About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Future Access Enablers for Ubiquitous and Intelligent Infrastructures. 5th EAI International Conference, FABULOUS 2021, Virtual Event, May 6–7, 2021, Proceedings

Research Article

Mutual Authentication Protocol for Secure VANET Data Exchanges

Download(Requires a free EAI acccount)
5 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-030-78459-1_5,
        author={Vincent Omollo Nyangaresi and Anthony J. Rodrigues and Nidhal Kamel Taha},
        title={Mutual Authentication Protocol for Secure VANET Data Exchanges},
        proceedings={Future Access Enablers for Ubiquitous and Intelligent Infrastructures. 5th EAI International Conference, FABULOUS 2021, Virtual Event, May 6--7, 2021, Proceedings},
        proceedings_a={FABULOUS},
        year={2021},
        month={6},
        keywords={Key management Mutual authentication Nonce Time stamp Privacy Security Session VANETs},
        doi={10.1007/978-3-030-78459-1_5}
    }
    
  • Vincent Omollo Nyangaresi
    Anthony J. Rodrigues
    Nidhal Kamel Taha
    Year: 2021
    Mutual Authentication Protocol for Secure VANET Data Exchanges
    FABULOUS
    Springer
    DOI: 10.1007/978-3-030-78459-1_5
Vincent Omollo Nyangaresi,*, Anthony J. Rodrigues, Nidhal Kamel Taha
    *Contact email: vnyangaresi@tmuc.ac.ke

    Abstract

    The initial signaling and data exchanges over open wireless transmission channels in vehicular ad hoc networks (VANETs) renders these networks susceptible to security and privacy violation attacks such as impersonation and packet replays. To curb this, a number of protocols have been proposed such as Public Key Infrastructure (PKI) based schemes, identity (ID) based schemes, anonymity based approaches and password or biometric based schemes. However, PKI based schemes have high computational overheads while ID based schemes are vulnerable to denial of service attacks (DoS). On the other hand, password and biometric based schemes employ the long term shared secrets stored in tamper proof devices (TPD) as the sole authentication factor, rendering them vulnerable to side-channel attacks. On their part, anonymity based approaches employ either digital certificates, pseudonyms or group signatures. However, these schemes do not offer trajectory privacy, conventional signature signing and verification is inefficient, and certificate storage or revocation leads to high storage and computation costs. In this paper, a multi-factor mutual authentication protocol that addressed some of these attacks is proposed. This scheme eliminates the requirement for long term storage of secret keys on TPD and remained secure even in the face of on-broad unit (OBU) active physical attack. Simulation results showed that the proposed protocol is robust against attacks such as privileged insider, masquerade and packet replay. It also preserved backward key secrecy, forward key secrecy, password secrecy and anonymity. Its performance evaluation revealed that it exhibited average computation and communication overheads, in addition to average beacon generation and verification latencies.

    Keywords
    Key management Mutual authentication Nonce Time stamp Privacy Security Session VANETs
    Published
    2021-06-20
    Appears in
    SpringerLink
    http://dx.doi.org/10.1007/978-3-030-78459-1_5
    Copyright © 2021–2025 ICST
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL