Universiti Teknologi Malaysia Institutional Repository

A security and privacy scheme based on node and message authentication and trust in fog-enabled VANET

Soleyman, Seyed Ahmad and Goudarzi, Shidrokh and Anisi, Mohammad Hossein and Zareei, Mahdi and Abdullah, Abdul Hanan and Kama, Nazri (2021) A security and privacy scheme based on node and message authentication and trust in fog-enabled VANET. Vehicular Communications, 29 . p. 100335. ISSN 2214-2096

[img]
Preview
PDF
1MB

Official URL: http://dx.doi.org/10.1016/j.vehcom.2021.100335

Abstract

Security and privacy are the most important concerns related to vehicular ad hoc network (VANET), as it is an open-access and self-organized network. The presence of ‘selfish’ nodes distributed in the network are taken into account as an important challenge and as a security threat in VANET. A selfish node is a legitimate vehicle node which tries to achieve the most benefit from the network by broadcasting wrong information. An efficient and proper security model can be useful to tackle advances from attackers, as well as selfish nodes. In this study, a privacy-preserving node and message authentication scheme, along with a trust model was developed. The proposed node authentication ensures the legitimacy of the vehicle nodes, whereas the message authentication was developed to ensure the message's integrity. To deal with selfish nodes, an experience-based trust model was also designed. Additionally, to fulfill the privacy-preserving aspect, the mapping of each vehicle was performed using a different pseudo-identity. In this paper, fog nodes instead of road-side units (RSUs), were distributed along the roadside. This was mainly because of the fact that fog computing reduces latency, and results in increased throughput. Security analysis indicated that our scheme met the VANETs' security requirements. In addition, the performance analysis showed that the proposed scheme had a lower communication and computation overhead, compared to the other related works. Monte-Carlo simulation results were applied to estimate the false-positive rates (FPR), which also proved the validity of the proposed security scheme.

Item Type:Article
Uncontrolled Keywords:Authentication, Fog node
Subjects:Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions:Computing
ID Code:95972
Deposited By: Widya Wahid
Deposited On:01 Jul 2022 06:49
Last Modified:01 Jul 2022 06:49

Repository Staff Only: item control page