Distributed Trust Based Authentication Scheme in a Clustered Environment Using Threshold Cryptography for Vehicular Ad Hoc Network

Distributed Trust Based Authentication Scheme in a Clustered Environment Using Threshold Cryptography for Vehicular Ad Hoc Network

S. Sivagurunathan, V. Mohan, P. Subathra
DOI: 10.4018/jbdcn.2010040101
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

A Vehicular Ad-Hoc Network, or VANET, is a form of Mobile Ad-Hoc Network to provide communications among nearby vehicles and between vehicles and nearby fixed equipments. Security has become a prime concern in providing communication between these vehicles. Unlike wired networks, the characteristics of Vehicular Ad Hoc Networks (VANETs) pose a number of non-trivial challenges to security design. In this paper, the authors present a threshold security mechanism with a mobility based Clustering for Open Inter Vehicle Communication Networks (COIN). Nodes that have a similar moving pattern are grouped into a cluster, and unlike other clustering algorithms, it takes the moving pattern of the vehicles into consideration with the driver’s intention. The stability of clusters is estimated based on relative mobility of cluster members. A threshold cryptographic scheme is employed on top of the clusters to protect routing information and data traffic. To ensure distributed trust in the clustered environment, the private key (k) is divided into n pieces in such a way that k is easily reconstructable from any p number of pieces.
Article Preview
Top

2. Literature Review

VANETs aim at enhancing safety and efficiency in transportation systems. They comprise network nodes, that is, vehicles and Road side Infrastructure Units RSU), equipped with on-board sensory, processing, and wireless communication modules. Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communication can enable a range of applications. Among these, primarily safety will be enabled, as numerous research and development initiatives indicate, by vehicles frequently beaconing their position, along with warnings on their condition or environment. Nonetheless, VANETs can be vulnerable to attacks and jeopardize user’s privacy. For example, an attacker could inject beacons with false information, or collect vehicle’s messages, track their locations, and infer sensitive user data. To thwart such attacks, security and privacy enhancing mechanisms are necessary or, in fact, a prerequisite for deployment.

Complete Article List

Search this Journal:
Reset
Volume 20: 1 Issue (2025): Forthcoming, Available for Pre-Order
Volume 19: 1 Issue (2024)
Volume 18: 2 Issues (2022): 1 Released, 1 Forthcoming
Volume 17: 2 Issues (2021)
Volume 16: 2 Issues (2020)
Volume 15: 2 Issues (2019)
Volume 14: 2 Issues (2018)
Volume 13: 2 Issues (2017)
Volume 12: 2 Issues (2016)
Volume 11: 2 Issues (2015)
Volume 10: 4 Issues (2014)
Volume 9: 4 Issues (2013)
Volume 8: 4 Issues (2012)
Volume 7: 4 Issues (2011)
Volume 6: 4 Issues (2010)
Volume 5: 4 Issues (2009)
Volume 4: 4 Issues (2008)
Volume 3: 4 Issues (2007)
Volume 2: 4 Issues (2006)
Volume 1: 4 Issues (2005)
View Complete Journal Contents Listing