Low-Cost information transfer system between vehicles on roads

The authentication process is a key component to increase security in a vehicle network. Most of the authentication protocols proposed in the literature are based on asymmetric cryptography, and specifically on the use of the RSA algorithm. In addition, the use of digital certificates and a public k...

Full description

Autores:
Viloria, Amelec
Pineda Lezama, Omar Bonerge
Varela, Noel
Tipo de recurso:
Article of journal
Fecha de publicación:
2019
Institución:
Corporación Universidad de la Costa
Repositorio:
REDICUC - Repositorio CUC
Idioma:
eng
OAI Identifier:
oai:repositorio.cuc.edu.co:11323/8312
Acceso en línea:
https://hdl.handle.net/11323/8312
https://doi.org/10.1007/978-981-15-9019-1_41
https://repositorio.cuc.edu.co/
Palabra clave:
Mutual authentication protocol
Vehicle
Diffie-Hellman algorithm
Vanet network
Rights
openAccess
License
Attribution-NonCommercial-NoDerivatives 4.0 International
id RCUC2_65c0872337a2d7e9a45370811a4c0c05
oai_identifier_str oai:repositorio.cuc.edu.co:11323/8312
network_acronym_str RCUC2
network_name_str REDICUC - Repositorio CUC
repository_id_str
dc.title.eng.fl_str_mv Low-Cost information transfer system between vehicles on roads
title Low-Cost information transfer system between vehicles on roads
spellingShingle Low-Cost information transfer system between vehicles on roads
Mutual authentication protocol
Vehicle
Diffie-Hellman algorithm
Vanet network
title_short Low-Cost information transfer system between vehicles on roads
title_full Low-Cost information transfer system between vehicles on roads
title_fullStr Low-Cost information transfer system between vehicles on roads
title_full_unstemmed Low-Cost information transfer system between vehicles on roads
title_sort Low-Cost information transfer system between vehicles on roads
dc.creator.fl_str_mv Viloria, Amelec
Pineda Lezama, Omar Bonerge
Varela, Noel
dc.contributor.author.spa.fl_str_mv Viloria, Amelec
Pineda Lezama, Omar Bonerge
Varela, Noel
dc.subject.eng.fl_str_mv Mutual authentication protocol
Vehicle
Diffie-Hellman algorithm
Vanet network
topic Mutual authentication protocol
Vehicle
Diffie-Hellman algorithm
Vanet network
description The authentication process is a key component to increase security in a vehicle network. Most of the authentication protocols proposed in the literature are based on asymmetric cryptography, and specifically on the use of the RSA algorithm. In addition, the use of digital certificates and a public key infrastructure is considered. Therefore, the authentication process is often complex. In order to propose a secure solution, without the use of digital certificates and the RSA algorithm, a mutual authentication protocol based on the Diffie-Hellman algorithm is presented to establish a session key between vehicle (OBU) and road unit (RSU). From the session key, a secure communication channel can be established to transmit the identifier of each participant and the respective security parameters. To perform the authentication process, the entities perform low-cost computational operations such as hash and XOR functions. Once the mutual authentication protocol is completed, the vehicle and the road unit can exchange messages securely.
publishDate 2019
dc.date.issued.none.fl_str_mv 2019-02-27
dc.date.accessioned.none.fl_str_mv 2021-06-01T00:31:37Z
dc.date.available.none.fl_str_mv 2021-06-01T00:31:37Z
dc.type.spa.fl_str_mv Artículo de revista
dc.type.coar.fl_str_mv http://purl.org/coar/resource_type/c_2df8fbb1
dc.type.coar.spa.fl_str_mv http://purl.org/coar/resource_type/c_6501
dc.type.content.spa.fl_str_mv Text
dc.type.driver.spa.fl_str_mv info:eu-repo/semantics/article
dc.type.redcol.spa.fl_str_mv http://purl.org/redcol/resource_type/ART
dc.type.version.spa.fl_str_mv info:eu-repo/semantics/acceptedVersion
format http://purl.org/coar/resource_type/c_6501
status_str acceptedVersion
dc.identifier.isbn.spa.fl_str_mv 9789811555589
dc.identifier.uri.spa.fl_str_mv https://hdl.handle.net/11323/8312
dc.identifier.doi.spa.fl_str_mv https://doi.org/10.1007/978-981-15-9019-1_41
dc.identifier.instname.spa.fl_str_mv Corporación Universidad de la Costa
dc.identifier.reponame.spa.fl_str_mv REDICUC - Repositorio CUC
dc.identifier.repourl.spa.fl_str_mv https://repositorio.cuc.edu.co/
identifier_str_mv 9789811555589
Corporación Universidad de la Costa
REDICUC - Repositorio CUC
url https://hdl.handle.net/11323/8312
https://doi.org/10.1007/978-981-15-9019-1_41
https://repositorio.cuc.edu.co/
dc.language.iso.none.fl_str_mv eng
language eng
dc.relation.references.spa.fl_str_mv N.A. Balaji, R. Sukumar, M. Parvathy, Enhanced dual authentication and key management scheme for data authentication in vehicular ad hoc network. Comput. Electr. Eng. 76, 94–110 (2019)
K. Lim, K.M. Tuladhar, X. Wang, W. Liu, A Scalable and Secure Key Distribution Scheme for Group Signature-Based Authentication in VANET, in 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON) (IEEE, 2017), pp 478–483
H. Tan, D. Choi, P Kim, S. Pan, I. Chung, Secure certificateless authentication and road message dissemination protocol in VANETs. Wireless Communications and Mobile Computing (2018)
O. Chikhaoui, A.B. Chehida, R. Abassi, S.G. El Fatmi, A Formal Ticket-Based Authentication Scheme for VANETs. in Artificial Intelligence and Security Challenges in Emerging Networks (IGI Global, 2019), pp 188–220
S. Jiang, X. Zhu, L. Wang, An efficient anonymous batch authentication scheme based on HMAC for VANETs. IEEE Trans. Intell. Transp. Syst. 17(8), 2193–2204 (2016)
C. Lai, D. Zheng, Q. Zhao, X. Jiang, SEGM: A secure group management framework in integrated VANET-cellular networks. Veh. Commun. 11, 33–45 (2018)
S. Paul, S. Kumar, R.R. Suman, A quantum secure entity authentication protocol design for network security. Int. J. Info. Sec. Privacy (IJISP) 13(4), 1–11 (2019)
U. Rajput, F. Abbas, H. Oh, A hierarchical privacy preserving pseudonymous authentication protocol for VANET. IEEE Access 4, 7770–7784 (2016)
C. Vásquez, et al., Conglomerates of Bus Rapid Transit in Latin American Countries, ed. by A. Pandian, K. Ntalianis, R. Palanisamy, Intelligent Computing, Information and Control Systems. ICICCS 2019. Advances in Intelligent Systems and Computing, vol 1039 (Springer, Cham, 2020), pp. 188–220
N. Malik, P. Nanda, A. Arora, X. He, D. Puthal, Blockchain Based Secured Identity Authentication and Expeditious Revocation Framework for Vehicular Networks. in 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) (IEEE, 2018), pp. 674–679
T. Gao, S. Deng, A Pseudonym Ring Building Scheme for Anonymous Authentication in VANETs. in International Conference on Broadband and Wireless Computing, Communication and Applications (Springer, Cham, 2018), pp. 481–489
M. Ma, D. He, H. Wang, N. Kumar, K.K.R. Choo, An efficient and provably secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks. IEEE Int. Things J. 6(5), 8065–8075 (2019)
L.F. Roman, P.R. Gondim, Authentication protocol in CTNs for a CWD-WPT charging system in a cloud environment. Ad Hoc Netw. 97, 102004 (2020)
X. Li, Y. Han, J. Gao, J. Niu, Secure hierarchical authentication protocol in VANET. IET Inf. Secur. 14(1), 99–110 (2019)
A. Viloria G. Wang, M. Gaitan, Segmentation of Sales for a Mobile Phone Service Through CART Classification Tree Algorithm. in V. Vijayakumar, V. Neelanarayanan, P. Rao, J. Light, Proceedings of 6th International Conference on Big Data and Cloud Computing Challenges. Smart Innovation, Systems and Technologies, vol 164 (Springer, Singapore, 2020)
A. Viloria, et al., Hybrid Cloud Computing Architecture Based on Open Source Technology. in G. Wang, M. Bhuiyan, S. De Capitani di Vimercati, Y. Ren, Dependability in Sensor, Cloud, and Big Data Systems and Applications. DependSys 2019. Communications in Computer and Information Science, vol 1123 (Springer, Singapore, 2019)
dc.rights.spa.fl_str_mv Attribution-NonCommercial-NoDerivatives 4.0 International
dc.rights.uri.spa.fl_str_mv http://creativecommons.org/licenses/by-nc-nd/4.0/
dc.rights.accessrights.spa.fl_str_mv info:eu-repo/semantics/openAccess
dc.rights.coar.spa.fl_str_mv http://purl.org/coar/access_right/c_abf2
rights_invalid_str_mv Attribution-NonCommercial-NoDerivatives 4.0 International
http://creativecommons.org/licenses/by-nc-nd/4.0/
http://purl.org/coar/access_right/c_abf2
eu_rights_str_mv openAccess
dc.format.mimetype.spa.fl_str_mv application/pdf
dc.source.spa.fl_str_mv Advances in Electrical and Computer Technologies
institution Corporación Universidad de la Costa
dc.source.url.spa.fl_str_mv https://link.springer.com/chapter/10.1007%2F978-981-15-9019-1_41
bitstream.url.fl_str_mv https://repositorio.cuc.edu.co/bitstreams/b1e48605-d6c0-49e1-8766-398bc36d1b93/download
https://repositorio.cuc.edu.co/bitstreams/74e9e7d1-2c7f-4ae8-801e-63279c6c76a9/download
https://repositorio.cuc.edu.co/bitstreams/f240c727-c61e-4c1e-958c-6f2b658da688/download
https://repositorio.cuc.edu.co/bitstreams/f8e1f9b0-9f74-4c57-a13f-da21f70af806/download
https://repositorio.cuc.edu.co/bitstreams/b42d505d-55bf-4c6c-865e-42986696aa61/download
bitstream.checksum.fl_str_mv 27a243fec15e5c81cea30ae165f44b39
4460e5956bc1d1639be9ae6146a50347
e30e9215131d99561d40d6b0abbe9bad
93288c247fd1fc7453ea87076aa8d9b1
cc448339704894e43a299986d6788bc8
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
MD5
MD5
MD5
repository.name.fl_str_mv Repositorio de la Universidad de la Costa CUC
repository.mail.fl_str_mv repdigital@cuc.edu.co
_version_ 1811760818582192128
spelling Viloria, AmelecPineda Lezama, Omar BonergeVarela, Noel2021-06-01T00:31:37Z2021-06-01T00:31:37Z2019-02-279789811555589https://hdl.handle.net/11323/8312https://doi.org/10.1007/978-981-15-9019-1_41Corporación Universidad de la CostaREDICUC - Repositorio CUChttps://repositorio.cuc.edu.co/The authentication process is a key component to increase security in a vehicle network. Most of the authentication protocols proposed in the literature are based on asymmetric cryptography, and specifically on the use of the RSA algorithm. In addition, the use of digital certificates and a public key infrastructure is considered. Therefore, the authentication process is often complex. In order to propose a secure solution, without the use of digital certificates and the RSA algorithm, a mutual authentication protocol based on the Diffie-Hellman algorithm is presented to establish a session key between vehicle (OBU) and road unit (RSU). From the session key, a secure communication channel can be established to transmit the identifier of each participant and the respective security parameters. To perform the authentication process, the entities perform low-cost computational operations such as hash and XOR functions. Once the mutual authentication protocol is completed, the vehicle and the road unit can exchange messages securely.Viloria, AmelecPineda Lezama, Omar BonergeVarela, Noelapplication/pdfengAttribution-NonCommercial-NoDerivatives 4.0 Internationalhttp://creativecommons.org/licenses/by-nc-nd/4.0/info:eu-repo/semantics/openAccesshttp://purl.org/coar/access_right/c_abf2Advances in Electrical and Computer Technologieshttps://link.springer.com/chapter/10.1007%2F978-981-15-9019-1_41Mutual authentication protocolVehicleDiffie-Hellman algorithmVanet networkLow-Cost information transfer system between vehicles on roadsArtículo de revistahttp://purl.org/coar/resource_type/c_6501http://purl.org/coar/resource_type/c_2df8fbb1Textinfo:eu-repo/semantics/articlehttp://purl.org/redcol/resource_type/ARTinfo:eu-repo/semantics/acceptedVersionN.A. Balaji, R. Sukumar, M. Parvathy, Enhanced dual authentication and key management scheme for data authentication in vehicular ad hoc network. Comput. Electr. Eng. 76, 94–110 (2019)K. Lim, K.M. Tuladhar, X. Wang, W. Liu, A Scalable and Secure Key Distribution Scheme for Group Signature-Based Authentication in VANET, in 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON) (IEEE, 2017), pp 478–483H. Tan, D. Choi, P Kim, S. Pan, I. Chung, Secure certificateless authentication and road message dissemination protocol in VANETs. Wireless Communications and Mobile Computing (2018)O. Chikhaoui, A.B. Chehida, R. Abassi, S.G. El Fatmi, A Formal Ticket-Based Authentication Scheme for VANETs. in Artificial Intelligence and Security Challenges in Emerging Networks (IGI Global, 2019), pp 188–220S. Jiang, X. Zhu, L. Wang, An efficient anonymous batch authentication scheme based on HMAC for VANETs. IEEE Trans. Intell. Transp. Syst. 17(8), 2193–2204 (2016)C. Lai, D. Zheng, Q. Zhao, X. Jiang, SEGM: A secure group management framework in integrated VANET-cellular networks. Veh. Commun. 11, 33–45 (2018)S. Paul, S. Kumar, R.R. Suman, A quantum secure entity authentication protocol design for network security. Int. J. Info. Sec. Privacy (IJISP) 13(4), 1–11 (2019)U. Rajput, F. Abbas, H. Oh, A hierarchical privacy preserving pseudonymous authentication protocol for VANET. IEEE Access 4, 7770–7784 (2016)C. Vásquez, et al., Conglomerates of Bus Rapid Transit in Latin American Countries, ed. by A. Pandian, K. Ntalianis, R. Palanisamy, Intelligent Computing, Information and Control Systems. ICICCS 2019. Advances in Intelligent Systems and Computing, vol 1039 (Springer, Cham, 2020), pp. 188–220N. Malik, P. Nanda, A. Arora, X. He, D. Puthal, Blockchain Based Secured Identity Authentication and Expeditious Revocation Framework for Vehicular Networks. in 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) (IEEE, 2018), pp. 674–679T. Gao, S. Deng, A Pseudonym Ring Building Scheme for Anonymous Authentication in VANETs. in International Conference on Broadband and Wireless Computing, Communication and Applications (Springer, Cham, 2018), pp. 481–489M. Ma, D. He, H. Wang, N. Kumar, K.K.R. Choo, An efficient and provably secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks. IEEE Int. Things J. 6(5), 8065–8075 (2019)L.F. Roman, P.R. Gondim, Authentication protocol in CTNs for a CWD-WPT charging system in a cloud environment. Ad Hoc Netw. 97, 102004 (2020)X. Li, Y. Han, J. Gao, J. Niu, Secure hierarchical authentication protocol in VANET. IET Inf. Secur. 14(1), 99–110 (2019)A. Viloria G. Wang, M. Gaitan, Segmentation of Sales for a Mobile Phone Service Through CART Classification Tree Algorithm. in V. Vijayakumar, V. Neelanarayanan, P. Rao, J. Light, Proceedings of 6th International Conference on Big Data and Cloud Computing Challenges. Smart Innovation, Systems and Technologies, vol 164 (Springer, Singapore, 2020)A. Viloria, et al., Hybrid Cloud Computing Architecture Based on Open Source Technology. in G. Wang, M. Bhuiyan, S. De Capitani di Vimercati, Y. Ren, Dependability in Sensor, Cloud, and Big Data Systems and Applications. DependSys 2019. Communications in Computer and Information Science, vol 1123 (Springer, Singapore, 2019)PublicationORIGINALLow-Cost Information Transfer System Between Vehicles on Roads.pdfLow-Cost Information Transfer System Between Vehicles on Roads.pdfapplication/pdf75980https://repositorio.cuc.edu.co/bitstreams/b1e48605-d6c0-49e1-8766-398bc36d1b93/download27a243fec15e5c81cea30ae165f44b39MD51CC-LICENSElicense_rdflicense_rdfapplication/rdf+xml; charset=utf-8805https://repositorio.cuc.edu.co/bitstreams/74e9e7d1-2c7f-4ae8-801e-63279c6c76a9/download4460e5956bc1d1639be9ae6146a50347MD52LICENSElicense.txtlicense.txttext/plain; charset=utf-83196https://repositorio.cuc.edu.co/bitstreams/f240c727-c61e-4c1e-958c-6f2b658da688/downloade30e9215131d99561d40d6b0abbe9badMD53THUMBNAILLow-Cost Information Transfer System Between Vehicles on Roads.pdf.jpgLow-Cost Information Transfer System Between Vehicles on Roads.pdf.jpgimage/jpeg36952https://repositorio.cuc.edu.co/bitstreams/f8e1f9b0-9f74-4c57-a13f-da21f70af806/download93288c247fd1fc7453ea87076aa8d9b1MD54TEXTLow-Cost Information Transfer System Between Vehicles on Roads.pdf.txtLow-Cost Information Transfer System Between Vehicles on Roads.pdf.txttext/plain1274https://repositorio.cuc.edu.co/bitstreams/b42d505d-55bf-4c6c-865e-42986696aa61/downloadcc448339704894e43a299986d6788bc8MD5511323/8312oai:repositorio.cuc.edu.co:11323/83122024-09-17 12:50:00.179http://creativecommons.org/licenses/by-nc-nd/4.0/Attribution-NonCommercial-NoDerivatives 4.0 Internationalopen.accesshttps://repositorio.cuc.edu.coRepositorio de la Universidad de la Costa CUCrepdigital@cuc.edu.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