期刊
COMPUTER COMMUNICATIONS
卷 177, 期 -, 页码 57-76出版社
ELSEVIER
DOI: 10.1016/j.comcom.2021.06.013
关键词
Authentication; Vehicle ad-hoc network (VANET); Fuzzy extractor; Security and privacy; Biometrics; BAN logic; AVISPA
资金
- University Malaya, Malaysia [RK004-2017]
- Impact Oriented Interdisciplinary Research Grant (IIRG) Programme, Malaysia [IIRG003 (A, B, C)-19IISS]
A lightweight and secure authentication protocol (ELSAP) for V2V communication in VANETs has been developed, enhancing network feasibility and reducing message transfer during authentication through self-authentication. The proposed protocol also allows two or more vehicles to perform secure mutual authentication, proven by Burrow-Abadi-Needham (BAN) logic. Security analysis and comparison tools like AVISPA confirm the protocol's ability to withstand current threats, with improved communication and computational cost efficiency compared to previous schemes.
A substantial number of authentication protocols are designed to safeguard vehicular ad-hoc network (VANET) communication from potential attacks; however, they experienced an inability to provide a balance between lightweight and security. Existing security and privacy-preserving based authentication protocols in vehicular networks mostly rely on the trusted authority and signatures to validate the communication on road. Accomplishing the quick validation and correspondence is difficult in such methodologies and further, they endure execution obliges from coming about overhead. To overcome these issues, we have developed an enhanced lightweight and secure authentication protocol (ELSAP) for V2V Communication in VANETs. Moreover, the scheme withheld with self-authentication prior to communication that enhances the network feasibilities, which in return needs less message transfer during authentication as well as communication, indicates lightweight features. Furthermore, two or more vehicles can securely perform mutual authentication, proven by Burrow-Abadi-Needham (BAN) logic. Additionally, the competency of the proposed protocol against the current updated threats is shown via security analysis and comparisons tools such as Automated Validation of Internet Security Protocols and Applications (AVISPA). The result of the performance analysis shows that the communication cost and computational cost outperformed the earlier authentication schemes alongside the security features of the proposed protocol.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据