Amazing technological breakthrough possible @S-Logix pro@slogix.in

Office Address

  • #5, First Floor, 4th Street Dr. Subbarayan Nagar Kodambakkam, Chennai-600 024 Landmark : Samiyar Madam
  • pro@slogix.in
  • +91- 81240 01111

Social List

PBA: Prediction-Based Authentication for Vehicle-to-Vehicle Communications - 2016

PBA: Prediction-Based Authentication for Vehicle-to-Vehicle Communications

Research Area:  Vehicular Ad Hoc Networks

Abstract:

In vehicular networks, broadcast communications are critically important, as many safety-related applications rely on single-hop beacon messages broadcast to neighbor vehicles. However, it becomes a challenging problem to design a broadcast authentication scheme for secure vehicle-to-vehicle communications. Especially when a large number of beacons arrive in a short time, vehicles are vulnerable to computation-based Denial of Service (DoS) attacks that excessive signature verification exhausts their computational resources. In this paper, we propose an efficient broadcast authentication scheme called Prediction-Based Authentication (PBA) to not only defend against computation-based DoS attacks, but also resist packet losses caused by high mobility of vehicles. In contrast to most existing authentication schemes, our PBA is an efficient and lightweight scheme since it is primarily built on symmetric cryptography. To further reduce the verification delay for some emergency applications, PBA is designed to exploit the sender vehicles ability to predict future beacons in advance. In addition, to prevent memory-based DoS attacks, PBA only stores shortened re-keyed Message Authentication Codes (MACs) of signatures without decreasing security. We analyze the security of our scheme and simulate PBA under varying vehicular network scenarios. The results demonstrate that PBA fast verifies almost 99 percent messages with low storage cost not only in high-density traffic environments but also in lossy wireless environments.

Keywords:  

Author(s) Name:  Chen Lyu, Dawu Gu, Yunze Zeng and Prasant Mohapatra

Journal name:  IEEE Transactions on Dependable and Secure Computing

Conferrence name:  

Publisher name:  IEEE

DOI:  10.1109/TDSC.2015.2399297

Volume Information:  Volume: 13, Issue: 1, Jan.-Feb. 1 2016, Page(s): 71 - 83