Extending security horizon through identification authentication and tracking services in hierarchical vehicular networks

•The work is for identification, authentication and tracking of vehicles in centralized as well as in distributed vehicular ad hoc network.•The work satisfies some network security properties such as authentication, confidentiality, integrity, non-repudiation protection and masquerade protection.•Sy...

Full description

Saved in:
Bibliographic Details
Published in:Computers & electrical engineering Vol. 69; pp. 479 - 496
Main Authors: Mondal, Atanu, Mitra, Sulata
Format: Journal Article
Language:English
Published: Amsterdam Elsevier Ltd 01-07-2018
Elsevier BV
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:•The work is for identification, authentication and tracking of vehicles in centralized as well as in distributed vehicular ad hoc network.•The work satisfies some network security properties such as authentication, confidentiality, integrity, non-repudiation protection and masquerade protection.•Symmetric key cryptography is implemented with less computational complexity unlike conventional cryptography. The inter-vehicle communication in vehicular ad hoc network must be protected from unauthorized message injection and message alteration of unauthentic vehicles. A lightweight scheme for identification, authentication and tracking of vehicles in hierarchical vehicular ad hoc network is proposed in the present work. This work aims to preserve the basic security features such as authentication, confidentiality, and integrity in presence of attackers whose operational capability is in between mote-class attacker and lap-top class attacker. In the present scheme the communication among the different levels of the hierarchical vehicular ad hoc network is in encrypted form to protect the network from the access of attackers. The performance of the scheme is evaluated qualitatively and quantitatively. Both the qualitative and quantitative performance of the proposed scheme is compared with the existing schemes. [Display omitted]
ISSN:0045-7906
1879-0755
DOI:10.1016/j.compeleceng.2018.01.020