Multi-Level ECDH-Based Authentication Protocol for Secure Software-Defined VANET Interaction

Multi-Level ECDH-Based Authentication Protocol for Secure Software-Defined VANET Interaction

Umesh K. Raut, Vishwamitra L. K.
DOI: 10.4018/IJMCMC.297961
Article PDF Download
Open access articles are freely available for download

Abstract

The proposed multi-layer ECDH based authentication model, the vehicles in the VANET are authenticated and authorized to protect the network from the attacks for which the vehicles undergo the registration process initially. After the successful registration, the messages generated from the vehicles are communicated with each other through multi-step authentication, which assures the exactness of the received messages. Then, the authorization process is executed in the VANET so as to ensure the safe and secure interactions between the vehicles. The implemented authentication model is analyzed using the comparative methods based on the performance standards, such as detection accuracy, execution time, packet delivery ratio (PDR) and throughput. The detection accuracy, execution time, PDR and the throughput of the network while executing the proposed multi-level ECDH based authentication system is better than the prevailing security models as the security features of the existing models are enhanced better than the existing state-of-art methods.
Article Preview
Top

1. Introduction

The VANET attains a pre-eminent role in the initiative transport system (ITS) as it supports the transport system in various circumstances such as enabling mutual communication, minimizing accidents, enhancing the interaction efficiency, and reducing traffic congestion (Pournaghi, et al., 2018; Zhou, et al., 2020; Jiang, et al., 2020). VANET (Mendiboure, et al., 2020) is characterized as the network organization of the vehicles, which ensures seamless interactions between the RSU and the vehicles or any other well-developed frameworks within the network coverage area. Since the innovation is on the verge of assembling computerized managing automobiles, it is needed to normalize vehicle-to-vehicle (V2V) or vehicle-to-other specialist's correspondence (Mishra, et al., 2020). Yet, the interaction in the vehicles is confronting some issues like the mobility of the vehicles, heterogeneity of correspondence channels, and rapid variation in network topologies (Mendiboure, et al., 2020). The software-defined network (SDN) is one of the advanced technologies designed to restrain the interaction mentioned above issues experienced in the VANET. SDN in VANETs is a rapid-developing systems administration that permits adaptability and organization design by isolating information and control planes within the network organization (Baskett, 2013; Alouache, et al., 2020). The SDN-based VANET design comprises RSU and automobile with the onboard unit (OBU). The RSUs are associated with the SDN regulator, which acts as a controller to get worldwide organization data (Raja, et al., 2020).

In the real-world application, the SDVN is exposed to various attacks, such as jellyfish, man in the middle attack (MITM), sybil, and DOS, which acts as a great threat to the confidentiality privacy of the transferred data. Hence, SDVN has to satisfy security parameters such as availability, integrity, and authentication (Kim, et al., 2017; Kumar, et al., 2020) to ensure secure interaction between the vehicles. Hence, this research aims to develop a dynamic security scheme that enhances the privacy of the security of SDVN and makes the network resistant to numerous attacks including replay and sybil attacks. In SDVN Sybil attacks create the issues such as altering the voting base system and disturbance in routing. Recognizing the replay and Sybil attack is the significant process to be executed in the SDVN to manage the vehicles' privacy and intercept the genuine vehicle's connecting identity (Parham & Pouyan, 2020). Furthermore, a strong privacy potential that tracks the motorist's attitude is required in SDVN to prevent malicious vehicles from misusing the data and to avoid spreading fake information. An experience profile must be created to recognize and block the malicious vehicles from the genuine vehicles in the network organization.

Complete Article List

Search this Journal:
Reset
Volume 15: 1 Issue (2024)
Volume 14: 1 Issue (2023)
Volume 13: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 12: 4 Issues (2021)
Volume 11: 4 Issues (2020)
Volume 10: 4 Issues (2019)
Volume 9: 4 Issues (2018)
Volume 8: 4 Issues (2017)
Volume 7: 4 Issues (2016)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing