Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3026724.3026725acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicinsConference Proceedingsconference-collections
research-article

Performance Comparison between Broadcast Authentication Methods for Vehicular Networks

Published: 28 December 2016 Publication History

Abstract

For authenticating time critical broadcast messages, IEEE 1609.2 security standard for Vehicular Ad hoc Networks (VANETs) suggests the use of secure Elliptic Curve Digital Signature Algorithm (ECDSA). Since ECDSA has an expensive verification in terms of time, most commonly suggested alternate algorithms are TESLA and signature amortization. Unfortunately, these algorithms lack immediate authentication and non-repudiation. Therefore, we introduce a probabilistic verification scheme for an ECDSA-based authentication protocol. Using ns2 simulation tools, we compare the performance of all above-mentioned broadcast authentication algorithms. The results show with our proposed scheme, there is an increase in packet processed ratio over that of all the other algorithms.

References

[1]
F. Ahmed-Zaid, F. Bai, S. Bai, C. Basnayake, B. Bellur, S. Brovold, G. Brown, L. Caminiti, D. Cunningham, H. Elzein et al., "Vehicle Safety Communications Applications VSC-A Second Annual Report." 2011.
[2]
IEEE Std 1609.2, "(Revision of IEEE Std 1609.2-2006) IEEE Standard for Wireless Access in Vehicular Environments Security Services for Applications and Management Messages," pp. 1--289., 2013.
[3]
D. Johnson, A. Menezes, and S. Vanstone, "The Elliptic Curve Digital Signature Algorithm (ECDSA)," International Journal of Information Security, vol. 1, no. 1, pp. 36--63., 2001.
[4]
SAE Std. J2735, "Dedicated Short Range Communications, Message Set Dictionary." Nov. 2009.
[5]
H.-C. Hsiao, A. Studer, C. Chen, A. Perrig, F. Bai, B. Bellur, and A. Iyer, "Flooding-Resilient Broadcast Authentication for VANETs," in Proceedings of the 17th annual international conference on Mobile computing and networking. ACM, 2011, pp. 193--204.
[6]
A. Perrig, R. Canetti, J. D. Tygar, and D. Song, "The tesla broadcast authentication protocol," RSA CryptoBytes, vol. 5., Summer 2002.
[7]
A. Perrig, R. Canetti, J. Tygar, and D. Song, "Efficient Authentication and Signing of Multicast Streams over Lossy Channels," in IEEE Symposium on Security and Privacy, Berkeley, California., 2000.
[8]
Y. Liu, J. Li, and M. Guizani, "PKC Based Broadcast Authentication using Signature Amortization for WSNs," IEEE Transactions on Wireless Communications, vol. 11, no. 6, pp. 2106--2115., 2012.
[9]
Kanika Grover and Alvin Lim, "A Survey of Broadcast Authentication Schemes for Wireless Networks", Ad Hoc Networks 24: 288--316 (2015).
[10]
X. Fan and G. Gong, "Accelerating signature-based broadcast authentication for wireless sensor networks," Ad Hoc Networks, vol. 10, no. 4, pp. 723--736., 2012.
[11]
A. Perrig, R. Canetti, D. Song, and J. D. Tygar, "Efficient and secure source authentication for multicast," in Network and Distributed System Security Symposium (NDSS), San Diego, California, Feb. 2001.
[12]
E. Schoch and F. Kargl, "On the efficiency of secure beaconing in vanets," in Proceedings of the third ACM conference on Wireless network security, Hoboken, NJ., 2010.
[13]
C. Zhang, X. Lin, R. Lu, and P.-H. Ho, "RAISE: an efficient RSU-aided message authentication scheme in vehicular communication networks," in IEEE International Conference on Communications (ICC), Beijing, China, 2008.
[14]
D. Gavalas, C. Konstantopoulos, and G. Pantziou, "Mobility Prediction in Mobile Ad Hoc Networks," Next Generation Mobile Networks and Ubiquitous Computing, pp. 226--240., 2010.
[15]
M. M. Haklay and P. Weber, "Openstreetmap: User-generated street maps," IEEE Pervasive Computing, vol. 7, no. 4, pp. 12--18, Oct. 2008.
[16]
F. Ramm, J. Topf, and S. Chilton, OpenStreetMap: Using and Enhancing the Free Map of the World. Uit Cambridge Limited, 2010.
[17]
U. S. Department of Transportation - National Highway Traffic Safety Administration, "Vehicle Safety Communications Project - Final Report," April 2006. {Online}. Available: http://www-nrd.nhtsa.dot.gov/pdf/surplus/nrd-12/060419-0843/Index.htm.
[18]
Kanika Grover, Alvin Lim and Seungbae Lee, "Efficient Authentication Approach for Highly Dynamic Vehicular Ad Hoc Networks", Special Issue on Dynamism and Mobility Handling in Mobile and Wireless Networking, International Journal of Ad Hoc and Ubiquitous Computing 19(3-4): 193--207 (2015).
[19]
Jiping Li, Yaoming Ding, Zenggang Xiong, Shouyin Liu, and Honglai Li, "Cryptanalysis of Kim Jiye et al.'s Two-Factor Mutual Authentication with Key Agreement in WSNs," Journal of Communications, vol. 11, no. 1, pp.58--63, 2016.

Cited By

View all
  • (2018)A Survey on Secure Safety Applications in VANET2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)10.1109/HPCC/SmartCity/DSS.2018.00245(1485-1490)Online publication date: Jun-2018

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICINS '16: Proceedings of the 4th International Conference on Information and Network Security
December 2016
110 pages
ISBN:9781450347969
DOI:10.1145/3026724
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • UPM: Universiti Putra Malaysia

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 28 December 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. ECDSA
  2. VANETs
  3. authentication
  4. broadcast
  5. wireless

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICINS '16

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2018)A Survey on Secure Safety Applications in VANET2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)10.1109/HPCC/SmartCity/DSS.2018.00245(1485-1490)Online publication date: Jun-2018

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media