Skip to main content

Advertisement

Log in

Light weight security protocol for communications in vehicular networks

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Increasing demand in user-friendly, computationally efficient and sophisticated vehicles led automobile industries to manufacture them with efficient onboard sensors, communication devices, resource rich hardware. Vehicular resources provide infotainment on-the-go. In mere future, every vehicle is a resource full machine. The vehicular resources which include computing power, storage and internet connectivity can be shared among the vehicles or can be lend over the internet to various customers. Vehicles can comprehensively make use of the resources available with road-side units (RSU’s) to communicate with other vehicles and RSU’s. Vehicular communications are useful especially in situations of accidents (or) natural calamities. Vehicles can update the RSU’s with information regarding such events. This information can then be broadcasted to the vehicles in that area or path. The proposed scheme ensures secure and efficient communications among nodes in a hierarchy consisting of vehicles, RSU’s, RSU co-ordinators and Trusted authority. The approach outlined in the paper can be used to decrease the overhead involved in secure transfer of information during communication.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Abbreviations

id :

Identifier to the nodes present in hierarachy

IV:

Identification vector to nodes which is in the form of co-ordinates

x :

Dependent variables used for the identifiers of the vehicle itself

y :

Dependent variables used for the identifiers of the vehicles with which communication is being done

RSU:

Road side unit

RSU-C:

Road side unit coordinator

TA:

Trusted authority

References

  1. Gillani, S., et al. (2013). A survey on security in vehicular ad hoc networks. Communication technologies for vehicles. Berlin Heidelberg: Springer.

    Google Scholar 

  2. Yan, G., Wen, D., Olariu, S., & Weigle, M. C. (2013). Security challenges in vehicular cloud computing. IEEE Transactions on Intelligent Transportation Systems, 14(1), 284–294.

    Article  Google Scholar 

  3. Xu, Q., Mak, T., Ko, J., & Sengupta, R. (2004). Vehicle-to-vehicle safety messaging in DSRC. In Proceedings of the rst ACM workshop on Vehicular ad hoc networks, ACM Press, pp. 19–28.

  4. Car-to-Car communication, [Online]. http://www.car-to-car.org [Accessed 15 June, 2010].

  5. Chan, H., Perrig, A., & Song, D. (2003). Random key predistribution schemes for sensor networks. Symposium on security and privacy, 2003. Proceedings. 2003. IEEE.

  6. Eschenauer, L., & Gligor, V. D. (2002). A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM conference on Computer and communications security, ACM.

  7. Zhou, Jun, et al. (2015). 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Information Science, 314, 255–276.

    Article  Google Scholar 

  8. Stallings, W. (2005). Cryptography and network security: Principles and practices (4th ed.). Upper Saddle River, NJ: Prentice Hall.

    Google Scholar 

  9. Yang, X., Liu, J., Zhao, F., & Vaidya, N. (2004). A vehicle-to-vehicle communication protocol for cooperative collision warning. In first annual international conference on mobile and ubiquitous systems: Networking and services (MobiQuitous 2004), August 2004.

  10. Han, K. et al. (2013) Algorithm design for data communications in duty-cycled wireless sensor networks: A survey. IEEE Communications Magazine, 51(7), 107–113.

  11. Ali, Mazhar, et al. (2015). Security in cloud computing: Opportunities and challenges. Information Sciences, 305, 357–383.

    Article  MathSciNet  Google Scholar 

  12. Wei, Lifei, et al. (2014). Security and privacy for storage and computation in cloud computing. Informatoin Science, 258, 371–386.

    Article  Google Scholar 

  13. Wei, L. et al. (2010). SecCloud: Bridging secure storage and computation in cloud. ICDCS Workshops, pp. 52–61.

  14. Jing, Qi, et al. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20(8), 2481–2501.

    Article  Google Scholar 

  15. Attar, Alireza, et al. (2012). A survey of security challenges in cognitive radio networks: Solutions and future research directions. Proceedings of the IEEE, 100(12), 3172–3186.

    Article  Google Scholar 

  16. Yang, Haomin, et al. (2014). Provably secure three-party authenticated key agreement protocol using smart cards. Computer Networks, 58, 29–38.

    Article  Google Scholar 

  17. Wan, J., et al. (2014). Context-aware vehicular cyber-physical systems with cloud support: Architecture. Challenges and Solutions, IEEE Communications Magazine, 52(8), 106–113.

    Article  Google Scholar 

  18. Hesham, A., Abdel-Hamid, A., & Abou El-Nasr, M. (2011). A dynamic key distribution protocol for PKI-based VANETs. In IEEE conference publications, Wireless Days (WD), IFIP.

  19. Al-kahtani, M. S. (2012). Survey on security attacks in Vehicular Ad hoc Networks (VANETs). 6th International conference on signal processing and communication systems (ICSPCS), 2012, vol. 1(9), pp. 12–14.

  20. Sumra, I. A., Ahmad, I., Hasbullah, H., & bin Ab Manan, J.-L. (2011). Behaviour of attacker on some new possible attacks in Vehicular Ad hoc Network (VANET), 3rd International congress on ultra modern telecommunications and control systems and workshops (ICUMT), 2011, pp. 1–8, 5–7 October 2011.

  21. Lo, N.-W., Tsai, H.-C. (2007). Illusion attack on vanet applications—A message plausibility problem, Globecom Workshops, 2007 IEEE, pp.1–8.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to T. S. Ravi Chandra.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Raja Sekhar, K., Ravi Chandra, T.S., Pooja, S. et al. Light weight security protocol for communications in vehicular networks. Wireless Netw 22, 1343–1353 (2016). https://doi.org/10.1007/s11276-015-1034-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-015-1034-9

Keywords

Navigation