LoWVR: Low Overhead Watermark based Vehicle Revocation Scheme in VANET

Author(s): Atanu Mondal, Sulata Mitra*.

Journal Name: International Journal of Sensors, Wireless Communications and Control

Volume 9 , Issue 1 , 2019

Become EABM
Become Reviewer

Graphical Abstract:


Abstract:

Background and Objective: The inter-vehicle communication is a potential issue for improving road safety, detecting traffic accidents, etc. in vehicular ad hoc network. The communication among the vehicles in VANET must be protected from the dissemination of message by unauthorized vehicles and the alteration of the message by misbehaving vehicles.

Methods: In this paper, a low overhead digital watermark based vehicle revocation scheme is proposed. The sender vehicle generates a message and a random number after observing an event. It generates a deformed version of the generated message and message digest, and concatenates them. The watermark bits are generated by the sender vehicle from its unique identification and the random number. The sender vehicle embeds the watermark bits in the concatenated form of the message digest and deformed version of the generated message, and broadcasts the embedded message for its neighbours. The neighbour vehicles extract the required information from the received embedded message to verify the authentication of the sender vehicle and to identify whether the sender vehicle is an alteration attacker. It revokes unauthentic vehicles and vehicles that are identified as alteration attacker from vehicular ad-hoc network without any dependency on the trusted third party. The cracking probability and cracking time are used to measure the robustness of the scheme. The cracking probability and cracking time are measured to set the design guideline regarding the size of the watermark. The qualitative performance of the scheme is measured in terms of storage, communication and computation overhead. The significant reduction of all such overheads is observed by comparing the qualitative performance of the proposed scheme with two existing schemes.

Conclusion and Results: Thus, the proposed scheme is a low overhead solution of securing vehicular ad hoc network. Performance of the scheme is also studied quantitatively in terms of the time of verifying vehicle authentication at the receiving end, delay in message dissemination at the sending end and delay in message reception at the receiving end. The quantitative performance is also compared with two of the existing schemes.

Keywords: Authentication, message digest, OBU, RSU, V2V communication, VANET.

[1]
Zhang C. On Achieving secure message authentication for vehicular communications. Electr Comp Eng 2010.http://hdl.handle.net/10012/5204
[2]
Sakhreliya S, Pandya N. Public key infrastructure (PKI) using symmetric key cryptography (SC) in VANETs. Int J Comp Sci Info Technol 2014; 5: 310.
[3]
Huang JL, Yeh YL, Chien HY. ABAKA: an anonymous batch authenticated and key agreement scheme for value-added services in vehicular Ad Hoc networks. IEEE Trans Vehicle Technol 2011; 60(1): 130-57.
[4]
Studer A, Shi E, Bai F, Perrig A. Tacking together efficient authentication, revocation, and privacy in VANETs.6th Annual Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Network. IEEE 2009; 11: pp. 1-9.
[5]
Kamboj D, Kumar V, Vaid R. Secure and authenticated vehicle navigation system. J Sci Technol 2015; 8(28): 1-7.
[6]
Caballero-Gil P, Fernandez FM, Caballero-Gil C. Tree-based revocation for certificate less authentication in vehicular ad hoc network. Int J Comp Commun 2014; 9: 14-21.
[7]
Abdulhussain SH. Enhanced management of certificate caching and revocation lists in VANET. Int J Comp Appl 2013; 83(12): 38-47.
[8]
Foster D, Lohr H, Zibuschka J, Kargl F. REWIRE: revocation without resolution: a privacy friendly revocation mechanism for vehicular ad hoc networks. International Conference on Trust and Trustworthy Computing 2015; 15: 193208.
[9]
Mondal A, Mitra S. Identification, authentication and tracking algorithm for vehicles using vin in centralized VANET. International Conference of Communication, Network and Computing (CNC) Proceedings published by Springer LNICST 2012; 118: 115-20.
[10]
Xiao Y. Security in sensor networks. Auerbach Publications, Taylor and Francis Group 2006.
[11]
Kahate A. Cryptography and network security McGrill Education. (India): Pvt. Ltd 3rd Edition 2013.
[13]
Mondal A, Mitra S. TDHA: a Timestamp defined hash algorithm for message authentication in VANET. International Conference on Computational Modelling and Security (CMS) Proceedings published by Elsevier in the Procedia Computer Science 2016; 15: 182-9.
[14]
NI PXIe-4339, National Instrument http://sine.nicom/nips/cds/view/p/lang/en/nid/212632
[15]
Chaurasia BK, Verma S. Infrastructure based authentication in VANETs. Int J Multimedia Eng 2011; 6(2): 41-53.
[16]
Kim SH, Lee IY. A secure and efficient vehicle-to-vehicle communication scheme using bloom filter in VANETs. Int J Sec Appl 2014; 8(2): 9-24.
[17]
Chaurasia BK, Verma S. Infrastructure Based Authentication in VANET. Int J Multimedia Ubiquitous Eng Sec Appl 2011; 8(2): 9-24.


Rights & PermissionsPrintExport Cite as

Article Details

VOLUME: 9
ISSUE: 1
Year: 2019
Page: [124 - 143]
Pages: 20
DOI: 10.2174/2210327908666180828125842
Price: $58

Article Metrics

PDF: 19
HTML: 2