You are on page 1of 6

2022 IEEE 6th Conference on Information and Communication Technology (CICT-2022)

5G Enabled VANET Architecture Incorporating


Security and Trust Management Mechanism
Priyanka Das Sangram Ray Dipanwita Sadhukhan Mahesh Chandra Govil
NIT Sikkim, India NIT Sikkim, India NIT Sikkim, India NIT Sikkim, India
priyankadashelp@gmail.com sangram.ism@gmail.com dipanwitasadhukhan2012@gmail.com govilmc@gmail.com
2022 IEEE 6th Conference on Information and Communication Technology (CICT) | 978-1-6654-7312-5/22/$31.00 ©2022 IEEE | DOI: 10.1109/CICT56698.2022.9997842

Abstract—Recent advancements in the contemporary digital era The sophisticated services and applications of VANET invokes
leads researchers to deem and develop VANET technology fundamental functions such as-
integrated with 5th Generation (5G) network which inducts
both Vehicle to Infrastructure (V2I) and Vehicle to Vehicle • Security
(V2V) communication to amplify its requirements in Intelligent • Quality-of-Service
Transportation Systems (ITS). For procurement of seamless
incorporation of 5G and VANET, various system architecture and • Efficient Performance
issues are addressed. However, owing to mobility of the vehicles,
openness nature of the network and traditional network structure Similarly, some of these applications demands advanced se-
of VANET, security of end users and flexibility of the network curity whereas others demand for high-bandwidth and low-
are major concerns that are need of the hour to be addressed latency [3]. Thus, the inclusion of enhanced technologies
for widespread of deployment/adoption of 5G Enabled VANET. claims for 5G Enabled VANET.
Therefore, this paper provides an architecture wherein the exist-
ing security requirements as well as the 5G security standards
coexists to bear a secure 5G Enabled VANET paradigm. It also
focuses on various security issues that are needed to be considered
to enable a secure and efficient amalgamation of 5G and VANET
that lays out a trust management mechanism to improve the
overall performance of the 5G Enabled VANETs.

Index Terms—5G, Vehicle, Vehicular Adhoc NETwork (VANET),


Intelligent Transport System (ITS), Security, Trust Management Fig. 1. Key Features of 5G Enabled VANET.

The deployment of transformed 5G Enabled VANET can not


only improve the internet broadband service, but also it will
I. I NTRODUCTION
enable several new services, applications and use cases. The
data transmission rate of 5G network is upto 10gbps (giga bits
V EHICULAR AD-HOC NETWORK (VANET) is a pro-
gressive technology which is receiving limelight in both
academia and industry as it is foreknown and envisioned to
per second) and provides ultra low-latency of 0.001s (second)
or even less. 5G Enabled VANET permits high mobility and
allows bandwidth of 1000x per unit area [4]. The key features
ease prevailing transportation issues and will open the door
of 5G Enabled VANET are depicted in Fig. 1.
for ample spectrum of applications in Intelligent Transport
System (ITS). Primarily, VANET is interpreted and virtualized The 5G Enabled VANET ensures to provide end-to-end se-
as a sensor network where the vehicles functions as the curity for all the vehicles connected to the network which in-
sensor nodes. These sensor nodes are not confined to a certain cludes core-network security, access vehicle security, terminal-
geographical area as the nodes are nomadic in nature. Each security. However, deployment of 5G Enabled VANETs has
of the vehicular nodes (sensors) of the network act as routers several challenges as mentioned below [5] -
which communicate with other vehicular nodes that are within
their radio coverage via wireless communication optimizing • Higher Computational costs.
the routing of vehicular traffic [1]. Although, VANET enables • Low Tolerance for Error occurrence.
enhanced characteristics, services and applications, inevitably • The unbounded size of the network might lead to con-
the network incurs several security threats, risks and vulnera- gestion and collision issues.
bilities. The security protocols of VANET must assure that
The vehicular nodes that are receiving data are needed to trust
the cardinal security functionalities such as confidentiality,
the sender. Thus, a trust management trade-off is vital for
availability, integrity, authentication and non-repudiation are
establishing the vehicular nodes’ anonymity.
achieved [2]. Additionally, privacy of the driver’s information
must be guaranteed so that no adversary entity get access of Trust in 5G Enabled VANET is dynamic and subjective in
the data. nature where trust refers to a set of relationships among the

978-1-6654-7312-5/22/$31.00 ©2022 IEEE

Authorized licensed use limited to: UNIVERSITAS GADJAH MADA. Downloaded on February 20,2023 at 06:32:53 UTC from IEEE Xplore. Restrictions apply.
2022 IEEE 6th Conference on Information and Communication Technology (CICT-2022)

participating entities who perform the operations in the 5G II. LITERATURE REVIEW
Enabled VANET. Trust management plays a significant role There are several studies in reference to VANET, 5th Genera-
in resisting the 5G Enabled VANET from possible active and tion communication in VANET paradigm and Trust Manage-
passive attacks. The vehicular nodes involved in resisting the ment mechanism of VANET that has been published over the
network from such attacks must set-up mutual trust among years [7–17]. In this section, we review some of these existing
themselves to operate smoothly. It is one of the primary chal- literature of last decade.
lenge as a recipient vehicular node needs to guarantee user-
authenticity and trust-ability of the received messages before In the year 2012, Chim et al. [7] introduced a navigating
replying to them [6]. It is assumed that each vehicular node scheme for the VANET infrastructure which used the informa-
is furnished with a trust mechanism to take such decisions. tion collected from the vehicles in the road to direct the drivers
to desirable destinations in a distributed manner with context
There are two types of trust management mechanisms. They to real time scenario. To achieve a sound navigation system a
are- tamper-proof device is incorporated in each of the vehicles
which sends the request for master-secret. Thus, this trait
• Trust management mechanisms based on static infrastruc- might result in critical security issues in case if the tamper-
ture. proof device is compromised. Furthermore, the scheme is not
• Trust management mechanisms based on dynamic infras- defensible against insider attack. Later in the year 2013, Cho
tructure. et al. [10] proposed another navigation scheme for VANET
framework on the basis of the concept of multi-signature
As mentioned above, 5G Enabled VANET is dynamic in
for mutual authentication and identity-based cryptography
nature. Thus, the trust management mechanism established for
rather than the use of master-secret used in the scheme [7].
the same is based on dynamic infrastructure.
The authors of [10] claimed that their scheme achieves the
security functionalities and is efficient in nature. However,
A. Motivation and Contribution data consistency feature is not fabricated in the scheme [10]
After an extensive survey, it is determined that the existing which is one of the necessary feature that assures the message
VANET schemes are mostly deployed in context of 3G/4G legitimacy.
communication technology. But in the present time-frame, the In view of the disadvantages of existing scheme in the year
promising advancements employed due to 5G communication 2014, Li et al. [11] presented another scheme which ensures to
technology is a hot topic. This motivate us to propose a attain Conditional-Privacy-Preservation and Non-Repudiation
5G Enabled approach for existing VANET architecture with for the network. The authors of [11] stated that message
sound and proficient features. Additionally, trust establishment legitimacy is preserved unlike the scheme [10]. Unfortunately,
among the vehicles in the 5G Enabled VANET is also a crucial in the scheme [11] the enormous excessive load of traffic does
aspect and the same is highlighted in the paper. not fulfill the conditions of a dynamic VANET. Therefore,
The significant contributions of the paper are mentioned as in 2015 Zhao et al. [12] proposed a scheme that achieves
follows: Privacy-Preservation utilizing blind certificates. To procure the
blind certificate the drivers should register to a local trusted-
• To overcome the limitations of 3G/4G communication authority (LTAs) which is later acknowledged by the Road
technologies in VANET, we have coined an architecture Side Unit (RSU). Thus, the real identity of the drivers are
based on 5G communication technology which ensures preserved.
to cover wide range of area with maximum bandwidth However, as the 4th Industrial Revolution (Industry 4.0) was
and minimum latency. coined in the year 2016 which focused on merging the
• Trust is established among the vehicles of the network physical and digital world in such a way that might open
(5G Enabled VANET) that fabricates to improve the doors for potential advancements. Hence, keeping in view
performance of authentication mechanism. of the recent advancements of Industry 4.0 existing VANET
communication framework evolved into 5G Enabled VANET
B. Organization of the Paper
infrastructure with significant features such as new signal-
The rest of the paper is organized as per the following fashion: processing models, network-virtualization, etc. Additionally,
Section II outlines the related Literature of last decade to 5G Enabled VANET was expected to be adequate for better
show the several technical shortcomings and advances of the performance in the essence of data traffic. Therefore, in the
existing schemes. Section III depicts the proposed approach same year Yu et al. [13] presented a 5G Enabled VANET
to enable 5G for existing VANET architecture. Similarly, to enhance the network-capacity and computing-capability of
Section IV describes the Trust management mechanism for the system with efficient services in which Device-to-Device
the proposed 5G Enabled VANET set-up. Further, Section communication is one of the notable technology supported
V shows the Security Analysis of the Trust incorporated 5G by 5G Enabled VANET. Unfortunately, one of challenge of
Enabled VANET. Lastly, VI gives the closing of the paper. the scheme [13] is interference between various Device-to-

Authorized licensed use limited to: UNIVERSITAS GADJAH MADA. Downloaded on February 20,2023 at 06:32:53 UTC from IEEE Xplore. Restrictions apply.
2022 IEEE 6th Conference on Information and Communication Technology (CICT-2022)

Device (D2D) (here device means vehicles) communications mechanism for 5G Enabled VANET architecture.
as well as between Device-to-Base-Station and D2D commu-
nications. As a result, in 2017, Dong et al. [14] proposed III. PROPOSED APPROACH TO ENABLE 5G FOR
another architecture entitled as 5G Enabled Smart Collabora- EXISTING VANET ARCHITECTURE
tive Vehicular Network (SCVN) for high density urban traffic 5G Enabled VANET paradigm is a web of interconnected
and high speed railway. According to the authors of [14], vehicles which connect all the aspect of life to the network-
the proposed architecture solves issues such as bandwidth- system at the time of driving on the roadways. The evolution of
aggregation, intensive frequent-handover. Likewise, in the year 5G Enabled VANET enables multiple vehicles to communicate
2018 Khan et al. [15] also proposed an 5G architecture via which they can transmit and exchange vital information
to assure proper resource-utilization and extensible network- ensuring that the required advanced features (as mentioned
management for futuristic Intelligent Transportation Systems earlier) are satisfied.
(ITS). The holistic architecture was proposed to circumvent
The proposed approach to enabled 5G for existing Vehicular
frequent-handovers among the devices (vehicles) and Road
Ad-hoc Network is sketched in Fig. 2. The detailed descrip-
Side Unit (RSU) in network. The authors of [15] claimed
tion of the participating entities which plays a vital role in
to provide features such as improved throughput, minimum
communication/cooperation as well as coordination among all
transmission-delay and reduced control-overhead. But because
autonomous vehicles of the architecture are described below.
of the highly flexible nature of 5G Enabled VANET, Yang et
al. [16] stated it might be the pivotal point between cyber- There are five set of entities in the 5G Enabled VANET
space and real-space. Cyber-attacks in cyber-space may cause framework which are Road Side Unit (RSU), On Board Unit
feasible damage to real-space in the network such as privacy- (OBU) embedded on each of the vehicle, Trusted Authority
leakage, traffic-congestion, etc. Hence, [16] developed a com- (TA), Fixed 5G Base-Station and Global Reputation Center
munication technology for 5G Enabled VANET framework (GRC).
deploying Dedicated Short Range Communication (DSRC)
and cellular-parallel-hybrid technologies for network. How- 1) Road Side Unit (RSU): In the 5G Enabled VANET
ever, the security analysis of [16] is not exemplified to reveal there exists a stationary entity named as RSU which are
its proficiency. Hence, in the year 2020 Wang [17] introduced placed alongside the roads that are connected directly to
another scheme for 5G Enabled VANET to establish a hybrid the 5G Base-station. Additionally, the RSUs acts as the
Device-to-Device (Device here means the vehicles) mutual backbone that ensures to send and receive data among
authentication mechanism in which grouping signature based the interconnected vehicles of the 5G Enabled VANET
algorithm is used for authentication. The authors of [17] framework.
reveals that performing the security analysis it is shown that 2) On Board Unit (OBU): The OBU is incorporated
their scheme [17] is efficient in nature and preserves privacy. to each of the vehicles in the network. Each OBU
embedded vehicle can communicate with other OBU
In addition to it, establishing trust in 5G Enabled VANET is embedded vehicle and also with the RSU.
significant requirement to prevent potential malicious attacks 3) Trusted Authority (TA): TA has outstanding storage
during the mutual-authentication phase. Trust-establishment in and computing capacity. Two primary functions of TA
5G Enabled VANET ensures security features such as user- are mentioned as follows:
anonymity, defensible against replay attack, etc. • Registration of Vehicles: It is essential for all
the vehicles to register itself to the local TA be-
Thus, in the year 2021, Li et al. [8] proposed a novel
fore connecting to the 5G Base-Station. The local
distributed trust-establishment model for VANET with im-
TA records the fundamental information of each
plementation of block-chain technology (ensures consistency
vehicle. Further, the local TA stores the security
of trust among the vehicles across various regions) along
specifications, a pseudo-identity as well as a private
with the combination supremacy of active-detection (enables
key into the OBU embedded vehicle. To defend
to filter malicious vehicles in the network). The authors of
against adversarial attacks, this TA will create a
[8] claims that their scheme holds a advantageous feature,
new pseudo-identity and a private key for the valid
that is to detect malicious vehicles. Similarly, very recently
vehicle which has applied for updating.
in the 2022 Gayathri et al. [9] also coined a probabilistic
• Reputation management: The TA is also responsi-
as well as deterministic based trust-establishment scheme
ble to supervise the reputation score of each vehicle
for VANET in which they determine the legitimacy of the
established on basis of the feedback given from
messages exchanged on the basis of the trust-level. But both
other vehicles. The vehicles only which has higher
the schemes [8, 9] highlights on the VANET paradigm rather
reputation score could receive the Credit Reference
than 5G Enabled VANET which is need of the hour to realize
(CR) that is valid for a time-period [18].
the ITS.
4) Fixed 5G Base-Station: The fixed 5G Base-Station
Hence, our paper focuses on two primary features which are that are located at hotspots or intersection points can
ensuring security as well as establishing trust management communicate with the stationary RSUs placed beside

Authorized licensed use limited to: UNIVERSITAS GADJAH MADA. Downloaded on February 20,2023 at 06:32:53 UTC from IEEE Xplore. Restrictions apply.
2022 IEEE 6th Conference on Information and Communication Technology (CICT-2022)

Fig. 2. Propose approach to enable 5G for existing VANET Architecture.

Accordingly, these communication can be divided into two


sub-groups namely, Vehicle to Vehicle communication and
Vehicle to Infrastructure communication [19].

• Vehicle to Vehicle Communication (V2V): In Vehicle


to Vehicle communication, each of the vehicle bears
information with reference to the movements of all the
other neighbour vehicles. Data are aggregated from all the
vehicles and broadcasted in the network. Delay might not
be a concern but security of the vehicles and securing
of the exchanged messages among those vehicles as
well as their connectivity is a primary concern factor as
these criterion depends on the neighbour vehicles. Thus,
V2V assures fast-association and minimum latency for
communication.
• Vehicle to Infrastructure Communication (V2I): In
the wireless V2I architecture also named as Vehicle to
RSU (V2R), vehicle communicates with the Road Side
Unit (RSU). The RSUs broadcasts warnings of upcoming
Fig. 3. Zoom-in view of coverage area of RSU 1 changes in the road such as traffic signals, limitations
in speed, etc. V2I uses mechanisms such as Global
Positioning System (GPS), WiMax for scattering the
the road. It is assumed that 5G Base-Stations are able to information from the RSU.
furnish better network-coverage with higher bandwidth • Hybrid: Hybrid communication is a combination of
which relay the exchanged messages among V2V as well both subsets V2V and V2I paradigm. This architecture
as vehicles to TA. ensures better performance as compared to the above two
5) Global Reputation Center (GRC): The database of mentioned communication mechanisms.
GRC stores all the vehicle’s reputation information for-
warded by the TA. The primary function is to facilitate IV. TRUST MANAGEMENT IN 5G ENABLED VANET
the TA of other areas to procure the reputation-scores of In earlier communication mechanisms such as 2G/ 3G/ 4G the
recently joined-vehicles to the network. potential adversarial attacks that conspired are illegal-cloning,

Authorized licensed use limited to: UNIVERSITAS GADJAH MADA. Downloaded on February 20,2023 at 06:32:53 UTC from IEEE Xplore. Restrictions apply.
2022 IEEE 6th Conference on Information and Communication Technology (CICT-2022)

spamming messages, broadcasting faulty messages, etc. But in


5G Enabled VANET, privacy preservation is a prime concern
[18]. Therefore, a Transitive Trust-Extended Authentication
mechanism is proposed that ensures the location privacy of
the vehicles in the 5G Enabled VANET.
The proposed scheme consists of seven phases which are :
1) Setup Phase
2) Login Phase
3) General Authentication Phase
4) Password Change Phase
5) Transitive Trust-Extended Authentication Phase
6) Key Updating Phase
7) Key Revocation Phase

Fig. 5. Flow-chart of Transitive Trust Relationship (TTR) operation of 5G


enabled VANET

Therefore, the proposed scheme assures location privacy in 5G


Enabled VANET.

V. SECURITY ANALYSIS OF THE TRUST


INCORPORATED 5G ENABLED VANET
Security functionalities satisfied by the trust embedded 5G
Fig. 4. Transitive Trust Relationship in 5G Enabled VANET Enabled VANET are [24]:

While the Step 1-4,6-7 are identical to the existing literature 1) Confidentiality [25]: It is a set of rules that restricts to
[20, 21], our contribution lies in the Step 5, i.e Transitive limited access on specific resources. Encrypting the ex-
Trust-Extended Authentication Phase [22] that is described in changed messages among the OBUs and RSUs ensures
details as follows. confidentiality in the 5G Enabled VANET architecture.
Initially, let us assume three vehicles in the 5G Enabled 2) Integrity [26]: Integrity among the OBUS and RSUs are
VANET as depicted in Fig. 4. where the vehicles are sub- ensured in 5G Enabled VANET infrastructure by signing
divided into three subsets: Law Executor (LE), Mistrustful the messages exchanged among the entities (RSUs and
Vehicle (MV) and Trustful Vehicle (TV). Authorized public OBUs).
bus or police van can be assumed as LE which is trustful per- 3) Reliability: Bulk of data is transmitted across the 5G
manently that acts as a mobile Authentication Server (AS)[20, Enabled VANET infrastructure that might be conflicting
21]. and duplicated in nature which is a major concern to
maintain the reliability. Thus, incorporating trust among
The other two OBU incorporated vehicles are mistrustful. the vehicle plays a significant role to uphold the relia-
The below mention steps depicts how all the vehicles in the bility.
network are authenticated and upgraded from MV to TV by 4) Anonymity: Under the proposed approach during the lo-
establishing the trust. gin phase, the original ID of any user is transformed into
1) Firstly, the first MV, OBUi upgrades to be a trustful an pseudo ID which is based on random number/nonce.
vehicle once it is authenticated by it nearest LE. Hence, a malicious attacker is unable to identify the orig-
2) After, OBUi is authenticated successfully it obtains the inal ID without the knowledge of random number/nonce
parameters and acts as a interim LE which can further selected by OBU.
authenticate the other mistrustful vehicle, OBUj 5) Privacy of location of the vehicles: In case, a malicious
attacker intercepts the messages of certain time-period,
Thus, trust is established among all the vehicle in the network it is nearly impossible to track the actual location of
by performing the TTR operations as depicted in Fig. 5. Since, the vehicle since the dynamic-identification anonymity
all the vehicles bears a Transitive Trust Relationship with all feature is used. As well as grouping-characteristic [23]
the other vehicles in the network, they can be grouped together as mentioned earlier which is used during the TTR
by following the group characteristic as shown in [23] to operations also plays a vital role to preserve the location
enhance the location privacy of the vehicles. privacy of the vehicular nodes.

Authorized licensed use limited to: UNIVERSITAS GADJAH MADA. Downloaded on February 20,2023 at 06:32:53 UTC from IEEE Xplore. Restrictions apply.
2022 IEEE 6th Conference on Information and Communication Technology (CICT-2022)

6) Mutual authentication to rule out spoofing attack: [8] Fuliang Li et al. “ATM: An Active-Detection Trust Mechanism for VANETs
Based on Blockchain”. In: IEEE Transactions on Vehicular Technology 70.5
During the authentication procedure, LE to verifies (2021), pp. 4011–4021. DOI: 10.1109/TVT.2021.3050007.
whether the OBU is legitimate and vice-versa, if so [9] M Gayathri and C Gomathy. “An Overview of Security Services and Trust-
Based Authentication Schemes in VANET”. In: Micro-Electronics and Telecom-
spoofing attack is ruled out. munication Engineering (2022), pp. 193–205.
7) Resists replay attack: If an intruder tries to intercept the [10] Wonjun Cho et al. “An Improved Privacy-Preserving Navigation Protocol in
{VANET} s.” In: J. Wirel. Mob. Networks Ubiquitous Comput. Dependable
exchanged messages and impersonates as a legal OBU Appl. 4.4 (2013), pp. 80–92.
by replaying those transmitted messages, the LE wont [11] Jie Li, Huang Lu, and Mohsen Guizani. “ACPN: A novel authentication frame-
work with conditional privacy-preservation and non-repudiation for VANETs”.
permit the request as the replayed messages’ nonce will In: IEEE transactions on parallel and distributed systems 26.4 (2014), pp. 938–
be different. Additionally, the OBU also rechecks the 948.
[12] Zhen Zhao et al. “An efficient revocable group signature scheme in vehicular
random number transmitted by the LE. ad hoc networks”. In: KSII Transactions on Internet and Information Systems
8) Faster error detection: During the login phase, the (TIIS) 9.10 (2015), pp. 4250–4267.
[13] Rong Yu et al. “Optimal resource sharing in 5G-enabled vehicular networks: A
OBU shall immediately identify an error if an adversary matrix game approach”. In: IEEE Transactions on Vehicular Technology 65.10
gives a wrong user-ID and password. (2016), pp. 7844–7856.
[14] Ping Dong et al. “Enhancing vehicular communication using 5G-enabled smart
collaborative networking”. In: IEEE Wireless Communications 24.6 (2017),
Thus, we have analysed that the proposed approach of in- pp. 72–79.
clusion of 5G technology to existing VANET architecture [15] Ammara Anjum Khan, Mehran Abolhasan, and Wei Ni. “5G next generation
VANETs using SDN and fog computing framework”. In: 2018 15th IEEE
out performs with wider coverage area in comparison to the Annual Consumer Communications Networking Conference (CCNC). 2018,
existing 3G/4G vehicular infrastructure. In addition to it, the pp. 1–6. DOI: 10.1109/CCNC.2018.8319192.
[16] Yang Yang and Kun Hua. “Emerging technologies for 5G-enabled vehicular
conclave of key features such as high-bandwidth, low latency, networks”. In: IEEE Access 7 (2019), pp. 181117–181141.
etc. of 5G technology to the pre-existing VANET framework is [17] Peng Wang et al. “HDMA: hybrid D2D message authentication scheme for 5G-
enabled VANETs”. In: IEEE Transactions on Intelligent Transportation Systems
significant trait of this manuscript. Another remarkable feature 22.8 (2020), pp. 5071–5080.
of this proposed approach is ensuring the privacy of location [18] Jie Cui et al. “RSMA: Reputation system-based lightweight message authenti-
cation framework and protocol for 5G-enabled vehicular networks”. In: IEEE
of the vehicular nodes due to the incorporation of Transitive Internet of Things Journal 6.4 (2019), pp. 6417–6428.
Trust Relationships in 5G Enabled VANET. [19] Muhammad Naeem Tahir, Pekka Leviäkangas, and Marcos Katz. “Connected
Vehicles: V2V and V2I Road Weather and Traffic Communication Using
VI. CONCLUSION Cellular Technologies”. In: Sensors 22.3 (2022), p. 1142.
[20] Venkatatamangarao Nampally and Raghavendra Sharma. “Achieving Fast Com-
In ITS scenario, privacy preservation of interconnected ve- munication Mechanism by Using Transitive Trust Relationships for VANET”.
In: (2017).
hicular nodes of 5G Enabled VANET is a dominant aspect [21] Saru Kumari et al. “An enhanced and secure trust-extended authentication
for transmitting vital information among V2V as well as mechanism for vehicular ad-hoc networks”. In: Security and Communication
Networks 9.17 (2016), pp. 4255–4271.
V2I. In this paper, TTR conception is utilized to ensure the [22] Ming-Chin Chuang and Jeng-Farn Lee. “TEAM: Trust-extended authentication
privacy preservation of the location of the vehicles in 5G mechanism for vehicular ad hoc networks”. In: IEEE systems journal 8.3 (2013),
pp. 749–758.
Enabled VANET. From the security analysis it is revealed that [23] Krishna Sampigethaya et al. “AMOEBA: Robust location privacy scheme for
security objectives such as anonymity, mutual authentication VANET”. In: IEEE Journal on Selected Areas in communications 25.8 (2007),
pp. 1569–1589.
to rule out spoofing attack, faster error detection, etc. are [24] Richard Gilles Engoulou et al. “VANET security surveys”. In: Computer
preserved. In future, trust incorporated 5G Enabled VANET Communications 44 (2014), pp. 1–13.
[25] Dipanwita Sadhukhan and Sangram Ray. “Cryptanalysis of an elliptic curve
shall be implemented following all the aforementioned phases cryptography based lightweight authentication scheme for smart grid communi-
mentioned in Section IV and exemplifying it with use case cation”. In: 2018 4th international conference on recent advances in information
technology (RAIT). IEEE. 2018, pp. 1–6.
scenario. [26] Uddalak Chatterjee et al. “An ECC-based lightweight remote user authentica-
tion and key management scheme for IoT communication in context of fog
ACKNOWLEDGMENT computing”. In: Computing (2022), pp. 1–37.

This work is supported by Ministry of Education, Government


of India.
R EFERENCES
[1] Ikram Ali, Alzubair Hassan, and Fagen Li. “Authentication and privacy schemes
for vehicular ad hoc networks (VANETs): A survey”. In: Vehicular Communi-
cations 16 (2019), pp. 45–61.
[2] Zeinab El-Rewini et al. “Cybersecurity challenges in vehicular communica-
tions”. In: Vehicular Communications 23 (2020), p. 100214.
[3] Annual IEEE Computer Conference et al. International Conference on Con-
sumer Electronics, Communications and Networks (CECNet), 2011 XiaNning,
China, 16-18 April 2011. ISBN: 9781612844596.
[4] Dakshnamoorthy Manivannan, Shafika Showkat Moni, and Sherali Zeadally.
“Secure authentication and privacy-preserving techniques in Vehicular Ad-hoc
NETworks (VANETs)”. In: Vehicular Communications 25 (2020), p. 100247.
[5] Palak Bagga, Ashok Kumar Das, and Joel JPC Rodrigues. “Bilinear pairing-
based access control and key agreement scheme for smart transportation”. In:
Cyber Security and Applications 1 (2023), p. 100001.
[6] M Shahid Anwer and Chris Guy. “A survey of VANET technologies”. In:
Journal of Emerging Trends in Computing and Information Sciences 5.9 (2014),
pp. 661–671.
[7] Tat Wing Chim et al. “VSPN: VANET-based secure and privacy-preserving
navigation”. In: IEEE transactions on computers 63.2 (2012), pp. 510–524.

Authorized licensed use limited to: UNIVERSITAS GADJAH MADA. Downloaded on February 20,2023 at 06:32:53 UTC from IEEE Xplore. Restrictions apply.

You might also like