Open Access   Article Go Back

An Id-based Authentication Scheme With A Focus On Impersonation And Modification Attack On VANET

Nischitha. S.B1 , Shubha Bhat2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-7 , Page no. 1056-1060, Jul-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i7.10561060

Online published on Jul 31, 2018

Copyright © Nischitha. S.B, Shubha Bhat . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Nischitha. S.B, Shubha Bhat, “An Id-based Authentication Scheme With A Focus On Impersonation And Modification Attack On VANET,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1056-1060, 2018.

MLA Style Citation: Nischitha. S.B, Shubha Bhat "An Id-based Authentication Scheme With A Focus On Impersonation And Modification Attack On VANET." International Journal of Computer Sciences and Engineering 6.7 (2018): 1056-1060.

APA Style Citation: Nischitha. S.B, Shubha Bhat, (2018). An Id-based Authentication Scheme With A Focus On Impersonation And Modification Attack On VANET. International Journal of Computer Sciences and Engineering, 6(7), 1056-1060.

BibTex Style Citation:
@article{S.B_2018,
author = {Nischitha. S.B, Shubha Bhat},
title = {An Id-based Authentication Scheme With A Focus On Impersonation And Modification Attack On VANET},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2018},
volume = {6},
Issue = {7},
month = {7},
year = {2018},
issn = {2347-2693},
pages = {1056-1060},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2560},
doi = {https://doi.org/10.26438/ijcse/v6i7.10561060}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i7.10561060}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2560
TI - An Id-based Authentication Scheme With A Focus On Impersonation And Modification Attack On VANET
T2 - International Journal of Computer Sciences and Engineering
AU - Nischitha. S.B, Shubha Bhat
PY - 2018
DA - 2018/07/31
PB - IJCSE, Indore, INDIA
SP - 1056-1060
IS - 7
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
334 189 downloads 131 downloads
  
  
           

Abstract

VANETs (Vehicular Ad Hoc Networks), are similar to MANETs (Mobile Ad Hoc Networks) in which the nodes are vehicles. The vehicles exchange messages among themselves and these messages could be regarding the traffic status on road or the condition of the vehicle. The messages could get tampered by an adversary who wishes to gain the information regarding the vehicle. He could also track the vehicle which would violate the driver’s privacy. Hence these messages have to be secured. The adversary could modify the messages which could vary the exact information sent by the vehicle; also he could impersonate as an authorized user and tamper the information. The aim is to protect the vehicle against the two attacks; modification attack and impersonation attack. The energy consumed by the source node to send it towards the destination is calculated.

Key-Words / Index Term

VANET, modification, impersonation, energy

References

T. W. Chim, S. M. Yiu, L. C. K. Hui, and V. O. K. Li, “SPECS: Secure and privacy enhancing communications schemes for VANETs,” Ad Hoc Netw., vol. 9, no. 2, pp. 189–203, 2011.
[2] S. Zeadally, R. Hunt, Y.-S. Chen, A. Irwin, and A. Hassan, “Vehicular ad hoc networks (VANETs): Status, results, and challenges,” Telecommun. Syst., vol. 50, no. 4, pp. 217–241, 2012.
[3] M. Ghosh, A. Varghese, A. Gupta, A. A. Kherani, and S. N. Muthaiah, “Detecting misbehaviors in VANET with integrated root-cause analysis,” Ad Hoc Netw., vol. 8, no. 7, pp. 778–790, 2010.
[4] Y. Toor, P. Muhlethaler, and A. Laouiti, “Vehicle ad hoc networks: Applications and related technical issues,” IEEE Commun. Surveys Tuts., vol. 10, no. 3, pp. 74–87, Sep. 2008.
[5] A. Boukerche, H. A. B. FOliveira, E. F. Nakamura, and A. A. F. Loureiro, “Vehicular ad hoc networks: A new challenge for localization-based systems,” Comput. Commun., vol. 31, no. 12, pp. 2838–2849, 2008.
[6] IEEE Trial-Use Standard for Wireless Access in Vehicular Environment—Security Services for Applications and Management Messages, IEEE Standard 1609.2-2006, Jul. 2006.
[7] M. Raya, P. Papadimitratos, and J.-P. Hubaux, “Securing vehicular communications,” IEEE Wireless Commun., vol. 13, no. 5, pp. 8–15, Oct. 2006.
[8] J. T. Isaac, S. Zeadally, and J. S. Camara, “Security attacks and solutions for vehicular ad hoc networks,” IET Commun. J., vol. 4, no. 7, pp. 894–903, 2010.
[9] J. P. Hubaux, S. Capkun, and J. Luo, “The security and privacy of smart vehicles,” IEEE Security Privacy, vol. 2, no. 3, pp. 49–55, May/Jun. 2004.
[10] C. Gamage, B. Gras, B. Crispo, and A. S. Tanenbaum, “An identitybased ring signature scheme with enhanced privacy,” in Proc. Securecomm Workshops, 2006, pp. 1–5.
[11] M. Raya and J.-P. Hubaux, “Securing vehicular ad hoc networks,” J. Comput. Secur., vol. 15, no. 1, pp. 39–68, 2007.
[12] R. Lu, X. Lin, H. Zhu, P.-H. Ho, and X. Shen, “ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications,” in Proc. 27th Conf. IEEE INFOCOM, Apr. 2008, pp. 1903– 1911.