1. AN EFFICIENT PRIVACY PRESERVING
AUTHENTICATION WITH INSIDER ATTACK
RESISTANCE FOR VANET
Presented by
1.SANJAY K (722820106116)
2.SARAN S (722820106121)
3.SOMANSANKARA P R (722820106134)
4.VISHNUPRASANTH B (722820106159)
Guided by
Mrs. A.Mohanapriya
ASSISTANT PROFESSOR (M.E.,)
DEPARTMENT OF ECE
SRI ESHWAR COLLEGE OF ENGINEERING.
10-08-2023 1
Batch no : 13
2. 10-08-2023 Batch no : 13 2
Presentation Outline
ā¢ Introduction
ā¢ Abstract
ā¢ Literature Survey
ā¢ Objective
ā¢ Block Diagram
ā¢ Expected Outcome
ā¢ Execution Plan
ā¢ References
3. 10-08-2023 Batch no : 13 3
Introduction
ā¢ Vehicular Ad-Hoc Networks (VANETs) play a crucial role in enhancing road
safety and traffic efficiency by enabling real-time vehicle communication.
ā¢ However, the nature of VANETs exposes them to various security risks,
including privacy breaches and insider attacks.
ā¢ To address these challenges, we propose an efficient privacy-preserving
authentication system tailored for VANETs.
ā¢ Our solution incorporates advanced techniques to safeguard user identities,
ensuring confidentiality and thwarting insider threats for a secure VANET
environment.
4. 10-08-2023 Batch no : 13 4
Abstract
ā¢ Vehicular Ad-Hoc Networks (VANETs) are essential for improving traffic
management and road safety by enabling vehicles to connect with each other
and with roadside infrastructure.
ā¢ VANETs face security risks, including insider attacks, due to their openness
and dynamic nature.
ā¢ The proposed research presents an efficient privacy-preserving authentication
scheme with insider attack resistance for VANETs, utilizing clustering
protocols and the BRFD algorithm.
ā¢ The research aims to build a more secure and efficient VANET ecosystem to
encourage the widespread adoption of VANET technology for safer and more
effective transportation networks.
5. 10-08-2023 Batch no : 13 5
Literature Survey
Paper Title Journal details Methodology
Advantages/
Disadvantages
1.PairingFree Signatures
with Insider Attack
Resistance for Vehicular
AdHoc Networks
(VANETs)
IEEE Access, vol. 9,
pp. 159587-159597.
Cryptographic operations
measured using C MIRACL
Core Cryptographic Library
Advantages:
It ensures message integrity, authentication,
privacy, tracing, non-repudiation, and resistance to
insider attacks
Disadvantages:
Limited Scalability,
Increased Latency,
Complexity of Revocation.
2. Comparative study
on security and privacy
issues in VANETs
Cloud and
IoTāBased Vehicular
Ad Hoc Networks
(2021): 145-162.
Geolocalization Abilities,
Dedicated Short-Range
Communication (DSRC),
Low Motionlessness
Necessities
Advantages:
It achieves security and privacy in VANETs.
It enhances vehicle authentication time, collision
rate, data transmission rate, and privacy
preservation levels
Disadvantages:
Rapidly Evolving Technology,
Availability of Data,
Scope and Complexity
6. 10-08-2023 Batch no : 13 6
Literature Survey
Paper Title Journal details Methodology
Advantages/
Disadvantages
3.Proven Secure Tree-
Based Authenticated
Key Agreement for
Securing V2V and V2I
Communications in
VANETs
IEEE Transactions
on Mobile
Computing, vol. 21,
no. 9, pp. 3280-3297,
1 Sept. 2022, doi:
10.1109/TMC.2021.3
056712.
V2V and V2I
Communications, Full
authentication mechanism,
Light weight Cryptography
mechanism
Advantages:
The outcome is proven secure, it has low
computational and communication overhead
Disadvantages:
Scalability,
Complexity,
Infrastructure Dependence,
Single Point of Failure.
4.Batch-Assisted
Verification Scheme
for Reducing Message
Verification Delay of
the Vehicular Ad Hoc
Networks
IEEE Internet of
Things Journal, vol.
7, no. 9, pp. 8144-
8156, Sept. 2020,
doi:
10.1109/JIOT.2020.3
004811
Dedicated Short Range
Communication (DSRC)
protocol, Collaborative
authentication method.
Advantages:
It reduces verification delay and achieves fast
message verification
Disadvantages:
Publication Bias,
Rapidly Evolving Technology,
Availability of Data,
Scope and Complexity
7. 10-08-2023 Batch no : 13 7
Literature Survey
Paper Title Journal details Methodology
Advantages/
Disadvantages
5.The Delay-
Constrained and
Network-Situation-
Aware V2V2I VANET
Data Offloading Based
on the Multi-Access
Edge Computing (MEC)
Architecture,
IEEE Open Journal
of Vehicular
Technology, vol. 1,
pp. 331-347, 2020,
doi:
10.1109/OJVT.2020.
3028684.
MEC protocol Advantages:
Ensures lifetime and quality of the V2V2I path to
derive suitable offloading paths
Disadvantages:
Limited scope,
Simplified assumptions,
Lack of real-world validation
6.A novel cyberāattack
modelling and detection
in overcurrent
protection relays based
on wavelet signature
analysis.
IET Generation,
Transmission &
Distribution (2023).
Wavelet analysis,BRFD
algorithm,NDN-VANET
interconnection techniques
Advantages:
Detecting cyber attacks, reducing redundancy and
improving packet satisfaction rate and delay
Disadvantages:
It does not provide a comprehensive analysis of all
possible cyber threats and vulnerabilities in the
smart grid
8. 10-08-2023 Batch no : 13 8
Literature Survey
Paper Title Journal details Methodology
Advantages/
Disadvantages
7.A Survey of
VANET/V2X Routing
from the Perspective of
Non-Learning- and
Learning-Based
Approaches
IEEE Access, vol.
10, pp. 23022-
23050, 2022, Doi:
10.1109/ACCESS.2
022.3152767.
V2X routing protocols Advantages:
It delivers optimized packet delivery, handling
congestion and shadowing effects, reducing
network overhead
Disadvantages:
Potential limitation, Does not capture future
protocols, a lack of coverage of innovative
approaches
8.A receiver-forwarding
decision scheme based on
Bayesian for NDN-
VANET,
China
Communications,
vol. 17, no. 8, pp.
106-120, Aug. 2020,
doi:
10.23919/JCC.2020.
08.009.
Bayesian decision theory and
the BRFD (Bayesian-based
Receiver Forwarding
Decision) scheme
Advantages:
Reducing redundancy and improving packet
satisfaction rate and delay
Disadvantages:
It does not provide a comprehensive evaluation
of the proposed BRFD scheme.
9. 10-08-2023 Batch no : 13 9
Literature Survey
Paper Title Journal details Methodology
Advantages/
Disadvantages
9.Comment on Secure
and Lightweight
Conditional Privacy-
Preserving
Authentication for
Securing Traffic
Emergency Messages
in VANETs
IEEE Transactions
on Information
Forensics and
Security, vol. 18, pp.
1037-1038, 2023,
doi:
10.1109/TIFS.2021.3
066277
PPA (privacy-preserving
authentication) protocol
Advantages:
The scheme does not satisfy conditional privacy and
allows for the forging of valid signatures on
arbitrary messages
Disadvantages:
Reliability and Availability,
Privacy Concerns,
Scalability,
Security Vulnerabilities
10.R.S. State-of-the-art
approach to clustering
protocols in VANET: a
survey
Wireless Netw 26,
5307ā5336 (2020).
https://doi.org/10.10
07/s11276-020-
02392-2.
Clustering protocol,MAC
protocol
Advantages:
Improved scalability and reliability
Disadvantages:
Communication overhead,limited clustered node
percentage
10. 10-08-2023 Batch no : 13 10
Objective
ā¢ Develop an efficient privacy-preserving authentication mechanism for
VANETs.
ā¢ Implement insider attack resistance to safeguard the network from
malicious insiders.
ā¢ Ensure secure communication and protect users' identities during VANET
interactions.
ā¢ Employ advanced cryptographic techniques to enhance data confidentiality
and integrity.
ā¢ Improve overall network security to mitigate potential threats and
vulnerabilities.
12. 10-08-2023 Batch no : 13 12
Explanation
ā¢ OBU Generates Signature Key and Requests TA to join.
ā¢ TA verifies the ID sent in the Signature Key by the OBUs.
ā¢ TA applies DSRC protocol and Clustering protocol for reducing delay and
for increasing scalability.
ā¢ Further, TA Certifies the Signature Key and transmits to the OBU.
ā¢ OBU generates Signature message and transmits to the Destination Vehicle
Vd.
ā¢ Vd verifies and access the message sent from the OBU.
13. 10-08-2023 Batch no : 13 13
Software Details
Software used:
Ns-2(Network Simulator version 2)
Language used:
C++,Otcl script
Software description:
ā¢ It is a discrete event simulator for networking research.
ā¢ It provides substantial support to simulate bunch of protocols like TCP, FTP,
UDP, https and DSR
ā¢ It simulates wired and wireless network.
ā¢ It is primarily Unix based.5. Uses TCL as its scripting language.
14. 10-08-2023 Batch no : 13 14
Methodology for the Proposed work
Clustering protocol
ā¢ A clustering protocol can greatly enhance the scalability of vehicular ad hoc
networks (VANETs).
ā¢ By organizing vehicles into clusters, reducing overhead, and improving overall
network efficiency.
Dedicated Short Range Communication (DSRC) protocol
ā¢ Dedicated Short Range Communication (DSRC) plays a significant role in
decreasing communication delay in vehicular networks.
15. 10-08-2023 Batch no : 13 15
Expected outcome or Results and Discussion
ā¢ The proposed efficient privacy-preserving authentication scheme with insider
attack resistance for VANETs, leveraging a clustering protocol for better
scalability.
ā¢ The DSRC algorithm for reduced delay, represents a significant step towards
establishing secure and efficient vehicular communication systems.
ā¢ The future work based on the clustering protocol for scalability.
ā¢ The DSRC protocol for reduced delay in VANET authentication should aim to
refine and expand these approaches to meet the evolving challenges and
demands of real-world vehicular communication.
16. 10-08-2023 Batch no : 13 16
Execution Plan
ā¢ First review - Algorithm to sort out our problem statement was
discussed and finalized.
ā¢ Second review - Algorithm that is choosen will be implemented
in the software to get the expected outcome.
ā¢ Final review - Expected outcome will be attained and results
need to be verified.
17. 10-08-2023 Batch no : 13 17
References
1. L. E. Funderburg, H. Ren and I. -Y. Lee, "Pairing-Free Signatures with Insider-Attack Resistance for Vehicular
Ad-Hoc Networks (VANETs)," in IEEE Access, vol. 9, pp. 159587-159597, 2021, Doi:
10.1109/ACCESS.2021.3131189.
2. B T Rao, B. Tarakeswara, RSM Lakshmi Patibandla, and V. Lakshman Narayana. "Comparative study on security
and privacy issues in VANETs." Cloud and IoTāBased Vehicular Ad Hoc Networks (2021): 145-162.
3. L. Wei, J. Cui, H. Zhong, Y. Xu and L. Liu, "Proven Secure Tree-Based Authenticated Key Agreement for
Securing V2V and V2I Communications in VANETs," in IEEE Transactions on Mobile Computing, vol. 21, no. 9,
pp. 3280-3297, 1 Sept. 2022, Doi: 10.1109/TMC.2021.3056712.
4. F. Wu, X. Zhang, C. Zhang, X. Chen, W. Fan and Y. Liu, "Batch-Assisted Verification Scheme for Reducing
Message Verification Delay of the Vehicular Ad Hoc Networks," in IEEE Internet of Things Journal, vol. 7, no. 9,
pp. 8144-8156, Sept. 2020, Doi: 10.1109/JIOT.2020.3004811.
5. C. M. Huang and C. -F. Lai, "The Delay-Constrained and Network-Situation-Aware V2V2I VANET Data
Offloading Based on the Multi-Access Edge Computing (MEC) Architecture," in IEEE Open Journal of Vehicular
Technology, vol. 1, pp. 331-347, 2020, Doi: 10.1109/OJVT.2020.3028684
6. Yousefi kia, Mohammad, Mohsen Saniei, and Seyyed Ghodratollah Seifossadat. "A novel cyberāattack modelling
and detection in overcurrent protection relays based on wavelet signature analysis." IET Generation, Transmission
& Distribution (2023).
18. 10-08-2023 Batch no : 13 18
References
7. T. Chatterjee, R. Karmakar, G. Kaddoum, S. Chattopadhyay and S. Chakraborty, "A Survey of VANET/V2X
Routing from the Perspective of Non-Learning- and Learning-Based Approaches," in IEEE Access, vol. 10, pp.
23022-23050, 2022, Doi: 10.1109/ACCESS.2022.3152767.
8. X. Guo, Y. Chen, L. Cao, D. Zhang and Y. Jiang, "A receiver-forwarding decision scheme based on Bayesian for
NDN-VANET," in China Communications, vol. 17, no. 8, pp. 106-120, Aug. 2020, Doi:
10.23919/JCC.2020.08.009.
9. J. Zhang and Q. Zhang, "Comment on āSecure and Lightweight Conditional Privacy-Preserving Authentication for
Securing Traffic Emergency Messages in VANETsā,in IEEE Transactions on Information Forensics and Security,
vol. 18, pp. 1037-1038, 2023, Doi: 10.1109/TIFS.2021.3066277.
10. J. Zhang and Q. Zhang, "Comment on āSecure and Lightweight Conditional Privacy-Preserving Authentication for
Securing Traffic Emergency Messages in VANETsā,in IEEE Transactions on Information Forensics and Security,
vol. 18, pp. 1037-1038, 2023, Doi: 10.1109/TIFS.2021.3066277.