Skip to main content

TruVAL: Trusted Vehicle Authentication Logic for VANET

  • Conference paper
Advances in Computing, Communication, and Control (ICAC3 2013)

Abstract

Vehicular ad hoc networks are characterized by nodes with relatively high mobility and comprise of vehicle-to-vehicle and vehicle-to-infrastructure communications based on wireless network technologies. The deployment of vehicular communication systems is strongly dependent upon their underlying security and privacy features. As vehicular ad hoc networks (VANETs) are vulnerable to malicious attacks, the security in VANETs is receiving a significant amount of attention in the field of wireless mobile networking. It has been observed that trust establishment in VANET is a challenging task due to the lack of infrastructure, and the high speed mobile nodes causing frequent changes to the network topology. In this paper we have proposed a Trusted Vehicle Authentication scheme for secured communication in VANET. The use of a layered framework for assigning trust values to a vehicle helps in detecting a node taking part in malicious activity. Conducted simulation experiments on different scenarios show the performance and effectiveness of our new proposed vehicle authentication logic for vehicular ad hoc networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Karp, B., Kung, H.T.: GPSR: greedy perimeter stateless routing for wireless networks. In: 6th Annual International Conference on Mobile Computing and Networking, pp. 243–254 (2000)

    Google Scholar 

  2. Perkins, C.E., Royer, E.M., Das, S.: Ad Hoc on Demand Distance Vector (AODV) Routing. IETF Internet draft, draft-ietf-manet-aodv-08.txt (March 2001)

    Google Scholar 

  3. Clausen, T., Jacquet, P.: Optimized Link State Routing Protocol (OLSR). RFC 3626, IETF Network Working Group (October 2003)

    Google Scholar 

  4. Namboodiri, V., Gao, L.: Prediction-Based Routing for Vehicular Ad Hoc Networks. IEEE Transaction on Vehicular Technology 56(4) (July 2007)

    Google Scholar 

  5. Serna, J., Luna, J., Medina, M.: Geo-location based Trust for Vanet’s Privacy. In: Fourth International Conference on Information Assurance and Security, IAS 2008 (2008) 978-0-769-3324

    Google Scholar 

  6. Harsch, C., Festag, A., Papadimitratos, P.: Secure Position-Based Routing for VANETs. In: IEEE 66th Vehicular Technology Conference (VTC Fall), Baltimore, USA (2008)

    Google Scholar 

  7. Aslam, B., Zou, C.: Distributed Certificate and Application Architecture for VANETs. In: 28th IEEE Conference on Military Communications, MILCOM 2009 (2009) 978-1-4244-5238-5

    Google Scholar 

  8. Chen, T., Mehani, O., Boreli, R.: Trusted Routing for VANET. In: 9th International Conference on Intelligent Transport Systems Telecommunications, ITST 2009 (2009) 978-1-4244-5347-4

    Google Scholar 

  9. Sun, Y., Zhao, B., Su, J.: ECHO: Efficient Certificate Updating Scheme by Vehicle-to-Vehicle Communications. In: Fourth International Conference on Frontier of Computer Science and Technology, FCST 2009 (2009)

    Google Scholar 

  10. Puruchuri, V., Durresi, A.: PAAVE: Protocol for Anonymous Authentication in Vehicular Networks using Smart Cards. In: Proc. GLOBECOM (2010) 978-1-4244-5638-3

    Google Scholar 

  11. Wagan, A.A., Mughal, B.M., Hasbullah, H.: VANET Security Framework for Trusted Grouping using TPM Hardware. In: 2010 International Conference on Communication Software and Networks, ICCSN (2010) 978-0-7695-3961

    Google Scholar 

  12. Wagan, A.A., Mughal, B.M., Hasbullah, H.: VANET Security Framework for Trusted Grouping using TPM Hardware: Group Formation and Message Dissemination. In: 2010 International Symposium in Information Technology, ITSIM (2010) 978-1-4244-6716-711

    Google Scholar 

  13. Tajeddine, A., Kayssi, A., Chehab, A.: A Privacy-Preserving Trust Model for VANETs. In: 10th IEEE International Conference on Computer and Information Technology, CIT 2010 (2010) 978-0-7695-4108-2

    Google Scholar 

  14. Ding, Q., Jiang, M., Li, X., Zhou, X.H.: Reputation-based Trust Model in Vehicular AdHoc Networks. In: IEEE Conference on Wireless Communications and Signal Processing, WCSP (2010) 978-1-4244-7555

    Google Scholar 

  15. Kavitha, G., Sankaranarayann, V.: Secure Resource Selection in Computational Grid Based on Quantitative Execution Trust. International Journal of Computer and Information Engineering (2010)

    Google Scholar 

  16. Singh, S.K., Vijayan, R.: Enhanced Security for Information Flow in VANET using Signcryption and Trust level. International Journal of Computer Applications (0975-8887) 16(5) (February 2011)

    Google Scholar 

  17. Biswas, S., Misic, J., Misi, V.: ID-based Safety Message Authentication for Security and Trust in Vehicular Networks. In: 31st International Conference on Distributed Computing Systems Workshops (2011)

    Google Scholar 

  18. Chuang, M.C., Lee, J.F.: TEAM: Trust-Extended Authentication Mechanism for Vehicular Ad Hoc Networks. In: International Conference on Consumer Electronics, Communications and Networks, CECNet (2011) 978-1-61284-459

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

DasGupta, S., Chaki, R., Choudhury, S. (2013). TruVAL: Trusted Vehicle Authentication Logic for VANET. In: Unnikrishnan, S., Surve, S., Bhoir, D. (eds) Advances in Computing, Communication, and Control. ICAC3 2013. Communications in Computer and Information Science, vol 361. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36321-4_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-36321-4_29

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-36320-7

  • Online ISBN: 978-3-642-36321-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics