3,410 research outputs found
A Secure and Efficient Authentication Technique for Vehicular Ad-Hoc Networks
Vehicular ad-hoc networks (VANETs) have been
emerging due to the recent technologies in wireless and network
communications. The most fundamental part in VANETs is to
enable message authentications between vehicles and roadside
units. Message authentication using proxy vehicles has been
proposed to reduce the computational overhead of roadside units
significantly. In this type of message authentication schemes,
proxy vehicles with verifying multiple messages at the same time
improve computational efficiency of roadside units when there
are a large number of vehicles in their coverage areas. In this
paper, first we show that the only proxy-based authentication
scheme (PBAS) presented for this goal by Liu et al. cannot achieve
authenticity of messages, and also it is not resistant against
impersonation and modification attacks and false acceptance of
batching invalid signatures. Next, we propose a new identity based
message authentication using proxy vehicles (ID-MAP).
Then, to guarantee that it can satisfy message authentication
requirement, existential unforgeability of underlying signature
against adaptively chosen-message and identity attack is proved
under Elliptic Curve Discrete Logarithm Problem in the random
oracle model. It should be highlighted that ID-MAP not only is
more efficient than PBAS since it is pairing-free and does not
use map-to-point hash functions, but also it satisfies security and
privacy requirements of vehicular ad hoc networks. Furthermore,
analysis shows that the required time to verify 3000 messages in
ID-MAP is reduced by 76% compared to that of PBAS
Secure and robust multi-constrained QoS aware routing algorithm for VANETs
Secure QoS routing algorithms are a fundamental part of wireless networks that aim to provide services with QoS and security guarantees. In Vehicular Ad hoc Networks (VANETs), vehicles perform routing functions, and at the same time act as end-systems thus routing control messages are transmitted unprotected over wireless channels. The QoS of the entire network could be degraded by an attack on the routing process, and manipulation of the routing control messages. In this paper, we propose a novel secure and reliable multi-constrained QoS aware routing algorithm for VANETs. We employ the Ant Colony Optimisation (ACO) technique to compute feasible routes in VANETs subject to multiple QoS constraints determined by the data traffic type. Moreover, we extend the VANET-oriented Evolving Graph (VoEG) model to perform plausibility checks on the exchanged routing control messages among vehicles. Simulation results show that the QoS can be guaranteed while applying security mechanisms to ensure a reliable and robust routing service
Spectrum sharing security and attacks in CRNs: a review
Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics. The element of spectrum sharing in cognitive radio is a fundament al approach in utilising free channels. Cooperatively communicating cognitive radio devices use the common control channel of the cognitive radio medium access control to achieve spectrum sharing. Thus, the common control channel and consequently spectrum sharing security are vital to ensuring security in the subsequent data communication among cognitive radio nodes. In addition to well known security problems in wireless networks, cognitive radio networks introduce new classes of security threats and challenges, such as licensed user emulation attacks in spectrum sensing and misbehaviours in the common control channel transactions, which degrade the overall network operation and performance. This review paper briefly presents the known threats and attacks in wireless networks before it looks into the concept of cognitive radio and its main functionality. The paper then mainly focuses on spectrum sharing security and its related challenges. Since spectrum sharing is enabled through usage of
the common control channel, more attention is paid to the
security of the common control channel by looking into its
security threats as well as protection and detection mechanisms. Finally, the pros and cons as well as the comparisons of different CR - specific security mechanisms are presented with some open research issues and challenges
- …