Group Key Authentication scheme for Vanet INtrusion detection (GKAVIN)

Security must be provided in VANET as it is open to various attacks due to malicious vehicle, Brute force attack, misbehaving and faulty nodes, malicious users, and malicious nodes. The attacks can be occurred due to the lack of authentication. To overcome this problem, in this paper, we propose to...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Wireless networks 2017-04, Vol.23 (3), p.935-945
Hauptverfasser: Kumaresan, G., Adiline Macriga, T.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 945
container_issue 3
container_start_page 935
container_title Wireless networks
container_volume 23
creator Kumaresan, G.
Adiline Macriga, T.
description Security must be provided in VANET as it is open to various attacks due to malicious vehicle, Brute force attack, misbehaving and faulty nodes, malicious users, and malicious nodes. The attacks can be occurred due to the lack of authentication. To overcome this problem, in this paper, we propose to develop a group key authentication and misbehaviour detection in VANET. Initially, we form clusters with three types of nodes within a certain transmission range namely Unique Node, Sub Unique Node, and Normal Node. Handshaking can be performed followed by message signing. The message is verified, and then group key is generated with subsequent key generation at each time slot. Finally, location information and time about vehicles can be used to detect malicious behaviours. Simulation results show that the proposed technique can achieve more packet delivery ratio with reduced delay, overhead, and packet drop.
doi_str_mv 10.1007/s11276-016-1197-z
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1893894337</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1893894337</sourcerecordid><originalsourceid>FETCH-LOGICAL-c349t-b2216fcaecc627742c756573ce450d501df35b5183e6d004c2779c4d5decb90a3</originalsourceid><addsrcrecordid>eNp1kE1PAjEQhhujiYj-AG-beMFDddpuv46ECBIJXpRrs3S7AoFdbLsH-PUW14Mx8TSTzPO-mTwI3RJ4IADyMRBCpcBABCZES3w8Qz3CJcWKaHGedqAUAzB1ia5C2ACAYlr30Hjim3afvbhDNmzjytVxbYu4buos2JXbuaxqfLYoahez6Tz6NpxOpYvOfkODyctwMZ3fX6OLqtgGd_Mz--h9_PQ2esaz18l0NJxhy3Id8ZJSIipbOGsFlTKnVnLBJbMu51ByIGXF-JITxZwoAXKbIG3zkpfOLjUUrI8GXe_eN5-tC9Hs1sG67TZ92LTBEKWZ0jljMqF3f9BN0_o6fZcoqUBwQVWiSEdZ34TgXWX2fr0r_MEQMCezpjNrkllzMmuOKUO7TEhs_eH8r-Z_Q1_cQXod</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1878065628</pqid></control><display><type>article</type><title>Group Key Authentication scheme for Vanet INtrusion detection (GKAVIN)</title><source>SpringerLink Journals</source><creator>Kumaresan, G. ; Adiline Macriga, T.</creator><creatorcontrib>Kumaresan, G. ; Adiline Macriga, T.</creatorcontrib><description>Security must be provided in VANET as it is open to various attacks due to malicious vehicle, Brute force attack, misbehaving and faulty nodes, malicious users, and malicious nodes. The attacks can be occurred due to the lack of authentication. To overcome this problem, in this paper, we propose to develop a group key authentication and misbehaviour detection in VANET. Initially, we form clusters with three types of nodes within a certain transmission range namely Unique Node, Sub Unique Node, and Normal Node. Handshaking can be performed followed by message signing. The message is verified, and then group key is generated with subsequent key generation at each time slot. Finally, location information and time about vehicles can be used to detect malicious behaviours. Simulation results show that the proposed technique can achieve more packet delivery ratio with reduced delay, overhead, and packet drop.</description><identifier>ISSN: 1022-0038</identifier><identifier>EISSN: 1572-8196</identifier><identifier>DOI: 10.1007/s11276-016-1197-z</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Analysis ; Authentication ; Authentication protocols ; Communications Engineering ; Computer Communication Networks ; Computer information security ; Data integrity ; Delay ; Electrical Engineering ; Engineering ; Intrusion ; IT in Business ; Messages ; Network security ; Networks ; Privacy ; Simulation ; Studies ; Vehicles ; Wireless communications ; Wireless networks</subject><ispartof>Wireless networks, 2017-04, Vol.23 (3), p.935-945</ispartof><rights>Springer Science+Business Media New York 2016</rights><rights>Wireless Networks is a copyright of Springer, 2017.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c349t-b2216fcaecc627742c756573ce450d501df35b5183e6d004c2779c4d5decb90a3</citedby><cites>FETCH-LOGICAL-c349t-b2216fcaecc627742c756573ce450d501df35b5183e6d004c2779c4d5decb90a3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11276-016-1197-z$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11276-016-1197-z$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27901,27902,41464,42533,51294</link.rule.ids></links><search><creatorcontrib>Kumaresan, G.</creatorcontrib><creatorcontrib>Adiline Macriga, T.</creatorcontrib><title>Group Key Authentication scheme for Vanet INtrusion detection (GKAVIN)</title><title>Wireless networks</title><addtitle>Wireless Netw</addtitle><description>Security must be provided in VANET as it is open to various attacks due to malicious vehicle, Brute force attack, misbehaving and faulty nodes, malicious users, and malicious nodes. The attacks can be occurred due to the lack of authentication. To overcome this problem, in this paper, we propose to develop a group key authentication and misbehaviour detection in VANET. Initially, we form clusters with three types of nodes within a certain transmission range namely Unique Node, Sub Unique Node, and Normal Node. Handshaking can be performed followed by message signing. The message is verified, and then group key is generated with subsequent key generation at each time slot. Finally, location information and time about vehicles can be used to detect malicious behaviours. Simulation results show that the proposed technique can achieve more packet delivery ratio with reduced delay, overhead, and packet drop.</description><subject>Analysis</subject><subject>Authentication</subject><subject>Authentication protocols</subject><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Computer information security</subject><subject>Data integrity</subject><subject>Delay</subject><subject>Electrical Engineering</subject><subject>Engineering</subject><subject>Intrusion</subject><subject>IT in Business</subject><subject>Messages</subject><subject>Network security</subject><subject>Networks</subject><subject>Privacy</subject><subject>Simulation</subject><subject>Studies</subject><subject>Vehicles</subject><subject>Wireless communications</subject><subject>Wireless networks</subject><issn>1022-0038</issn><issn>1572-8196</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNp1kE1PAjEQhhujiYj-AG-beMFDddpuv46ECBIJXpRrs3S7AoFdbLsH-PUW14Mx8TSTzPO-mTwI3RJ4IADyMRBCpcBABCZES3w8Qz3CJcWKaHGedqAUAzB1ia5C2ACAYlr30Hjim3afvbhDNmzjytVxbYu4buos2JXbuaxqfLYoahez6Tz6NpxOpYvOfkODyctwMZ3fX6OLqtgGd_Mz--h9_PQ2esaz18l0NJxhy3Id8ZJSIipbOGsFlTKnVnLBJbMu51ByIGXF-JITxZwoAXKbIG3zkpfOLjUUrI8GXe_eN5-tC9Hs1sG67TZ92LTBEKWZ0jljMqF3f9BN0_o6fZcoqUBwQVWiSEdZ34TgXWX2fr0r_MEQMCezpjNrkllzMmuOKUO7TEhs_eH8r-Z_Q1_cQXod</recordid><startdate>20170401</startdate><enddate>20170401</enddate><creator>Kumaresan, G.</creator><creator>Adiline Macriga, T.</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7SP</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>88I</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M2P</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope></search><sort><creationdate>20170401</creationdate><title>Group Key Authentication scheme for Vanet INtrusion detection (GKAVIN)</title><author>Kumaresan, G. ; Adiline Macriga, T.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c349t-b2216fcaecc627742c756573ce450d501df35b5183e6d004c2779c4d5decb90a3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Analysis</topic><topic>Authentication</topic><topic>Authentication protocols</topic><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Computer information security</topic><topic>Data integrity</topic><topic>Delay</topic><topic>Electrical Engineering</topic><topic>Engineering</topic><topic>Intrusion</topic><topic>IT in Business</topic><topic>Messages</topic><topic>Network security</topic><topic>Networks</topic><topic>Privacy</topic><topic>Simulation</topic><topic>Studies</topic><topic>Vehicles</topic><topic>Wireless communications</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kumaresan, G.</creatorcontrib><creatorcontrib>Adiline Macriga, T.</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>ABI/INFORM Collection (ProQuest)</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection</collection><collection>Science Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Database‎ (1962 - current)</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM global</collection><collection>ProQuest Science Journals</collection><collection>ProQuest advanced technologies &amp; aerospace journals</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>One Business (ProQuest)</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><jtitle>Wireless networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Kumaresan, G.</au><au>Adiline Macriga, T.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Group Key Authentication scheme for Vanet INtrusion detection (GKAVIN)</atitle><jtitle>Wireless networks</jtitle><stitle>Wireless Netw</stitle><date>2017-04-01</date><risdate>2017</risdate><volume>23</volume><issue>3</issue><spage>935</spage><epage>945</epage><pages>935-945</pages><issn>1022-0038</issn><eissn>1572-8196</eissn><abstract>Security must be provided in VANET as it is open to various attacks due to malicious vehicle, Brute force attack, misbehaving and faulty nodes, malicious users, and malicious nodes. The attacks can be occurred due to the lack of authentication. To overcome this problem, in this paper, we propose to develop a group key authentication and misbehaviour detection in VANET. Initially, we form clusters with three types of nodes within a certain transmission range namely Unique Node, Sub Unique Node, and Normal Node. Handshaking can be performed followed by message signing. The message is verified, and then group key is generated with subsequent key generation at each time slot. Finally, location information and time about vehicles can be used to detect malicious behaviours. Simulation results show that the proposed technique can achieve more packet delivery ratio with reduced delay, overhead, and packet drop.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11276-016-1197-z</doi><tpages>11</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1022-0038
ispartof Wireless networks, 2017-04, Vol.23 (3), p.935-945
issn 1022-0038
1572-8196
language eng
recordid cdi_proquest_miscellaneous_1893894337
source SpringerLink Journals
subjects Analysis
Authentication
Authentication protocols
Communications Engineering
Computer Communication Networks
Computer information security
Data integrity
Delay
Electrical Engineering
Engineering
Intrusion
IT in Business
Messages
Network security
Networks
Privacy
Simulation
Studies
Vehicles
Wireless communications
Wireless networks
title Group Key Authentication scheme for Vanet INtrusion detection (GKAVIN)
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-29T06%3A35%3A12IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Group%20Key%20Authentication%20scheme%20for%20Vanet%20INtrusion%20detection%20(GKAVIN)&rft.jtitle=Wireless%20networks&rft.au=Kumaresan,%20G.&rft.date=2017-04-01&rft.volume=23&rft.issue=3&rft.spage=935&rft.epage=945&rft.pages=935-945&rft.issn=1022-0038&rft.eissn=1572-8196&rft_id=info:doi/10.1007/s11276-016-1197-z&rft_dat=%3Cproquest_cross%3E1893894337%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1878065628&rft_id=info:pmid/&rfr_iscdi=true