Skip to main content
Log in

Secure group information exchange scheme for vehicular ad hoc networks

  • Original Article
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

In this paper, a novel secure information exchange scheme has been proposed for MIMO vehicular ad hoc networks (VANETs) through physical layer approach. In the scheme, a group of On Board Units (OBUs) exchange information with help of one Road Side Unit (RSU). By utilizing the key signal processing technique, i.e., Direction Rotation Alignment technique, the information to be exchanged of the two neighbor OBUs are aligned into a same direction to form summed signal at RSU or external eavesdroppers. With such summed signal, the RSU or the eavesdropper cannot recover the individual information from the OBUs. By regulating the transmission rate for each OBU, the information theoretic security could be achieved. The secrecy sum-rates of the proposed scheme are analyzed following the scheme. Finally, the numerical results are conducted to demonstrate the theoretical analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Biswas S, Misic J, Misic VB (2012) Ddos attack on wave-enabled vanet through synchronization. In: Global communications conference (GLOBECOM), 2012 IEEE. IEEE, pp 1079–1084

  2. Safi SM, Movaghar A, Mohammadizadeh M (2009) A novel approach for avoiding wormhole attacks in vanet. In: 1st Asian Himalayas international conference on internet, 2009. AH-ICI 2009. IEEE, pp 1–6

  3. Hamieh A, Ben-Othman J, Gueroui A, Naït-Abdesselam F (2009) Detecting greedy behaviors by linear regression in wireless ad hoc networks. In: IEEE international conference on communications, 2009. ICC’09. IEEE, pp 1–6

  4. Park S, Aslam B, Turgut D, Zou CC (2013) Defense against sybil attack in the initial deployment stage of vehicular ad hoc network based on roadside unit support. Secur Commun Netw 6(4):523–538

    Article  Google Scholar 

  5. Zeadally S, Hunt R, Chen Y-S, Irwin A, Hassan A (2012) Vehicular ad hoc networks (vanets): status, results, and challenges. Telecommun Syst 50(4):217–241

    Article  Google Scholar 

  6. Zhu L, Chen C, Wang X, Lim AO (2011) Smss: Symmetric-masquerade security scheme for vanets. In: 10th international symposium on autonomous decentralized systems (ISADS), 2011. IEEE, pp 617–622

  7. Tyagi P, Dembla D (2014) Investigating the security threats in vehicular ad hoc networks (vanets) Towards security engineering for safer on-road transportation. In: 2014 international conference on advances in computing, communications and informatics (ICACCI). IEEE, pp 2084–2090

  8. Ren D, Suguo D, Zhu H (2011) A novel attack tree based risk assessment approach for location privacy preservation in the vanets. In: 2011 IEEE international conference on communications (ICC). IEEE, pp 1–5

  9. Lin X, Sun X, Ho P-H, Shen X (2007) Gsis: a secure and privacy-preserving protocol for vehicular communications. IEEE Trans Veh Technol 56(6):3442–3456

    Article  Google Scholar 

  10. Liu Zhe, Seo Hwajeong, Großschäl J, Kim H (2016) Efficient implementation of NIST-compliant elliptic curve cryptography for 8-bit avr-based sensor nodes. IEEE Trans Inf Forensics Secur 11(7):1385–1397

    Article  Google Scholar 

  11. Seo H, Liu Z, Park T, Kim H, Lee Y, Choi J, Kim H (2013) Parallel implementations of LEA. In: Lee H-S, Han D-G (eds) The 16th international conference on information security and cryptology — ICISC 2013, volume 8565 of lecture notes in computer science. Springer Verlag, pp 256–274

  12. Guo P, Wang J, Li B, Lee S (2014) A variable threshold-value authentication architecture for wireless mesh networks. J Internet Technol 15(6):929–936

    Google Scholar 

  13. Xia Z, Wang X, Sun X, Wang B (2014) Steganalysis of least significant bit matching using multi-order differences. Secur Commun Netw 7(8):1283–1291

    Article  Google Scholar 

  14. Liu Z, Huang X, Hu Z, Khurram Khan M, Seo H, Zhou L (2016) On emerging family of elliptic curves to secure internet of things: ECC comes of age. IEEE Trans Dependable Secure Comput

  15. Cover TM, Thomas JA (2012) Elements of information theory. Wiley, New York

    MATH  Google Scholar 

  16. Liu Q, Gong G, Wang Y, Li H (2015) A novel physical layer security scheme for MIMO two-way relay channels. In: 2015 IEEE globecom workshops. San Diego, CA, USA, December 6-10, 2015, pp 1–6

  17. Liu Q, Gong G (2016) Physical layer secure information exchange protocol for mimo ad hoc networks against passive attacks. In: 2016 IEEE global communications conference (GLOBECOM), pp 1–6

  18. Yang T, Yuan X, Li P, Collings IB, Yuan J (2013) A new physical-layer network coding scheme with eigen-direction alignment precoding for mimo two-way relaying. IEEE Trans Commun 61(3):973–986

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qiao Liu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhou, L., Liu, Q., Wang, Y. et al. Secure group information exchange scheme for vehicular ad hoc networks. Pers Ubiquit Comput 21, 903–910 (2017). https://doi.org/10.1007/s00779-017-1049-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-017-1049-6

Keywords

Navigation