Skip to main content

A Decision Making Based Authentication Scheme in Cooperative Vehicular Ad-Hoc Network

  • Conference paper
  • First Online:
Mobile and Wireless Technologies 2017 (ICMWT 2017)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 425))

Included in the following conference series:

  • 1296 Accesses

Abstract

With the growth and advancement in Intelligent Transport Systems comes the comfort and ease of driving at a rapid pace. People are also able to get both information and entertainment services when they are travelling. However, as Intelligent Transportation System (ITS) is becoming popular, the number of attacks on Vehicular Ad-Hoc Network (VANET) has also increased. One of the most important security threats is authenticity since most of the on road decisions are taken on the basis of the messages received. This paper proposes a simple decision making algorithm that helps in determining the authenticity of the occurrence of an incident and thus helping the vehicle under consideration to take decision regarding its future mobility pattern.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Raya M, et al (2005) The security of vehicular ad hoc networks. In: SASN 2005, pp 11–21

    Google Scholar 

  2. Moustafa H, Zhang Y (2009) Vehicular networks: techniques, standards, and applications. Auerbach Publications, Boston

    Book  Google Scholar 

  3. Hu YC, Perrig A, Johnson DB (2005) Ariadne: a secure on-demand routing protocol for ad hoc networks. Wirel Netw 11(1–2):21–38

    Article  Google Scholar 

  4. Fasbender A, Kesdogan D, Kubitz O (1996) Variable and scalable security: protection of location information in mobile IP. In: IEEE 46th vehicular technology conference, 1996. Mobile technology for the human race, vol 2. IEEE, pp 963–967, May 1996

    Google Scholar 

  5. Hu YC, Johnson DB, Perrig A (2003) SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Netw 1(1):175–192

    Article  Google Scholar 

  6. Papadimitratos P, Haas ZJ (2003) Secure data transmission in mobile ad hoc network. In: 2nd ACM workshop on wireless security (WiSe), September 2003

    Google Scholar 

  7. Sanzgiri K, Dahill B, Levine BN, Shields C, Belding-Royer EM (2002) A secure routing protocol for ad hoc networks. In: 10th IEEE international conference on network protocols, Proceedings. IEEE, pp 78–87, November 2002

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Emmanuel Antwi-Boasiako .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Science+Business Media Singapore

About this paper

Cite this paper

Roy, P., Antwi-Boasiako, E. (2018). A Decision Making Based Authentication Scheme in Cooperative Vehicular Ad-Hoc Network. In: Kim, K., Joukov, N. (eds) Mobile and Wireless Technologies 2017. ICMWT 2017. Lecture Notes in Electrical Engineering, vol 425. Springer, Singapore. https://doi.org/10.1007/978-981-10-5281-1_23

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-5281-1_23

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-5280-4

  • Online ISBN: 978-981-10-5281-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics