Skip to main content
Log in

Using I2P (Invisible Internet Protocol) Encrypted Virtual Tunnels for a Secure and Anonymous Communication in VANets: I2P Vehicular Protocol (IVP)

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

A Correction to this article was published on 07 September 2022

This article has been updated

Abstract

The Invisible Internet Project (I2P) as a secure protocol uses robust mechanisms and strong algorithms to reinforce the security and the anonymity of the communication. However, the difference between internet and VANet in terms of mobility and connectivity of nodes presents a big issue that needs to be treated when using I2P mechanisms in VANet. The previous work “Anonymizing Communication in VANets by Applying I2P Mechanisms” proposes a protocol based on tunnels and encryption algorithms that use digital signatures and authentication mechanisms. Tunnels are created in static scenarios not dynamic and without maintaining their existence, which is a challenging issue in VANet that need to be treated to reply to different requirements of this kind of networks. In this paper, we complete the last version of the proposed protocol (I2P Vehicular Protocol) by integrating a tunnel maintenance algorithm for maintaining the existence of the created tunnels during the communication. This algorithm allows the implementation of the protocol in mobile scenarios of VANet. The effectiveness and security of IVP protocol are proved by analyzing the added part related to the tunnel maintenance process and showing performance results (end-to-end delay, PDR and overhead). Simulation results show that the new protocol version is better than the first version thanks to the integrated tunnel maintenance algorithm. Simulation scenarios were executed using NS3 simulator.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Change history

  • 29 August 2022

    The original version of this article was revised: In the original version of this article, the given and family names of Tayeb Diab, Marc Gilg, Pascal Lorenz and Frederic Drouhin were incorrectly structured. The original article has been corrected.

  • 07 September 2022

    A Correction to this paper has been published: https://doi.org/10.1007/s11277-022-09940-3

References

  1. Diab, T., Gilg, M., & Lorenz, P. (2019). A secure communication model using lightweight Diffie-Hellman method in vehicular ad hoc networks. International Journal of Security and Networks, 14(2), 61–77.

    Article  Google Scholar 

  2. Tayeb Diab, Marc Gilg, Frederic Drouhin & Pascal Lorenz, “Anonymizing Communication in VANets by Applying I2P Mechanisms”, IEEE Global Communications Conference, (2019)

  3. Milton Joe, M., & Ramakrishnan, B. (2021). Live emergency and warning alerts through android application for vehicular ad hoc network communication (android VANET). Wireless Personal Communications, 116, 125–151. https://doi.org/10.1007/s11277-020-07708-1

    Article  Google Scholar 

  4. Joe, M. M., & Ramakrishnan, B. (2016). Review of vehicular ad hoc network communication models including WVANET (Web VANET) model and WVANET future research directions. Wireless networks, 22(7), 2369–2386.

    Article  Google Scholar 

  5. Walid, B., & Bensaber, B. A. (2018). RIN: A dynamic pseudonym change system for privacy in VANET. Concurrency and Computation: Practice and Experience. https://doi.org/10.1002/cpe.4719

    Article  Google Scholar 

  6. Ying, B., & Nayak, A. (2017). Anonymous and lightweight authentication for secure vehicular networks. IEEE Transactions on Vehicular Technology. https://doi.org/10.1109/TVT.2017.2744182

    Article  Google Scholar 

  7. Aghabagherloo Alireza, et al. An Efficient Anonymous Authentication Scheme Using Registration List in VANETs. arXiv preprint arXiv:2004.00282 (2020)

  8. Wang, X., Li, S., Zhao, S., & Xia, Z. (2017). A VANET privacy protection scheme based on fair blind signature and secret sharing algorithm. Automatika., 58, 287–294. https://doi.org/10.1080/00051144.2018.1426294

    Article  Google Scholar 

  9. Wang, S., & Yao, N. (2017). LIAP: A local identity-based anonymous message authentication protocol in VANETs. Computer Communications., 112, 154–164. https://doi.org/10.1016/j.comcom.2017.09.005

    Article  Google Scholar 

  10. Jiang Yanji, Shaocheng Ge, and Xueli Shen. AAAS: an anonymous authentication scheme based on group Signature in VANETs. IEEE Access (2020)

  11. HAN Mu., Liu Shuai, MA Shidian, et al. Anonymous authentication scheme based on fog computing for VANET. PLoS one. 2020, 15(2), e0228319

  12. Saddiki, K., et al. (2017). “Black hole attack detection and ignoring in OLSR protocol.” International Journal of Trust Management in Computing and Communications, 4(1), 75–93.

    Article  Google Scholar 

  13. Aouiz, Amir Abdelkader, et al. "Network Life Time maximization of the AOMDV Protocol Using Nodes Energy Variation." (2018). https://ipfs.io/ipfs/QmXoypizjW3WknFiJnKLwHCnL72vedxjQkDD P1mXWo6uco/wiki/End-to-end_delay.html

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tayeb Diab.

Ethics declarations

Conflict of interest:

The authors declare that they have no conflict of interest and competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

The original version of this article was revised: In the original version of this article, the given and family names of Tayeb Diab, Marc Gilg, Pascal Lorenz and Frederic Drouhin were incorrectly structured. The original article has been corrected.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Diab, T., Gilg, M., Lorenz, P. et al. Using I2P (Invisible Internet Protocol) Encrypted Virtual Tunnels for a Secure and Anonymous Communication in VANets: I2P Vehicular Protocol (IVP). Wireless Pers Commun 127, 2625–2644 (2022). https://doi.org/10.1007/s11277-022-09888-4

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-022-09888-4

Keywords

Navigation