1. Secure and Efficient Honey List-Based Authentication Protocol for Vehicular Ad Hoc Networks
- Author
-
JoonYoung Lee, Geon-Hwan Kim, Ashok Kumar Das, and Young-Ho Park
- Subjects
Authentication ,Vehicular ad hoc network ,Computer Networks and Communications ,computer.internet_protocol ,business.industry ,Wireless ad hoc network ,Computer science ,Mutual authentication ,Internet security ,Computer Science Applications ,Control and Systems Engineering ,Authentication protocol ,Lightweight protocol ,Kerberos ,business ,computer ,Computer network - Abstract
Vehicular Ad Hoc Network (VANET) and Internet of Vehicle (IoV) technologies are particularly attracting attention from industrial communities because of the intelligent transportation systems of smart city technologies. Vehicle-to-vehicle (V2V) communication of VANET can guarantee traffic system management and road safety. However, V2V communication cannot manage many vehicles as a whole, so it needs to be segmented and communicated by region. Therefore, considering locality, key agreement is made for V2V communication of the same or different regions. Moreover, traditional public key infrastructure (PKI) and Kerberos systems to be applied in a real environment incur computational overhead. Therefore, we proposed a lightweight protocol for dynamic properties of vehicles for regional segmentation management and overhead resolution. In addition, because vehicle information is transmitted through public channels, our protocol uses mutual authentication and honey_list technology to ensure security against a variety of attacks. It provides verification of safety through a detailed security analysis using the formal analysis using the widely-accepted Real-Or-Random (ROR) model, and verifies formal security using the Automated Validation of Internet Security Protocols and Applications (AVISPA) software tool and non-mathematical (informal) security analysis. In addition, a detailed comparative study that the proposed scheme can be applied in the communication environment between actual vehicles as compared to other existing competing schemes.
- Published
- 2021
- Full Text
- View/download PDF