Multimedia Tools and Applications

, Volume 66, Issue 2, pp 215–227 | Cite as

RSU-based message authentication for vehicular ad-hoc networks



Message authentication that ensures a message is genuine and verifies the source of the sender is a key issue in vehicular ad hoc networks (VANETs). Because messages may provide life-critical traffic information or emergency messages transmitted by unfamiliar sources. Because the vehicle in a VANET transmits messages in real-time in a high-mobility environment, traditional PKI security schemes are not suitable for VANET. The use of roadside units (RSUs) makes message authentication in VANET easy, but it also causes two problems and needed to be solved: how to authenticate messages transmitted between two different RSU ranges, and how to hand off messages for the vehicles moving across different RSU communication ranges. This paper proposes a comprehensive message authentication scheme that enables the message authentication within intra and between inter RSU ranges and hand-off between different RSUs. The proposed scheme balances the overhead for computation and communication with security against attacks. Efficiency analysis and comparison with related works demonstrate that the proposed scheme is a superior message authentication method for VANET.


VANET Privacy Security Vehicular communications 


  1. 1.
    Aijaz A, Bochow B, Florian D, Festag A, Gerlach M, Kroh R, Tim L (2006) Attacks on inter vehicle communication systems—an analysis. In: Proc. 3rd int. workshop intell. transp., Hamburg, GermanyGoogle Scholar
  2. 2.
    Choi JY, Jakobsson M, Wetzel S (2005) Balancing auditability and privacy in vehicular networks. In: Proc. 1st ACM int. workshop Q2SWinet, pp 79–87Google Scholar
  3. 3.
    Hartenstein H, Laberteaux KP (2008) A tutorial survey on vehicular ad hoc networks. IEEE Commun Mag June:164–171Google Scholar
  4. 4.
    Hubaux J-P, Capkun S, Luo J (2004) The security and privacy of smart vehicles. IEEE Secur Priv 2(3):49–55CrossRefGoogle Scholar
  5. 5.
    IEEE P802.11p/D6 (20098) Draft amendment for wireless access in vehicular environments (WAVE)Google Scholar
  6. 6.
    Kounga G, Walter T, Lachmund S (2009) Proving reliability of anonymous information in VANETs. IEEE Trans Veh Technol 58(6)2977–2989CrossRefGoogle Scholar
  7. 7.
    Lee S, Pan G, Park J, Gerla M, Lu S (2007) Secure incentives for commercial ad dissemination in vehicular networks. In: Proc. ACM int symp. MobiHoc, pp 150–159Google Scholar
  8. 8.
    Lin X, Sun X, Ho P-H, Shen X (2007) GSIS: a secure and privacy preserving protocol for vehicular communications. IEEE Trans Veh Technol 56(6):3442–3456CrossRefGoogle Scholar
  9. 9.
    Lin X, Sun X, Wang X, Zhang C, Ho P-H, Shen X (2008) TSVC: timed efficient and secure vehicular communications with privacy preserving. IEEE Trans Wirel Commun 7(12):4987–4998CrossRefGoogle Scholar
  10. 10.
    Long M, Chwan-Hwa JW, Irwind JD (2008) Reducing communication overhead for wireless roaming authentication: methods and performance evaluation. Int J Netw Secur 6(3):331–341Google Scholar
  11. 11.
    Lu R, Lin X, Zhu H, Ho P-H, Shen X (2008) ECPP: efficient conditional privacy preservation protocol for secure vehicular communications. In: Proc. IEEE INFOCOM, Phoenix, AZ, pp 1229–1237Google Scholar
  12. 12.
    NIST (2002) The keyed-hash message authentication code (HMAC). FIPS PUB 198Google Scholar
  13. 13.
    Perrig A, Canetti R, Tygar JD, Song D (2002) The TESLA broadcast authentication protocol. RSA CryptoBytes 5(2):2–13Google Scholar
  14. 14.
    Plöβl K, Nowey T, Mletzko C (2006) Towards a security architecture for vehicular ad hoc networks. In: Proc. 1st int. conf. availab., rel. security, Vienna, Austria, pp 374–381Google Scholar
  15. 15.
    Raya M, Hubaux J-P (2005) The security of vehicular ad hoc networks. In: Proceedings of the 3rd ACM workshop on security of ad hoc and sensor networks (SASN ’05), Alexandria, VA, USA, pp 11–21Google Scholar
  16. 16.
    Stingson DR (2005) Cryptography: theory and practice, 3rd edn. CRC, Boca RatonGoogle Scholar
  17. 17.
    Toor Y, Muhlethaler P, Laouiti A (2008) Vehicle ad hoc networks: applications and related technical issues. In: IEEE communications surveys & tutorials, pp 74–88Google Scholar
  18. 18.
    Tung B (1999) Kerberos: a network authentication system. Addison-Wesley, ReadingGoogle Scholar
  19. 19.
    U.S. Dept. Transp. (2006) Nat. highway traffic safety admin. Vehicle safety communications projectGoogle Scholar
  20. 20.
    Zhang C, Lin X, Lu R, Ho P-H, Shen X (2008) An efficient message authentication scheme for vehicular communications. IEEE Trans Veh Technol 57(6):3357–3368CrossRefGoogle Scholar
  21. 21.
    Zhang C, Lu R, Lin X, Ho P-H, Shen X (2008) An efficient identity-based batch verification scheme for vehicular sensor networks. In: Proc. IEEE INFOCOM, 2008, Phoenix, AZ, pp 246–250Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2011

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringNational Sun Yat-sen UniversityKaohsiungRepublic of China
  2. 2.Department of Computer Science EngineeringShu-Te UniversityKaohsiungRepublic of China

Personalised recommendations