Extending security horizon through identification authentication and tracking services in hierarchical vehicular networks
•The work is for identification, authentication and tracking of vehicles in centralized as well as in distributed vehicular ad hoc network.•The work satisfies some network security properties such as authentication, confidentiality, integrity, non-repudiation protection and masquerade protection.•Sy...
Saved in:
Published in: | Computers & electrical engineering Vol. 69; pp. 479 - 496 |
---|---|
Main Authors: | , |
Format: | Journal Article |
Language: | English |
Published: |
Amsterdam
Elsevier Ltd
01-07-2018
Elsevier BV |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | •The work is for identification, authentication and tracking of vehicles in centralized as well as in distributed vehicular ad hoc network.•The work satisfies some network security properties such as authentication, confidentiality, integrity, non-repudiation protection and masquerade protection.•Symmetric key cryptography is implemented with less computational complexity unlike conventional cryptography.
The inter-vehicle communication in vehicular ad hoc network must be protected from unauthorized message injection and message alteration of unauthentic vehicles. A lightweight scheme for identification, authentication and tracking of vehicles in hierarchical vehicular ad hoc network is proposed in the present work. This work aims to preserve the basic security features such as authentication, confidentiality, and integrity in presence of attackers whose operational capability is in between mote-class attacker and lap-top class attacker. In the present scheme the communication among the different levels of the hierarchical vehicular ad hoc network is in encrypted form to protect the network from the access of attackers. The performance of the scheme is evaluated qualitatively and quantitatively. Both the qualitative and quantitative performance of the proposed scheme is compared with the existing schemes.
[Display omitted] |
---|---|
ISSN: | 0045-7906 1879-0755 |
DOI: | 10.1016/j.compeleceng.2018.01.020 |