management messages, Apr. 2013.

H. C. Hsiao, A. Studer, C. Chen, A. Perrig, F. Bai, B. Bellur, and A. Iyer, “Flooding-resilient broadcast authentication for vanets,” in Proceedings of ACM Mobicom, pp. 193-204, Sep. 2011.

Zhang, R. Lu, X. Lin, P. H. Ho, and X. Shen, “An efficient identity-based batch verification scheme for vehicular sensor networks,” in Proceedings of IEEE INFOCOM, pp. 816-824, 2008.

J. L. Huang, L. Y. Yeh, and H. Y. Chien, “ABAKA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks, ” IEEE Transactions on Vehicular Technology, vol. 60, no. 1, pp. 248-262 , Jan. 2011.

K. Shim, “Reconstruction of a secure authentication scheme for vehicular ad hoc networks using a binary authentication tree,” IEEE Transactions on Wireless Communications, vol. 12, no. 11 , pp. 5586-5393, Nov. 2013.

M. Bellare, J. A. Garay, and T. Rabin, “Fast batch verification for modular exponentiation and digital signatures, ” in Proceedings of EUROCRYPT, pp. 236-250, 1998.

Boneh, C. Gentry, B. Lynn, and H. Shacham, “Aggregate and verifiably encrypted signatures from bilinear maps,” in Proceedings of EUROCRYPT, pp. 416-432, 2003.

Hankerson, J. L. Hernandez, and A. Menezes, “Software implementation of elliptic curve cryptography over binary fields,” in Proceedings of CHES, pp. 1-24, 2000.

T. Unterluggauer and E. Wenger, “Efficient pairings and ecc for embedded systems,” in Proceedings of CHES, pp. 298-315, 2014.

Y. Jiang, M. Shi, X. Shen, and C. Lin, “BAT: A robust signature scheme for vehicular networks using binary authentication tree,” IEEE Transactions on Wireless Communications, vol. 8, no. 4, pp. 1974-1983, Apr. 2009.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.