Group Key Authentication scheme for Vanet INtrusion detection (GKAVIN)
Security must be provided in VANET as it is open to various attacks due to malicious vehicle, Brute force attack, misbehaving and faulty nodes, malicious users, and malicious nodes. The attacks can be occurred due to the lack of authentication. To overcome this problem, in this paper, we propose to...
Gespeichert in:
Veröffentlicht in: | Wireless networks 2017-04, Vol.23 (3), p.935-945 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 945 |
---|---|
container_issue | 3 |
container_start_page | 935 |
container_title | Wireless networks |
container_volume | 23 |
creator | Kumaresan, G. Adiline Macriga, T. |
description | Security must be provided in VANET as it is open to various attacks due to malicious vehicle, Brute force attack, misbehaving and faulty nodes, malicious users, and malicious nodes. The attacks can be occurred due to the lack of authentication. To overcome this problem, in this paper, we propose to develop a group key authentication and misbehaviour detection in VANET. Initially, we form clusters with three types of nodes within a certain transmission range namely Unique Node, Sub Unique Node, and Normal Node. Handshaking can be performed followed by message signing. The message is verified, and then group key is generated with subsequent key generation at each time slot. Finally, location information and time about vehicles can be used to detect malicious behaviours. Simulation results show that the proposed technique can achieve more packet delivery ratio with reduced delay, overhead, and packet drop. |
doi_str_mv | 10.1007/s11276-016-1197-z |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1893894337</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1893894337</sourcerecordid><originalsourceid>FETCH-LOGICAL-c349t-b2216fcaecc627742c756573ce450d501df35b5183e6d004c2779c4d5decb90a3</originalsourceid><addsrcrecordid>eNp1kE1PAjEQhhujiYj-AG-beMFDddpuv46ECBIJXpRrs3S7AoFdbLsH-PUW14Mx8TSTzPO-mTwI3RJ4IADyMRBCpcBABCZES3w8Qz3CJcWKaHGedqAUAzB1ia5C2ACAYlr30Hjim3afvbhDNmzjytVxbYu4buos2JXbuaxqfLYoahez6Tz6NpxOpYvOfkODyctwMZ3fX6OLqtgGd_Mz--h9_PQ2esaz18l0NJxhy3Id8ZJSIipbOGsFlTKnVnLBJbMu51ByIGXF-JITxZwoAXKbIG3zkpfOLjUUrI8GXe_eN5-tC9Hs1sG67TZ92LTBEKWZ0jljMqF3f9BN0_o6fZcoqUBwQVWiSEdZ34TgXWX2fr0r_MEQMCezpjNrkllzMmuOKUO7TEhs_eH8r-Z_Q1_cQXod</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1878065628</pqid></control><display><type>article</type><title>Group Key Authentication scheme for Vanet INtrusion detection (GKAVIN)</title><source>SpringerLink Journals</source><creator>Kumaresan, G. ; Adiline Macriga, T.</creator><creatorcontrib>Kumaresan, G. ; Adiline Macriga, T.</creatorcontrib><description>Security must be provided in VANET as it is open to various attacks due to malicious vehicle, Brute force attack, misbehaving and faulty nodes, malicious users, and malicious nodes. The attacks can be occurred due to the lack of authentication. To overcome this problem, in this paper, we propose to develop a group key authentication and misbehaviour detection in VANET. Initially, we form clusters with three types of nodes within a certain transmission range namely Unique Node, Sub Unique Node, and Normal Node. Handshaking can be performed followed by message signing. The message is verified, and then group key is generated with subsequent key generation at each time slot. Finally, location information and time about vehicles can be used to detect malicious behaviours. Simulation results show that the proposed technique can achieve more packet delivery ratio with reduced delay, overhead, and packet drop.</description><identifier>ISSN: 1022-0038</identifier><identifier>EISSN: 1572-8196</identifier><identifier>DOI: 10.1007/s11276-016-1197-z</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Analysis ; Authentication ; Authentication protocols ; Communications Engineering ; Computer Communication Networks ; Computer information security ; Data integrity ; Delay ; Electrical Engineering ; Engineering ; Intrusion ; IT in Business ; Messages ; Network security ; Networks ; Privacy ; Simulation ; Studies ; Vehicles ; Wireless communications ; Wireless networks</subject><ispartof>Wireless networks, 2017-04, Vol.23 (3), p.935-945</ispartof><rights>Springer Science+Business Media New York 2016</rights><rights>Wireless Networks is a copyright of Springer, 2017.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c349t-b2216fcaecc627742c756573ce450d501df35b5183e6d004c2779c4d5decb90a3</citedby><cites>FETCH-LOGICAL-c349t-b2216fcaecc627742c756573ce450d501df35b5183e6d004c2779c4d5decb90a3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11276-016-1197-z$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11276-016-1197-z$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27901,27902,41464,42533,51294</link.rule.ids></links><search><creatorcontrib>Kumaresan, G.</creatorcontrib><creatorcontrib>Adiline Macriga, T.</creatorcontrib><title>Group Key Authentication scheme for Vanet INtrusion detection (GKAVIN)</title><title>Wireless networks</title><addtitle>Wireless Netw</addtitle><description>Security must be provided in VANET as it is open to various attacks due to malicious vehicle, Brute force attack, misbehaving and faulty nodes, malicious users, and malicious nodes. The attacks can be occurred due to the lack of authentication. To overcome this problem, in this paper, we propose to develop a group key authentication and misbehaviour detection in VANET. Initially, we form clusters with three types of nodes within a certain transmission range namely Unique Node, Sub Unique Node, and Normal Node. Handshaking can be performed followed by message signing. The message is verified, and then group key is generated with subsequent key generation at each time slot. Finally, location information and time about vehicles can be used to detect malicious behaviours. Simulation results show that the proposed technique can achieve more packet delivery ratio with reduced delay, overhead, and packet drop.</description><subject>Analysis</subject><subject>Authentication</subject><subject>Authentication protocols</subject><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Computer information security</subject><subject>Data integrity</subject><subject>Delay</subject><subject>Electrical Engineering</subject><subject>Engineering</subject><subject>Intrusion</subject><subject>IT in Business</subject><subject>Messages</subject><subject>Network security</subject><subject>Networks</subject><subject>Privacy</subject><subject>Simulation</subject><subject>Studies</subject><subject>Vehicles</subject><subject>Wireless communications</subject><subject>Wireless networks</subject><issn>1022-0038</issn><issn>1572-8196</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNp1kE1PAjEQhhujiYj-AG-beMFDddpuv46ECBIJXpRrs3S7AoFdbLsH-PUW14Mx8TSTzPO-mTwI3RJ4IADyMRBCpcBABCZES3w8Qz3CJcWKaHGedqAUAzB1ia5C2ACAYlr30Hjim3afvbhDNmzjytVxbYu4buos2JXbuaxqfLYoahez6Tz6NpxOpYvOfkODyctwMZ3fX6OLqtgGd_Mz--h9_PQ2esaz18l0NJxhy3Id8ZJSIipbOGsFlTKnVnLBJbMu51ByIGXF-JITxZwoAXKbIG3zkpfOLjUUrI8GXe_eN5-tC9Hs1sG67TZ92LTBEKWZ0jljMqF3f9BN0_o6fZcoqUBwQVWiSEdZ34TgXWX2fr0r_MEQMCezpjNrkllzMmuOKUO7TEhs_eH8r-Z_Q1_cQXod</recordid><startdate>20170401</startdate><enddate>20170401</enddate><creator>Kumaresan, G.</creator><creator>Adiline Macriga, T.</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7SP</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>88I</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M2P</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope></search><sort><creationdate>20170401</creationdate><title>Group Key Authentication scheme for Vanet INtrusion detection (GKAVIN)</title><author>Kumaresan, G. ; Adiline Macriga, T.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c349t-b2216fcaecc627742c756573ce450d501df35b5183e6d004c2779c4d5decb90a3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Analysis</topic><topic>Authentication</topic><topic>Authentication protocols</topic><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Computer information security</topic><topic>Data integrity</topic><topic>Delay</topic><topic>Electrical Engineering</topic><topic>Engineering</topic><topic>Intrusion</topic><topic>IT in Business</topic><topic>Messages</topic><topic>Network security</topic><topic>Networks</topic><topic>Privacy</topic><topic>Simulation</topic><topic>Studies</topic><topic>Vehicles</topic><topic>Wireless communications</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kumaresan, G.</creatorcontrib><creatorcontrib>Adiline Macriga, T.</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>ABI/INFORM Collection (ProQuest)</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection</collection><collection>Science Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Database (1962 - current)</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM global</collection><collection>ProQuest Science Journals</collection><collection>ProQuest advanced technologies & aerospace journals</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>One Business (ProQuest)</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><jtitle>Wireless networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Kumaresan, G.</au><au>Adiline Macriga, T.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Group Key Authentication scheme for Vanet INtrusion detection (GKAVIN)</atitle><jtitle>Wireless networks</jtitle><stitle>Wireless Netw</stitle><date>2017-04-01</date><risdate>2017</risdate><volume>23</volume><issue>3</issue><spage>935</spage><epage>945</epage><pages>935-945</pages><issn>1022-0038</issn><eissn>1572-8196</eissn><abstract>Security must be provided in VANET as it is open to various attacks due to malicious vehicle, Brute force attack, misbehaving and faulty nodes, malicious users, and malicious nodes. The attacks can be occurred due to the lack of authentication. To overcome this problem, in this paper, we propose to develop a group key authentication and misbehaviour detection in VANET. Initially, we form clusters with three types of nodes within a certain transmission range namely Unique Node, Sub Unique Node, and Normal Node. Handshaking can be performed followed by message signing. The message is verified, and then group key is generated with subsequent key generation at each time slot. Finally, location information and time about vehicles can be used to detect malicious behaviours. Simulation results show that the proposed technique can achieve more packet delivery ratio with reduced delay, overhead, and packet drop.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11276-016-1197-z</doi><tpages>11</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1022-0038 |
ispartof | Wireless networks, 2017-04, Vol.23 (3), p.935-945 |
issn | 1022-0038 1572-8196 |
language | eng |
recordid | cdi_proquest_miscellaneous_1893894337 |
source | SpringerLink Journals |
subjects | Analysis Authentication Authentication protocols Communications Engineering Computer Communication Networks Computer information security Data integrity Delay Electrical Engineering Engineering Intrusion IT in Business Messages Network security Networks Privacy Simulation Studies Vehicles Wireless communications Wireless networks |
title | Group Key Authentication scheme for Vanet INtrusion detection (GKAVIN) |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-29T06%3A35%3A12IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Group%20Key%20Authentication%20scheme%20for%20Vanet%20INtrusion%20detection%20(GKAVIN)&rft.jtitle=Wireless%20networks&rft.au=Kumaresan,%20G.&rft.date=2017-04-01&rft.volume=23&rft.issue=3&rft.spage=935&rft.epage=945&rft.pages=935-945&rft.issn=1022-0038&rft.eissn=1572-8196&rft_id=info:doi/10.1007/s11276-016-1197-z&rft_dat=%3Cproquest_cross%3E1893894337%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1878065628&rft_id=info:pmid/&rfr_iscdi=true |