Skip to main content
Log in

Group Based Dual Mode Key Management Scheme for Secure Communication in Vehicular Ad Hoc Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Vehicular ad hoc networks (VANETs) provide similar services at various service points, so selecting the efficient service among the available services is a crucial task. Similarly, accessing services to exchange time-critical messages demands secure schemes. In this work, an efficient group-based dual mode key management (G-DMKM) scheme is proposed to select efficient service and the secure route to access the service. In G-DMKM for each session, the base stations are grouped according to localization in a time window manner which restricts the key and group lifetime. The time-domain randomization technique is used to generate a group key for each group and is shared between all stations and vehicles. Vehicles are authenticated for communication based on group and private keys. The private key is generated by the base station under which the vehicle is located. In G-DMKM, the multi-attribute location selection approach (MALSA) computes the multi-attribute service fitness (MASF) for each service to select the optimal service from the available services. Furthermore, Secure Transmission Support (STS) estimates the STS value for each route identified towards the service point, and the route with the highest STS support is selected for secure access to the service and data transmission. Simulation results show that the inclusion of an STS-supported route improves G-DMKM efficiency in all aspects compared to the conditional privacy-preserving authentication (CPAS), Proxy Based Authentication Scheme (PBAS), and Secure Privacy-Preserving Authentication Scheme with Cuckoo Filter (SPACF).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Availability of data and materials

All relevant data are available within the paper.

Code availability

Not applicable.

References

  1. More, S., & Naik, U. (2021). Optimal multipath routing for video transmission in VANETs. Wireless Personal Communications, 116(1), 805–827

    Article  Google Scholar 

  2. Zhao, H., Yue, H., GU, T., Li, C., & Zhou, D. (2021). Low delay and seamless connectivity-based message propagation mechanism for VANET of VCPS. Wireless Personal Communications, 1–18.

  3. Supriya, S., & Bharathi, B. (2021). IOV-a novel mechanism for initiating secure vehicle data transmission using PSO with two phase authentication. Journal of Ambient Intelligence and Humanized Computing, 1–10.

  4. Goumidi, H., Aliouat, Z., & Harous, S. (2020). Vehicular cloud computing security: A survey. Arabian Journal for Science and Engineering, 45(4), 2473–2499

    Article  Google Scholar 

  5. Tripp-Barba, C., Zaldívar-Colado, A., Urquiza-Aguiar, L., & Aguilar-Calderón, J. A. (2019). Survey on routing protocols for vehicular ad hoc networks based on multimetrics. Electronics, 8(10), 1177

    Article  Google Scholar 

  6. Sheikh, M. S., Liang, J., & Wang, W. (2019). A survey of security services, attacks, and applications for vehicular ad hoc networks (vanets). Sensors, 19(16), 3589

    Article  Google Scholar 

  7. Tripathy, B. K., Jena, S. K., Bera, P., & Das, S. (2020). An adaptive secure and efficient routing protocol for mobile ad hoc networks. Wireless Personal Communications, 114(2), 1339–1370

    Article  Google Scholar 

  8. Günay, F.B., Öztürk, E., Çavdar, T., Hanay, Y.S., & Khan, A.u.R. (2020). Vehicular ad hoc network (VANET) localization techniques: A survey. Archives of Computational Methods in Engineering, 1–33.

  9. Ramamoorthy, R., & Thangavelu, M. (2020). An improved distance-based ant colony optimization routing for vehicular ad hoc networks. International Journal of Communication Systems, 33(14), e4502

    Article  Google Scholar 

  10. Asaar, M. R., Salmasizadeh, M., Susilo, W., & Majidi, A. (2018). A secure and efficient authentication technique for vehicular ad-hoc networks. IEEE Transactions on Vehicular Technology, 67(6), 5409–5423

    Article  Google Scholar 

  11. He, D., Zeadally, S., Xu, B., & Huang, X. (2015). An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Transactions on Information Forensics and Security, 10(12), 2681–2691

    Article  Google Scholar 

  12. La Hoa, V., & Cavalli, A. (2014). Security attacks and solutions in vehicular ad hoc networks: A survey. International Journal on AdHoc Networking Systems, 4(2), 1–20

    Article  Google Scholar 

  13. Lee, C., & Lai, Y. (2013). Toward a secure batch verification with group testing for VANET. Wireless Networks, 19(6), 1441–1449

    Article  Google Scholar 

  14. Shim, K. (2012). CPAS: An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Transactions on Vehicular Technology, 61(4), 1874–1883

    Article  Google Scholar 

  15. Jianhong, Z., Min, X., & Liying, L. (2014). On the security of a secure batch verification with group testing for VANET. International Journal of Network Security, 16(5), 351–358

    Google Scholar 

  16. Bayat, M., Barmshoory, M., Rahimi, M., & Aref, M. R. (2015). A secure authentication scheme for VANETs with batch verification. Wireless Networks, 21(5), 1733–1743

    Article  Google Scholar 

  17. Lo, N., & Tsai, J. (2016). An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings. IEEE Transactions on Intelligent Transportation Systems, 17(5), 1319–1328

    Article  Google Scholar 

  18. Liu, J. K., Yuen, T. H., Au, M. H., & Susilo, W. (2014). Improvements on an authentication scheme for vehicular sensor networks. Expert Systems with Applications, 41(5), 2559–2564

    Article  Google Scholar 

  19. Liu, Y., Wang, L., & Chen, H. (2015). Message authentication using proxy vehicles in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology, 64(8), 3697–3710

    Article  Google Scholar 

  20. Li, Y., Duan, H., & Deng, H. (2016). An efficient authentication scheme with privacy preserving for vehicular ad-hoc networks. In Proceedings of 95th annual conference Transportation Research Board (pp. 1–14).

  21. Kumar, G., Saha, R., Rai, M. K., & Kim, T. (2018). Multidimensional security provision for secure communication in vehicular ad hoc networks using hierarchical structure and end-to-end authentication. IEEE Access, 6, 46558–46567

    Article  Google Scholar 

  22. Cui, J., Zhang, J., Zhong, H., & Xu, Y. (2017). SPACF: A secure privacy-preserving authentication scheme for VANET with cuckoo filter. IEEE Transactions on Vehicular Technology, 66(11), 10283–10295

    Article  Google Scholar 

  23. Lee, C. C., Lin, T. H., & Chang, R. X. (2011). A secure dynamic ID based remote user authentication scheme for multi-server environment using smart cards. Expert Systems with Applications, 38(11), 13863–13870

    Google Scholar 

  24. Parikh, N., & Das, M. L. (2017). Privacy-preserving services in VANET with misbehavior detection. In 2017 IEEE international conference on advanced networks and telecommunications systems (ANTS) (pp. 1–6). IEEE.

  25. Ming, Y., & Cheng, H. (2019). Efficient certificateless conditional privacy-preserving authentication scheme in VANETs. Mobile Information Systems, 1–19.

  26. Wang, S., & Yao, N. (2019). A RSU-aided distributed trust framework for pseudonym-enabled privacy preservation in VANETs. Wireless Networks, 25(3), 1099–1115

    Article  Google Scholar 

  27. Zeng, M., & Xu, H. (2019). Mix-context-based pseudonym changing privacy preserving authentication in VANETs. Mobile Information Systems, 1–9.

  28. Chim, T. W., Yiu, S. M., Hui, L. C. K., & Li, V. O. K. (2014). VSPN: VANET-based secure and privacy-preserving navigation. IEEE Transactions on Computers, 63(2), 510–524

    Article  MathSciNet  Google Scholar 

  29. Junejo, M.H., Ab Rahman, A.A., Shaikh, R.A., Mohamad Yusof, K., Memon, I., Fazal, H., & Kumar, D. (2020). A privacy-preserving attack-resistant trust model for internet of vehicles ad hoc networks. Scientific Programming, 1–21.

  30. Alfadhli, S. A., Lu, S., Fatani, A., Al-Fedhly, H., & Ince, M. (2020). SD2PA: A fully safe driving and privacy-preserving authentication scheme for VANETs. Human-centric Computing and Information Sciences, 10(1), 1–25

    Article  Google Scholar 

  31. Al-Shareeda, M. A., Anbar, M., Manickam, S., & Yassin, A. A. (2020). VPPCS: VANET-based privacy-preserving communication scheme. IEEE Access, 8, 150914–150928

    Article  Google Scholar 

  32. Mundhe, P., Yadav, V. K., Singh, A., Verma, S., & Venkatesan, S. (2020). Ring signature-based conditional privacy-preserving authentication in VANETs. Wireless Personal Communications, 114(1), 853–881

    Article  Google Scholar 

  33. Bayat, M., Barmshoory, M., Pournaghi, S. M., Rahimi, M., Farjami, Y., & Aref, M. R. (2020). A new and efficient authentication scheme for vehicular ad hoc networks. Journal of Intelligent Transportation Systems, 24(2), 171–183

    Article  Google Scholar 

  34. Li, J., & Zhang, Y. (2020). Cryptanalysis and improvement of batch verification certificateless signature scheme for VANETs. Wireless Personal Communications, 111(2), 1255–1269

    Article  Google Scholar 

  35. Ali, I., Lawrence, T., & Li, F. (2020). An efficient identity-based signature scheme without bilinear pairing for vehicle-to-vehicle communication in VANETs. Journal of Systems Architecture, 103, 101692

    Article  Google Scholar 

  36. Wang, S., Mao, K., Zhan, F., & Liu, D. (2020). Hybrid conditional privacy-preserving authentication scheme for VANETs. Peer-to-Peer Networking and Applications, 13(5), 1600–1615

    Article  Google Scholar 

  37. Jiang, Y., Ge, S., & Shen, X. (2020). AAAS: An anonymous authentication scheme based on group signature in VANETs. IEEE Access, 8, 98986–98998

    Article  Google Scholar 

  38. Wang, P., & Liu, Y. (2021). SEMA: Secure and efficient message authentication protocol for VANETs. IEEE Systems Journal, 15(1), 846–855

    Article  Google Scholar 

  39. Soleymani, S. A., Goudarzi, S., Anisi, M. H., Zareei, M., Abdullah, A. H., & Kama, N. (2021). A security and privacy scheme based on node and message authentication and trust in fog-enabled VANET. Vehicular Communications, 29, 100335

    Article  Google Scholar 

  40. Memon, I., Memon, H., & Arain, Q. A. (2021). Pseudonym changing strategy with mix zones based authentication protocol for location privacy in road networks. Wireless Personal Communications, 116(4), 3309–3329

    Article  Google Scholar 

  41. Chen, Y., Yuan, J., & Zhang, Y. (2021). An improved password-authenticated key exchange protocol for VANET. Vehicular Communications, 27, 100286

    Article  Google Scholar 

  42. Bevish Jinila, Y., Merlin Sheeba, G., & Prayla Shyry, S. (2021). PPSA: Privacy preserved and secured architecture for internet of vehicles. Wireless Personal Communications,1–18.

  43. Mansour, A., Malik, K. M., Alkaff, A., & Kanaan, H. (2021). ALMS: Asymmetric lightweight centralized group key management protocol for VANETs. IEEE Transactions on Intelligent Transportation Systems, 22(3), 1663–1678

    Article  Google Scholar 

Download references

Funding

The authors declare that they have no financial support for this research.

Author information

Authors and Affiliations

Authors

Contributions

Raghu Ramamoorthy carried out all research steps including finding the problem, analyzing the related works, and implementing the proposed method as well as writing the manuscript. Menakadevi Thangavelu has contributed to analyzing the data and editing the paper. All authors read and approved the final manuscript.

Corresponding author

Correspondence to Raghu Ramamoorthy.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ramamoorthy, R., Thangavelu, M. Group Based Dual Mode Key Management Scheme for Secure Communication in Vehicular Ad Hoc Networks. Wireless Pers Commun 120, 949–973 (2021). https://doi.org/10.1007/s11277-021-08498-w

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-08498-w

Keywords

Navigation