Generic placeholder image

Recent Advances in Computer Science and Communications

Editor-in-Chief

ISSN (Print): 2666-2558
ISSN (Online): 2666-2566

Research Article

SMBF: Secure Data Transmission using Modified Bloom Filter for Vehicular Ad Hoc Networks

Author(s): Rajeev Kumar*, Dilip Kumar and Dinesh Kumar

Volume 16, Issue 5, 2023

Published on: 02 June, 2022

Article ID: e310322202909 Pages: 10

DOI: 10.2174/2666255815666220331154430

Price: $65

conference banner
Abstract

Objective: Privacy in VANETs commands short-lived pseudonyms since the nodes are very mobile. It results in big computational overheads during secure communication between vehicles, which could place the safety of people and vehicles at risk. To overcome such a limitation, we are using the validation approach of pseudonyms based on Bloom Filter, which provides less computational overheads than other authentication procedures. A complete end-toend system is developed in three phases: authorization, clustering, encryption, and decryption phase, to establish secure transmission of data in VANETs.

Methods: The authorization phase uses Bloom’s Filter authentication based on the pseudonym scheme. Based on the distributed parameters related to vehicles, clusters of vehicles are created to save power and bandwidth in communications. These clusters are chained to the next cluster with the help of the cluster head to share the information. First, only authenticated vehicles that are regular travelers on the road segment are allowed to become part of the cluster. SMBF ensures that any vehicle that is not a frequent traveler on the given road segment is not taking part in the communication process. Clustering is used to ensure the speed of communication.

Results: The proposed scheme results are compared with other state-of-art techniques in VANETs. The analysis indicates that the storage and computational processing requirements are reduced by 28%, resulting in decreased communication costs.

Conclusion: The proposed authentication process stores the pseudonyms in the certificate authority database. Hence, more memory requirements are required to maintain this technique. Overall, the performance of SMBF needs to be tested under different types of attacks.

Keywords: ECDH, cryptography, Bloom’s Filter, RSA, clustering, pseudonym.

Graphical Abstract

[1]
D. Rampaul, R.K. Patial, and D. Kumar, "Detection of DoS attack in VANETs", Ind. J. Sci. Tech., vol. 9, no. 47, pp. 1-6, 2016.
[2]
A. Chawla, R.K. Patial, and D. Kumar, "Comparative analysis of Sybil attack detection techniques in VANETs", Indian J. Sci. Technol., vol. 9, no. 1, pp. 1-7, 2016.
[http://dx.doi.org/10.17485/ijst/2016/v9i47/106423]
[3]
E. Schoch, F. Kargl, M. Weber, and T. Leinmuller, "Communication patterns in VANETs", IEEE Communications Magazine,, vol. 46, no. 11, pp. 119-125, 2008.
[http://dx.doi.org/10.1109/MCOM.2008.4689254]
[4]
"Hubaux, and S. Luo, “The security and privacy of smart vehicles”", IEEE Security. Privacy,, vol. 2, no. 3, pp. 49-55, 2004.
[5]
R. Lu, X. Lin, H. Zhu, P. Ho, and X. Shen, "ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications", Proc. IEEE INFOCOM, pp. 1229-1237, 2008.
[Phoenix, USA. [http://dx.doi.org/10.1109/INFOCOM.2008.179]
[6]
P. Papadimitratos, A. Kung, J. Hubaux, and F. Kargl, "Privacy and identity management for vehicular communication systems: A position paper", In Proc. Workshop Standards Privacy User-Centric Identity Manage, Zurich, Switzerland, 2006.
[7]
N. Koblitz, "Elliptic curve cryptosystems", Math. Comput., vol. 48, no. 177, pp. 203-209, 1987.
[http://dx.doi.org/10.1090/S0025-5718-1987-0866109-5]
[8]
D. Huang, S. Misra, M. Verma, and G. Xue, "PACP: An efficient pseudonymous authentication-based conditional privacy protocol for VANETs", IEEE Transactions on Intelligent Transportation Systems,, vol. 12, no. 3, pp. 736-746, 2011.
[9]
S. Rasmeet, "Clustering in vehicular ad hoc networks: Taxonomy, challenges and solutions", Vehicular Communications, vol. 1, no. 3, pp. 134-152, 2014.
[10]
S. Al-Sultan, M. Moath, H. Al-Doori, A. Al-Bayatti, and H. Zedan, "A comprehensive survey on vehicular ad hoc network", Journal of Network and Computer Applications,, vol. 37, no. 1, pp. 380-392, 2014.
[11]
D. Manivannan, S.S. Moni, and S. Zeadally, ""Secure authentication and privacy-preserving techniques in Vehicular Ad-hoc NETworks (VANETs)"", Veh Commun., vol. 25, p. 100247, 2020.
[12]
F. Azam, S.K. Yadav, N. Priyadarshi, S. Padmanaban, and R.C. Bansal, "A comprehensive review of authentication schemes in vehicular Ad-Hoc network", IEEE Access, vol. 9, pp. 31309-31321, 2021.
[http://dx.doi.org/10.1109/ACCESS.2021.3060046]
[13]
Ismail Salhi, Mohamed Oussama Cherif, and Sidi Mohammed Senouci, "New architecture for data collection in vehicular networks", IEEE international conference on Communications, 2009.
[http://dx.doi.org/10.1109/ICC.2009.5198637]
[14]
Z. Wang, L. Liu, M. Zhou, and N. Ansari, "A position based clustering technique for ad hoc inter vehicle communication", , IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews),, vol. 38, no. 2, pp. 201-208, 2008.
[15]
W. Fan, Y. Shi, S. Chen, and L. Zou, "A mobility metrics based dynamic clustering algorithm for VANETs", In IET International Conference on Communication Technology and Application (ICCTA), 2011, pp. 752-756
[http://dx.doi.org/10.1049/cp.2011.0769]
[16]
F. Bai, N. Sadagopan, and A. Helm, "The important framework for analyzing the impact of mobility on performance of routing protocols for Ad hoc networks", Ad Hoc Netw., vol. 1, pp. 383-403, 2003.
[http://dx.doi.org/10.1016/S1570-8705(03)00040-4]
[17]
N. Maslekar, J. Mouzna, H. Labiod, M. Devisetty, and M. Pai, "Modified C-DRIVE: Clustering based on direction in vehicular environment", In IEEE Intelligent Vehicles Symposium (IV), 2011, pp. 845-850
[http://dx.doi.org/10.1109/IVS.2011.5940509]
[18]
N. Maslekar, M. Boussedjra, J. Mouzna, and H. Labiod, "A stable clustering algorithm for efficiency applications in VANETs", In 7th International Conference on Wireless Communications and Mobile Computing, 2011, pp. 1188-1193
[http://dx.doi.org/10.1109/IWCMC.2011.5982709]
[19]
G. Wolny, "Modified DMAC clustering algorithm for VANETs", In 3rd IEEE International Conference on Systems and Networks Communications (ICSNC), 2008, pp. 268-273
[20]
S. Basagni, "Distributed clustering for ad hoc networks", In Proceedings of the International Symposium on Parallel Architectures, Algorithms, and Networks (I-SPAN), Perth Australia, 1999, pp. 310-315
[21]
M. Azees, P. Vijayakumar, and L.J. Deborah, "Comprehensive survey on security services in vehicular ad-hoc networks", IET Intell. Transp. Syst., vol. 10, no. 6, pp. 379-388, 2016.
[http://dx.doi.org/10.1049/iet-its.2015.0072]
[22]
R. Kumar, D. Kumar, and D. Kumar, "Performance enhancement of traffic information gathering (PEnTInG) algorithm for vehicular ad hoc networks", Int. J. Commun. Syst., vol. 32, no. 15, p. e4111, 2019.
[http://dx.doi.org/10.1002/dac.4111]
[23]
F. Qu, Z. Wu, F.Y. Wang, and W. Cho, "A security and privacy review of VANETs", IEEE Trans. Intell. Transp. Syst., vol. 16, no. 6, pp. 2985-2996, 2015.
[http://dx.doi.org/10.1109/TITS.2015.2439292]
[24]
K. Kamini, and R. Kumar, "VANET parameters and applications: A review", Global Journal of Computer Science and Technology,, 2010.
[25]
V. Kumar, S. Mishra, and N. Chand, Applications of VANETs: Present & future., vol. 5. Communications and Network, 2013.
[26]
C. Wu, S. Ohzahata, Y. Ji, and T. Kato, "How to utilize interflow network coding in VANETs: A backbone-based approach", IEEE Trans. Intell. Transp. Syst., vol. 17, no. 8, pp. 2223-2237, 2016.
[http://dx.doi.org/10.1109/TITS.2016.2516027]
[27]
J. Sun, C. Zhang, Y. Zhang, and Y. Fang, "An identity-based security system for user privacy in vehicular Ad hoc networks", IEEE Trans. Parallel Distrib. Syst., vol. 21, no. 9, pp. 1227-1239, 2010.
[http://dx.doi.org/10.1109/TPDS.2010.14]
[28]
H. Sedjelmaci, S.M. Senouci, and M.A. Abu-Rgheff, "An efficient and lightweight intrusion detection mechanism for service-oriented vehicular networks", IEEE Internet Things J., vol. 1, no. 6, pp. 570-577, 2014.
[http://dx.doi.org/10.1109/JIOT.2014.2366120]
[29]
M.C. Chuang, and J.F. Lee, "TEAM: trust-extended authentication mechanism for vehicular Ad Hoc networks", IEEE Syst. J., vol. 8, no. 3, pp. 749-758, 2014.
[http://dx.doi.org/10.1109/JSYST.2012.2231792]
[30]
L. Bariah, D. Shehada, E. Salahat, and C.Y. Yeun, "Recent advances in VANET security: A survey", IEEE 82nd Vehicular Technology Conference,, pp. 1-7, 2015.Boston, MA,
[http://dx.doi.org/10.1109/VTCFall.2015.7391111]
[31]
M. Ashritha, and C.S. Sridhar, "RSU based efficient vehicle authentication mechanism for VANETs", IEEE 9th International Conference on Intelligent Systems and Control (ISCO),, pp. 1-5, 2015.Coimbatore,
[http://dx.doi.org/10.1109/ISCO.2015.7282299]
[32]
A. Luckshetty, S. Dontal, S. Tangade, and S.S. Manvi, "A survey: Comparative study of applications, attacks, security and privacy in VANETs", In International Conference on Communication and Signal Processing (ICCSP), 2016, pp. 1594-1598
[http://dx.doi.org/10.1109/ICCSP.2016.7754429]
[33]
M. Dixit, R. Kumar, and A.K. Sagar, "VANET: Architectures, research issues, routing protocols, and its applications", In International Conference on Computing, Communication and Automation (ICCCA), 2016, pp. 555-561
[http://dx.doi.org/10.1109/CCAA.2016.7813782]
[34]
K. Jeffane, and K. Ibrahimi, "Detection and identification of attacks in Vehicular Ad-Hoc NETwork", In International Conference on Wireless Networks and Mobile Communications (WINCOM), 2016, pp. 58-62
[http://dx.doi.org/10.1109/WINCOM.2016.7777191]
[35]
H. Zhong, J. Wen, J. Cui, and S. Zhang, "Efficient conditional privacy-preserving and authentication scheme for secure service provision in VANET", Tsinghua Sci. Technol., vol. 21, no. 6, pp. 620-629, 2016.
[http://dx.doi.org/10.1109/TST.2016.7787005]
[36]
A.S.A. Hasan, M.S. Hossain, and M. Atiquzzaman, "Security threats in vehicular ad hoc networks", International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 404-411, 2016.
[http://dx.doi.org/10.1109/ICACCI.2016.7732079]
[37]
S.F. Tzeng, S.J. Horng, T. Li, X. Wang, P.H. Huang, and M.K. Khan, "Enhancing security and privacy for identity-based batch verification scheme in VANETs", IEEE Trans. Vehicular Technol., vol. 66, no. 4, pp. 3235-3248, 2017.
[http://dx.doi.org/10.1109/TVT.2015.2406877]
[38]
Z. Zhang, A. Boukerche, and R. Pazzi, "A novel multi hop clustering scheme for vehicular ad hoc networks", Proceedings of the 9th ACM International Symposium on Mobility Management and Wireless Access, pp. 19-26, 2011.
[http://dx.doi.org/10.1145/2069131.2069135]
[39]
S.K. Theodore, K.R. Gandhi, and V. Palanisamy, A novel lightweight authentication and privacy-preserving protocol for vehicular ad hoc networks., Complex & Intelligent Systems, 2021, pp. 1-11.
[40]
A.D. May, Traffic Flow Fundamentals., Prentice Hall: Englewood Cliffs, N.J., 1990.
[41]
M.S. Kakkasageri, and S.S. Manvi, "Multiagent driven dynamic clustering of vehicles in VANETs", J. Netw. Comput. Appl., vol. 35, no. 6, pp. 1771-1780, 2012.
[http://dx.doi.org/10.1016/j.jnca.2012.07.002]

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy