Abstract
The Invisible Internet Project (I2P) as a secure protocol uses robust mechanisms and strong algorithms to reinforce the security and the anonymity of the communication. However, the difference between internet and VANet in terms of mobility and connectivity of nodes presents a big issue that needs to be treated when using I2P mechanisms in VANet. The previous work “Anonymizing Communication in VANets by Applying I2P Mechanisms” proposes a protocol based on tunnels and encryption algorithms that use digital signatures and authentication mechanisms. Tunnels are created in static scenarios not dynamic and without maintaining their existence, which is a challenging issue in VANet that need to be treated to reply to different requirements of this kind of networks. In this paper, we complete the last version of the proposed protocol (I2P Vehicular Protocol) by integrating a tunnel maintenance algorithm for maintaining the existence of the created tunnels during the communication. This algorithm allows the implementation of the protocol in mobile scenarios of VANet. The effectiveness and security of IVP protocol are proved by analyzing the added part related to the tunnel maintenance process and showing performance results (end-to-end delay, PDR and overhead). Simulation results show that the new protocol version is better than the first version thanks to the integrated tunnel maintenance algorithm. Simulation scenarios were executed using NS3 simulator.
Similar content being viewed by others
Change history
29 August 2022
The original version of this article was revised: In the original version of this article, the given and family names of Tayeb Diab, Marc Gilg, Pascal Lorenz and Frederic Drouhin were incorrectly structured. The original article has been corrected.
07 September 2022
A Correction to this paper has been published: https://doi.org/10.1007/s11277-022-09940-3
References
Diab, T., Gilg, M., & Lorenz, P. (2019). A secure communication model using lightweight Diffie-Hellman method in vehicular ad hoc networks. International Journal of Security and Networks, 14(2), 61–77.
Tayeb Diab, Marc Gilg, Frederic Drouhin & Pascal Lorenz, “Anonymizing Communication in VANets by Applying I2P Mechanisms”, IEEE Global Communications Conference, (2019)
Milton Joe, M., & Ramakrishnan, B. (2021). Live emergency and warning alerts through android application for vehicular ad hoc network communication (android VANET). Wireless Personal Communications, 116, 125–151. https://doi.org/10.1007/s11277-020-07708-1
Joe, M. M., & Ramakrishnan, B. (2016). Review of vehicular ad hoc network communication models including WVANET (Web VANET) model and WVANET future research directions. Wireless networks, 22(7), 2369–2386.
Walid, B., & Bensaber, B. A. (2018). RIN: A dynamic pseudonym change system for privacy in VANET. Concurrency and Computation: Practice and Experience. https://doi.org/10.1002/cpe.4719
Ying, B., & Nayak, A. (2017). Anonymous and lightweight authentication for secure vehicular networks. IEEE Transactions on Vehicular Technology. https://doi.org/10.1109/TVT.2017.2744182
Aghabagherloo Alireza, et al. An Efficient Anonymous Authentication Scheme Using Registration List in VANETs. arXiv preprint arXiv:2004.00282 (2020)
Wang, X., Li, S., Zhao, S., & Xia, Z. (2017). A VANET privacy protection scheme based on fair blind signature and secret sharing algorithm. Automatika., 58, 287–294. https://doi.org/10.1080/00051144.2018.1426294
Wang, S., & Yao, N. (2017). LIAP: A local identity-based anonymous message authentication protocol in VANETs. Computer Communications., 112, 154–164. https://doi.org/10.1016/j.comcom.2017.09.005
Jiang Yanji, Shaocheng Ge, and Xueli Shen. AAAS: an anonymous authentication scheme based on group Signature in VANETs. IEEE Access (2020)
HAN Mu., Liu Shuai, MA Shidian, et al. Anonymous authentication scheme based on fog computing for VANET. PLoS one. 2020, 15(2), e0228319
Saddiki, K., et al. (2017). “Black hole attack detection and ignoring in OLSR protocol.” International Journal of Trust Management in Computing and Communications, 4(1), 75–93.
Aouiz, Amir Abdelkader, et al. "Network Life Time maximization of the AOMDV Protocol Using Nodes Energy Variation." (2018). https://ipfs.io/ipfs/QmXoypizjW3WknFiJnKLwHCnL72vedxjQkDD P1mXWo6uco/wiki/End-to-end_delay.html
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest:
The authors declare that they have no conflict of interest and competing interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
The original version of this article was revised: In the original version of this article, the given and family names of Tayeb Diab, Marc Gilg, Pascal Lorenz and Frederic Drouhin were incorrectly structured. The original article has been corrected.
Rights and permissions
Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Diab, T., Gilg, M., Lorenz, P. et al. Using I2P (Invisible Internet Protocol) Encrypted Virtual Tunnels for a Secure and Anonymous Communication in VANets: I2P Vehicular Protocol (IVP). Wireless Pers Commun 127, 2625–2644 (2022). https://doi.org/10.1007/s11277-022-09888-4
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-022-09888-4