A High-Efficiency Secure Communication Scheme in Vehicle Ad-hoc Networks
DOI:
https://doi.org/10.17010/ijcs/2025/v10/i3/175398Keywords:
Secure communication, Vehicle Ad-hoc Network.Publication Chronology: Paper Submission Date : May 5, 2025 ; Paper sent back for Revision : May 16, 2025 ; Paper Acceptance Date : May 19, 2025 ; Paper Published Online : June 5, 2025
Abstract
Vehicle Ad-hoc Networks (VANETs) have come into being with development of many technologies, but security and privacy is a big concern to address before they can be applied. In this work, we study existing requirements and cryptographic solutions on security and privacy protection in vehicle networks, identify their weaknesses and limitations, and propose an improved security scheme to address the weaknesses and limitations. The proposed solution is analyzed and evaluated theoretically and with simulation, to demonstrate its security features and high efficiency.
Downloads
Published
How to Cite
Issue
Section
References
[1] M. A. Al-Shareeda, M. Anbar, I. H. Hasbullah, S. Manickam, and S. M. Hanshi, “Efficient conditional privacy preservation with mutual authentication in vehicular ad hoc networks,” IEEE Access, vol. 8, pp. 144957–144968, 2020, doi: 10.1109/ACCESS.2020.3014678.
[2] M. A. Al-Shareeda, M. Anbar, S. Manickam, A. Khalil, and I. H. Hasbullah, “Security and privacy schemes in vehicular ad-hoc network with identity based cryptography approach: A survey,” IEEE Access, vol. 9, pp. 121522–121531, 2021.
[3] A. Quyoom, A. A. Mir, and A. Sarwar, “Security attacks and challenges of VANETs: A literature survey,” J. Multimedia Inf. System, vol. 7, no. 1, pp. 45–54, 2020, doi: 10.33851/JMIS.2020.7.1.45.
[4] Y. Yao, X. Chang, L. Li, J. Liu, and H. Wang, “Dual privacy-preserving lightweight navigation system for vehicular networks,” IEEE Access, vol. 10, pp. 121120–121132, 2022, doi: 10.1109/ACCESS.2022.3222302.
[5] V. Kumar, A. M. A. Al-Tameemi, A. Kumari, M. Ahmad, M. W. Falah, and A. A. A. El-Latif, “PSEBVC: Provably secure ECC and biometric based authentication framework using smartphone for vehicular cloud environment,” IEEE Access, vol. 10, pp. 84776–84789, 2022, doi: 10.1109/ACCESS.2022.3195807.
[6] H. Wang, L. Wang, K. Zhang, J. Li, and Y. Luo, “A conditional privacy-preserving certificateless aggregate signature scheme in the standard model for VANETs',” IEEE Access, vol. 10, pp. 15605–15618, 2022, doi: 10.1109/ACCESS.2024.3353609.
[7] I. Ali, Y. Chen, N. Ullah, R. Kumar, and W. He, “An efficient and provably secure ECC-based conditional privacy-preserving authentication for Vehicle-to-Vehicle Communication in VANETs,” IEEE Trans. Veh. Technol., vol. 70, no. 2, pp. 1278–1291, 2021, doi: 10.1109/TVT.2021.3050399.
[8] R. I. Abdelfatah, N. M. Abdal-Ghafour, and M. E. Nasr, “Secure VANET Authentication Protocol (SVAP) using Chebyshev Chaotic Maps for emergency conditions,” IEEE Access, vol. 10, pp. 1096–1115, 2022, doi: 10.1109/ACCESS.2021.3137877.
[9] Y. Tian, J. Yuan, and H. Song, “Efficient privacy-preserving authentication framework for edge-assisted Internet of Drones,” J. Inf. Security Appl., vol. 48, no. 3, 102354, 2019, doi: 10.1016/j.jisa.2019.06.010.
[10] M. Raya and J.-P. Hubaux, “Securing vehicular ad hoc networks,” J. Comput Secur., vol. 15, no. 1, pp. 39–68, 2007, doi: 10.5555/1370616.1370618.
[11] S. Zhao, R. Kent, and A. Aggarwal, “A key management and secure routing integrated framework for Mobile Ad-hoc Networks,” Ad Hoc Networks, vol. 11, no. 3, pp. 1046–1061, 2013, doi: 10.1016/j.adhoc.2012.11.005.
[12] B. D. Deebak, F. Al-Turjman, and A. Nayyar, “Chaotic-map based authenticated security framework with privacy preservation for remote pointof-care,” Multimedia Tools Appl., vol. 80, no. 11, pp. 17103–17128, 2021, doi: 10.1007/s11042-020-10134-x.
[13] S. F. Aghili and H. Mala, “Security analysis of an ultra-lightweight RFID authentication protocol for m-commerce,” Int. J. Commun. Syst., vol. 32, no. 3, p. e3837, 2019. [Online]. Available: https://eprint.iacr.org/2017/547.
[14] J. Cui, D. Wu, J. Zhang, Y. Xu, and H. Zhong, “An efficient authentication scheme based on semi-trusted authority in VANETs',” IEEE Trans. Veh. Technol., vol. 68, no. 3, pp. 2972–2986, 2019, doi: 10.1109/TVT.2019.2896018.