{"title":"基于ecc的vanet安全TDMA认证","authors":"Suchi Johari, M. Krishna","doi":"10.1109/ICCCI56745.2023.10128221","DOIUrl":null,"url":null,"abstract":"Secure TDMA in VANET is the allocation of the time slot to authentic nodes. The trusted authority verifies the node authenticity and notifies the malicious nodes to RSU. Malicious nodes replicate the identity of the authentic nodes in V2V communication. Multiple time slot requests by malicious nodes in the same frame can lead to vulnerabilities in the network. This paper focuses on secure time slot allocation for vehicles using ECC-based authentication. Registration and key exchange, sharing of the one-time session key by RSU with the vehicle, and secure V2V communication are considered in the proposed ECC approach. The registered vehicles are authenticated. RSU shares the one-time session key, allocates the time slot to the vehicle, and secures the V2V communication. The malicious nodes are identified based on a unique ID and one-time session key generated by RSU. Simulation results are compared with existing approaches.","PeriodicalId":205683,"journal":{"name":"2023 International Conference on Computer Communication and Informatics (ICCCI)","volume":"222 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"ECC-based Authentication for Secure TDMA in VANETs\",\"authors\":\"Suchi Johari, M. Krishna\",\"doi\":\"10.1109/ICCCI56745.2023.10128221\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Secure TDMA in VANET is the allocation of the time slot to authentic nodes. The trusted authority verifies the node authenticity and notifies the malicious nodes to RSU. Malicious nodes replicate the identity of the authentic nodes in V2V communication. Multiple time slot requests by malicious nodes in the same frame can lead to vulnerabilities in the network. This paper focuses on secure time slot allocation for vehicles using ECC-based authentication. Registration and key exchange, sharing of the one-time session key by RSU with the vehicle, and secure V2V communication are considered in the proposed ECC approach. The registered vehicles are authenticated. RSU shares the one-time session key, allocates the time slot to the vehicle, and secures the V2V communication. The malicious nodes are identified based on a unique ID and one-time session key generated by RSU. Simulation results are compared with existing approaches.\",\"PeriodicalId\":205683,\"journal\":{\"name\":\"2023 International Conference on Computer Communication and Informatics (ICCCI)\",\"volume\":\"222 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-01-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 International Conference on Computer Communication and Informatics (ICCCI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCI56745.2023.10128221\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Computer Communication and Informatics (ICCCI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCI56745.2023.10128221","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
ECC-based Authentication for Secure TDMA in VANETs
Secure TDMA in VANET is the allocation of the time slot to authentic nodes. The trusted authority verifies the node authenticity and notifies the malicious nodes to RSU. Malicious nodes replicate the identity of the authentic nodes in V2V communication. Multiple time slot requests by malicious nodes in the same frame can lead to vulnerabilities in the network. This paper focuses on secure time slot allocation for vehicles using ECC-based authentication. Registration and key exchange, sharing of the one-time session key by RSU with the vehicle, and secure V2V communication are considered in the proposed ECC approach. The registered vehicles are authenticated. RSU shares the one-time session key, allocates the time slot to the vehicle, and secures the V2V communication. The malicious nodes are identified based on a unique ID and one-time session key generated by RSU. Simulation results are compared with existing approaches.