scispace - formally typeset
Search or ask a question
Journal ArticleDOI

VCom: Secure and Efficient Vehicle-to-Vehicle Message Communication Protocol

TL;DR: A secure and efficient V2V message communication protocol for vehicle users using a low-cost function (i.e., SHA-256) while preserving user anonymity is proposed using a test-bed implementation results show that the VCom is comparatively efficient in the computational cost, communication overhead, storage cost, and energy consumption.
Abstract: Vehicles are especially capable of exchanging pertinent information with nearby vehicles. However, there are multiple challenges like secure data exchange, fast message transmission, dynamic topology, and user data protection while transmitting relevant information between moving vehicles on the road. Therefore, researchers suggested different vehicle-to-vehicle (V2V) message communication and verification mechanisms, but they are vulnerable to crucial security attacks. Furthermore, the existing V2V communication schemes relatively require high operational costs for the implementation, taking more time and computational resources for road safety and traffic data exchanges. In this article, we propose a secure and efficient V2V message communication protocol (named as VCom ) for vehicle users using a low-cost function (i.e., SHA-256) while preserving user anonymity. The security proof and analysis are discussed for the VCom to confirm its security and user privacy strengths against different security attributes and attacks. The test-bed implementation results show that the VCom is comparatively efficient in the computational cost, communication overhead, storage cost, and energy consumption.
Citations
More filters
Proceedings ArticleDOI
09 Sep 2019
TL;DR: This work proposes reliable data transmission protocols for cutting-edge architecture to search data from the storage, to resist against various security attacks, and provide better performance results in diverse smart city applications.
Abstract: The pioneering concept of connected vehicles has transformed the way of thinking for researchers and entrepreneurs by collecting relevant data from nearby objects. However, this data is useful for a specific vehicle only. Moreover, vehicles get a high amount of data (e.g., traffic, safety, and multimedia infotainment) on the road. Thus, vehicles expect adequate storage device for this data, but it is infeasible to have a large memory in each vehicle. Hence, the vehicular cloud computing (VCC) framework came into the picture to provide a storage facility by connecting a road-side-unit (RSU) with the vehicular cloud (VC). In this, data should be saved in an encrypted form to preserve security, but there is a challenge to search for information over encrypted data. Next, we understand that many of vehicular communication schemes are inefficient for data transmissions due to its poor performance results and vulnerable to different fundamental security attacks. Accordingly, on-device performance is critical, but data damages and secure on-time connectivity are also significant challenges in a public environment. Therefore, we propose reliable data transmission protocols for cutting-edge architecture to search data from the storage, to resist against various security attacks, and provide better performance results. Thus, the proposed data transmission protocol is useful in diverse smart city applications (business, safety, and entertainment) for the benefits of society.

9 citations

Journal ArticleDOI
TL;DR: Li et al. as discussed by the authors proposed an efficient privacy-preserving authentication scheme with on-chain certificate management (PACM) in VANETs, where the service manager (SM) of each domain serves as a node of the blockchain to build a distributed system.
Abstract: Privacy-preserving authentication is designed to protect vehicular ad-hoc networks (VANETs) from illegitimate users and fake messages while maintaining the privacy of legitimate users’ identities. However, existing authentication schemes have disadvantages such as non-transparent certificate issuance and revocation, high identity authentication and certificate revocation overhead. In this paper, we propose an efficient privacy-preserving authentication scheme with on-chain certificate management (PACM) in VANETs, where the service manager (SM) of each domain serves as a node of the blockchain to build a distributed system. Specifically, based on elliptic curve cryptography (ECC) and exclusive-OR operations, we achieve secure and lightweight mutual authentication between vehicles and roadside units (RSUs) by regularly updated pseudonyms. Then, we adopt the blockchain to record the issuance and revocation of all certificates, which makes SM’s activities transparent. Moreover, we introduce the counting garbled bloom filter (CGBF) to enable fast query and revocation of certificates. Besides, we design a non-forgeable and non-repudiable billing mechanism based on the hash chain technology. Security analysis and experimental results show that PACM achieves stronger security with less overhead.

3 citations

Journal ArticleDOI
TL;DR: An evidence chain is designed to achieve offline auditing, which allows the cloud to spontaneously generate data integrity evidence without communicating with auditors during the evidence generation phase, and is extended to support public and automatic validation based on the smart contract.
Abstract: The rapid growth of various vehicular apps such as automotive navigation and in-car entertainment has brought the explosion of vehicular data. Such a growth has given rise to a huge challenge of maintaining the quality of cloud storage services for the whole period of storage in vehicular networks. As a result, poor quality of services easily causes data corruption problems and thereby threats vehicular data integrity. Blockchain, a tamper-proofing technique, is considered a promising approach for mitigating data integrity risks in cloud storage. However, existing blockchain-based schemes for auditing long-term cloud data integrity suffer from poor communication performance in a vehicular network. In this study, a blockchain-based offline auditing scheme for cloud storage in the vehicular network is proposed to improve auditing performance. Inspired by the data structure of blockchain, we design an evidence chain to achieve offline auditing, which allows the cloud to spontaneously generate data integrity evidence without communicating with auditors during the evidence generation phase. Furthermore, we extend our scheme to support public and automatic validation based on the smart contract. We prove the security of the proposed scheme under the random oracle model and further provide the performance evaluation by comparing with the state-of-the-art approaches.

2 citations

Journal ArticleDOI
TL;DR: In this paper , the authors proposed a new data communication scheme using low-cost cryptographic functions that can withstand various security and privacy attacks while consuming very less computational resources comparatively compared to the existing relevant schemes.

2 citations

Journal ArticleDOI
TL;DR: Li et al. as mentioned in this paper proposed an efficient privacy-preserving authentication scheme with on-chain certificate management (PACM) in VANETs, where the service manager (SM) of each domain serves as a node of the blockchain to build a distributed system.
Abstract: Privacy-preserving authentication is designed to protect vehicular ad-hoc networks (VANETs) from illegitimate users and fake messages while maintaining the privacy of legitimate users’ identities. However, existing authentication schemes have disadvantages such as non-transparent certificate issuance and revocation, high identity authentication and certificate revocation overhead. In this paper, we propose an efficient privacy-preserving authentication scheme with on-chain certificate management (PACM) in VANETs, where the service manager (SM) of each domain serves as a node of the blockchain to build a distributed system. Specifically, based on elliptic curve cryptography (ECC) and exclusive-OR operations, we achieve secure and lightweight mutual authentication between vehicles and roadside units (RSUs) by regularly updated pseudonyms. Then, we adopt the blockchain to record the issuance and revocation of all certificates, which makes SM’s activities transparent. Moreover, we introduce the counting garbled bloom filter (CGBF) to enable fast query and revocation of certificates. Besides, we design a non-forgeable and non-repudiable billing mechanism based on the hash chain technology. Security analysis and experimental results show that PACM achieves stronger security with less overhead.

2 citations

References
More filters
Proceedings ArticleDOI
Mihir Bellare1, Phillip Rogaway1
01 Dec 1993
TL;DR: It is argued that the random oracles model—where all parties have access to a public random oracle—provides a bridge between cryptographic theory and cryptographic practice, and yields protocols much more efficient than standard ones while retaining many of the advantages of provable security.
Abstract: We argue that the random oracle model—where all parties have access to a public random oracle—provides a bridge between cryptographic theory and cryptographic practice. In the paradigm we suggest, a practical protocol P is produced by first devising and proving correct a protocol PR for the random oracle model, and then replacing oracle accesses by the computation of an “appropriately chosen” function h. This paradigm yields protocols much more efficient than standard ones while retaining many of the advantages of provable security. We illustrate these gains for problems including encryption, signatures, and zero-knowledge proofs.

5,313 citations


"VCom: Secure and Efficient Vehicle-..." refers background in this paper

  • ...We firstly illustrate the formal security proof referring the random oracle model (ROM) [40], and then discuss security analysis, considering the adversary model (see Section III-B)....

    [...]

  • ...We consider the ROM based security model for a game between an adversary (A) and the challenger (C) to determine whether A can win a game by tackling the challenge given by C polynomially for a non-negligible probability or not....

    [...]

  • ...proof referring the random oracle model (ROM) [40], and then discuss security analysis, considering the adversary model (see Section III-B)....

    [...]

Proceedings ArticleDOI
03 Nov 2004
TL;DR: The FTSP achieves its robustness by utilizing periodic flooding of synchronization messages, and implicit dynamic topology update and comprehensive error compensation including clock skew estimation, which is markedly better than that of the existing RBS and TPSN algorithms.
Abstract: Wireless sensor network applications, similarly to other distributed systems, often require a scalable time synchronization service enabling data consistency and coordination. This paper describes the Flooding Time Synchronization Protocol (FTSP), especially tailored for applications requiring stringent precision on resource limited wireless platforms. The proposed time synchronization protocol uses low communication bandwidth and it is robust against node and link failures. The FTSP achieves its robustness by utilizing periodic flooding of synchronization messages, and implicit dynamic topology update. The unique high precision performance is reached by utilizing MAC-layer time-stamping and comprehensive error compensation including clock skew estimation. The sources of delays and uncertainties in message transmission are analyzed in detail and techniques are presented to mitigate their effects. The FTSP was implemented on the Berkeley Mica2 platform and evaluated in a 60-node, multi-hop setup. The average per-hop synchronization error was in the one microsecond range, which is markedly better than that of the existing RBS and TPSN algorithms.

2,267 citations


"VCom: Secure and Efficient Vehicle-..." refers background in this paper

  • ...When vehicles cross RSUs on the road, they can be reliably resynchronized by an RSU [7], [37], [38]....

    [...]

Journal ArticleDOI
John Kenney1
16 Jun 2011
TL;DR: The content and status of the DSRC standards being developed for deployment in the United States are explained, including insights into why specific technical solutions are being adopted, and key challenges remaining for successful DSRC deployment.
Abstract: Wireless vehicular communication has the potential to enable a host of new applications, the most important of which are a class of safety applications that can prevent collisions and save thousands of lives. The automotive industry is working to develop the dedicated short-range communication (DSRC) technology, for use in vehicle-to-vehicle and vehicle-to-roadside communication. The effectiveness of this technology is highly dependent on cooperative standards for interoperability. This paper explains the content and status of the DSRC standards being developed for deployment in the United States. Included in the discussion are the IEEE 802.11p amendment for wireless access in vehicular environments (WAVE), the IEEE 1609.2, 1609.3, and 1609.4 standards for Security, Network Services and Multi-Channel Operation, the SAE J2735 Message Set Dictionary, and the emerging SAE J2945.1 Communication Minimum Performance Requirements standard. The paper shows how these standards fit together to provide a comprehensive solution for DSRC. Most of the key standards are either recently published or expected to be completed in the coming year. A reader will gain a thorough understanding of DSRC technology for vehicular communication, including insights into why specific technical solutions are being adopted, and key challenges remaining for successful DSRC deployment. The U.S. Department of Transportation is planning to decide in 2013 whether to require DSRC equipment in new vehicles.

1,866 citations


"VCom: Secure and Efficient Vehicle-..." refers background or methods in this paper

  • ...(DSRC) for Intelligent Transportation Systems (ITS) applications [2]....

    [...]

  • ...25 dBm transmission power, and 6 Mbps data rate and there are 180 vehicles according to the DSRC standard [2], [41]....

    [...]

Journal ArticleDOI
01 Jan 2007
TL;DR: This paper provides a set of security protocols, it is shown that they protect privacy and it is analyzed their robustness and efficiency, and describes some major design decisions still to be made.
Abstract: Vehicular networks are very likely to be deployed in the coming years and thus become the most relevant form of mobile ad hoc networks. In this paper, we address the security of these networks. We provide a detailed threat analysis and devise an appropriate security architecture. We also describe some major design decisions still to be made, which in some cases have more than mere technical implications. We provide a set of security protocols, we show that they protect privacy and we analyze their robustness and efficiency.

1,550 citations

Journal ArticleDOI
TL;DR: The basic characteristics of vehicular networks are introduced, an overview of applications and associated requirements, along with challenges and their proposed solutions are provided, and the current and past major ITS programs and projects in the USA, Japan and Europe are provided.
Abstract: Vehicular networking has significant potential to enable diverse applications associated with traffic safety, traffic efficiency and infotainment. In this survey and tutorial paper we introduce the basic characteristics of vehicular networks, provide an overview of applications and associated requirements, along with challenges and their proposed solutions. In addition, we provide an overview of the current and past major ITS programs and projects in the USA, Japan and Europe. Moreover, vehicular networking architectures and protocol suites employed in such programs and projects in USA, Japan and Europe are discussed.

1,422 citations


"VCom: Secure and Efficient Vehicle-..." refers background in this paper

  • ...Therefore, VANET is more useful to vehicle users while offering road safety and traffic management services [3]....

    [...]