A High-Efficiency Secure Communication Scheme in Vehicle Ad-hoc Networks

Authors

  •   Shushan Zhao Associate Professor, Department of Computer Electronics & Graphics Technology, Central Connecticut State University, 1615 Stanley Street, New Britain, CT 06050 ORCID logo https://orcid.org/0000-0002-3142-3626

DOI:

https://doi.org/10.17010/ijcs/2025/v10/i3/175398

Keywords:

Secure communication, Vehicle Ad-hoc Network.
Publication Chronology: Paper Submission Date : May 5, 2025 ; Paper sent back for Revision : May 16, 2025 ; Paper Acceptance Date : May 19, 2025 ; Paper Published Online : June 5, 2025

Abstract

Vehicle Ad-hoc Networks (VANETs) have come into being with development of many technologies, but security and privacy is a big concern to address before they can be applied. In this work, we study existing requirements and cryptographic solutions on security and privacy protection in vehicle networks, identify their weaknesses and limitations, and propose an improved security scheme to address the weaknesses and limitations. The proposed solution is analyzed and evaluated theoretically and with simulation, to demonstrate its security features and high efficiency.

Downloads

Download data is not yet available.

Published

2025-06-05

How to Cite

Zhao, S. (2025). A High-Efficiency Secure Communication Scheme in Vehicle Ad-hoc Networks. Indian Journal of Computer Science, 10(3), 18–28. https://doi.org/10.17010/ijcs/2025/v10/i3/175398

References

[1] M. A. Al-Shareeda, M. Anbar, I. H. Hasbullah, S. Manickam, and S. M. Hanshi, “Efficient conditional privacy preservation with mutual authentication in vehicular ad hoc networks,” IEEE Access, vol. 8, pp. 144957–144968, 2020, doi: 10.1109/ACCESS.2020.3014678.

[2] M. A. Al-Shareeda, M. Anbar, S. Manickam, A. Khalil, and I. H. Hasbullah, “Security and privacy schemes in vehicular ad-hoc network with identity based cryptography approach: A survey,” IEEE Access, vol. 9, pp. 121522–121531, 2021.

[3] A. Quyoom, A. A. Mir, and A. Sarwar, “Security attacks and challenges of VANETs: A literature survey,” J. Multimedia Inf. System, vol. 7, no. 1, pp. 45–54, 2020, doi: 10.33851/JMIS.2020.7.1.45.

[4] Y. Yao, X. Chang, L. Li, J. Liu, and H. Wang, “Dual privacy-preserving lightweight navigation system for vehicular networks,” IEEE Access, vol. 10, pp. 121120–121132, 2022, doi: 10.1109/ACCESS.2022.3222302.

[5] V. Kumar, A. M. A. Al-Tameemi, A. Kumari, M. Ahmad, M. W. Falah, and A. A. A. El-Latif, “PSEBVC: Provably secure ECC and biometric based authentication framework using smartphone for vehicular cloud environment,” IEEE Access, vol. 10, pp. 84776–84789, 2022, doi: 10.1109/ACCESS.2022.3195807.

[6] H. Wang, L. Wang, K. Zhang, J. Li, and Y. Luo, “A conditional privacy-preserving certificateless aggregate signature scheme in the standard model for VANETs',” IEEE Access, vol. 10, pp. 15605–15618, 2022, doi: 10.1109/ACCESS.2024.3353609.

[7] I. Ali, Y. Chen, N. Ullah, R. Kumar, and W. He, “An efficient and provably secure ECC-based conditional privacy-preserving authentication for Vehicle-to-Vehicle Communication in VANETs,” IEEE Trans. Veh. Technol., vol. 70, no. 2, pp. 1278–1291, 2021, doi: 10.1109/TVT.2021.3050399.

[8] R. I. Abdelfatah, N. M. Abdal-Ghafour, and M. E. Nasr, “Secure VANET Authentication Protocol (SVAP) using Chebyshev Chaotic Maps for emergency conditions,” IEEE Access, vol. 10, pp. 1096–1115, 2022, doi: 10.1109/ACCESS.2021.3137877.

[9] Y. Tian, J. Yuan, and H. Song, “Efficient privacy-preserving authentication framework for edge-assisted Internet of Drones,” J. Inf. Security Appl., vol. 48, no. 3, 102354, 2019, doi: 10.1016/j.jisa.2019.06.010.

[10] M. Raya and J.-P. Hubaux, “Securing vehicular ad hoc networks,” J. Comput Secur., vol. 15, no. 1, pp. 39–68, 2007, doi: 10.5555/1370616.1370618.

[11] S. Zhao, R. Kent, and A. Aggarwal, “A key management and secure routing integrated framework for Mobile Ad-hoc Networks,” Ad Hoc Networks, vol. 11, no. 3, pp. 1046–1061, 2013, doi: 10.1016/j.adhoc.2012.11.005.

[12] B. D. Deebak, F. Al-Turjman, and A. Nayyar, “Chaotic-map based authenticated security framework with privacy preservation for remote pointof-care,” Multimedia Tools Appl., vol. 80, no. 11, pp. 17103–17128, 2021, doi: 10.1007/s11042-020-10134-x.

[13] S. F. Aghili and H. Mala, “Security analysis of an ultra-lightweight RFID authentication protocol for m-commerce,” Int. J. Commun. Syst., vol. 32, no. 3, p. e3837, 2019. [Online]. Available: https://eprint.iacr.org/2017/547.

[14] J. Cui, D. Wu, J. Zhang, Y. Xu, and H. Zhong, “An efficient authentication scheme based on semi-trusted authority in VANETs',” IEEE Trans. Veh. Technol., vol. 68, no. 3, pp. 2972–2986, 2019, doi: 10.1109/TVT.2019.2896018.