{"title":"Privacy-preserving authentication approach for vehicular networks","authors":"Chindika Mulambia, Sudeep Varshney, Amrit Suman","doi":"10.11591/ijeecs.v34.i3.pp1674-1681","DOIUrl":null,"url":null,"abstract":"Vehicle AdHoc networks have an important role in intelligent transport systems that enhance safety in road usage by transmitting real traffic updates in terms of congestion and road accidents. The dynamic nature of the vehicular AdHoc networks make them susceptible to attacks because once malicious users gain access to the network they can transform traffic data. It is essential to protect the vehicular ad hoc network because any attack can cause unwanted harm, to solve this it is important to have an approach that detects malicious vehicles and not give them access to the network. The proposed approach is a privacy preserving authentication approach that authenticates vehicles before they have access to the vehicular network thereby identifying malicious vehicles. The model was executed in docker container that simulates the network in a Linux environment running Ubuntu 20.04. The model enhances privacy by assigning Pseudo IDs to authenticated vehicles and the results demonstrate effectiveness of the solution in that unlike other models it boasts faster authentication and lower computational overhead which is necessary in a vehicular network scenario.","PeriodicalId":13480,"journal":{"name":"Indonesian Journal of Electrical Engineering and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Indonesian Journal of Electrical Engineering and Computer Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.11591/ijeecs.v34.i3.pp1674-1681","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Mathematics","Score":null,"Total":0}
引用次数: 0
Abstract
Vehicle AdHoc networks have an important role in intelligent transport systems that enhance safety in road usage by transmitting real traffic updates in terms of congestion and road accidents. The dynamic nature of the vehicular AdHoc networks make them susceptible to attacks because once malicious users gain access to the network they can transform traffic data. It is essential to protect the vehicular ad hoc network because any attack can cause unwanted harm, to solve this it is important to have an approach that detects malicious vehicles and not give them access to the network. The proposed approach is a privacy preserving authentication approach that authenticates vehicles before they have access to the vehicular network thereby identifying malicious vehicles. The model was executed in docker container that simulates the network in a Linux environment running Ubuntu 20.04. The model enhances privacy by assigning Pseudo IDs to authenticated vehicles and the results demonstrate effectiveness of the solution in that unlike other models it boasts faster authentication and lower computational overhead which is necessary in a vehicular network scenario.
期刊介绍:
The aim of Indonesian Journal of Electrical Engineering and Computer Science (formerly TELKOMNIKA Indonesian Journal of Electrical Engineering) is to publish high-quality articles dedicated to all aspects of the latest outstanding developments in the field of electrical engineering. Its scope encompasses the applications of Telecommunication and Information Technology, Applied Computing and Computer, Instrumentation and Control, Electrical (Power), Electronics Engineering and Informatics which covers, but not limited to, the following scope: Signal Processing[...] Electronics[...] Electrical[...] Telecommunication[...] Instrumentation & Control[...] Computing and Informatics[...]