CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Security of the Distributed Vehicular Broadcast Protocol DV-CAST

by Atallah Almasri, Ghassan Chaddoud
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 177 - Number 30
Year of Publication: 2020
Authors: Atallah Almasri, Ghassan Chaddoud
10.5120/ijca2020919778

Atallah Almasri, Ghassan Chaddoud . Security of the Distributed Vehicular Broadcast Protocol DV-CAST. International Journal of Computer Applications. 177, 30 ( Jan 2020), 26-31. DOI=10.5120/ijca2020919778

@article{ 10.5120/ijca2020919778,
author = { Atallah Almasri, Ghassan Chaddoud },
title = { Security of the Distributed Vehicular Broadcast Protocol DV-CAST },
journal = { International Journal of Computer Applications },
issue_date = { Jan 2020 },
volume = { 177 },
number = { 30 },
month = { Jan },
year = { 2020 },
issn = { 0975-8887 },
pages = { 26-31 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume177/number30/31091-2020919778/ },
doi = { 10.5120/ijca2020919778 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:47:19.429903+05:30
%A Atallah Almasri
%A Ghassan Chaddoud
%T Security of the Distributed Vehicular Broadcast Protocol DV-CAST
%J International Journal of Computer Applications
%@ 0975-8887
%V 177
%N 30
%P 26-31
%D 2020
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Safety applications are one of the most important applications of Vehicular Ad hoc Networks (VANETs), where safety messages are required to be disseminated in a timely manner to all vehicles within a region of interest. Broadcasting is regarded as the most suitable mechanism to disseminate safety messages, where the focus of routing protocols is on rushing message delivery. However, broadcast routing protocols such as the distributed vehicular broadcast protocol (DV-CAST) and Position-aware reliable broadcasting protocol (POCA) suffer from many types of attack such as forging and modification of safety messages, and repudiation of messages’ sources. To thwart such attacks, this paper proposes to empower DV-CAST with security mechanisms to ensure integrity, authentication, and source non-repudiation of safety messages using digital signature. Further, a position verification mechanism is used to ensure the correctness of node position information. Furthermore, privacy of vehicles is provided using temporary IDs. Simulation showed that the proposed security mechanisms do not affect the effectiveness of DV-CAST protocol.

References
  1. G. Samara, W. A. H. W. Al-Salihy, R. Sures, (2010) “Security Analysis of Vehicular Ad Hoc Networks (VANET)”, 2010 Second International Conference on Network Applications, Protocols and Services, DOI: http://10.1109/NETAPPS.2010.17
  2. J. B. Kenney, (2011) “Dedicated Short-Range Communications (DSRC) Standards in the United States”, Proceedings of the IEEE, Vol. 99, No. 7, p. 1162 – 1182, DOI: http://10.1109/JPROC.2011.2132790.
  3. S. Yousefi, M. S.M ousavi, and M. Fathy, (2006) “Vehicular Ad Hoc Networks (VANETs): Challenges and Perspectives”, 2006 6th International Conference on ITS Telecommunications: DOI: http://10.1109/ITST. 2006.289012.
  4. O. K. Tonguz, N. Wisitpongphan, and F. Bai, (2010) “DV-CAST: A Distributed Vehicular Broadcast Protocol for Vehicular Ad hoc Networks”, IEEE Wireless Communications, Vol. 17, No. 2, pp. 47 – 57.
  5. Y.-C. Hu, D. B. Johnson, and A. Perrig, (2002) “SEAD: Secure Efficient Distance Vector Routing in Mobile Wireless Ad Hoc Networks”, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications, DOI: http://10.1109/MCSA.2002.1017480.
  6. Y.-C. Hu, A. Perrig, and D. B. Johnson, (2005) “Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks”, Wireless Networks, Vol. 11, No. 1-2, pp. 21-38, DOI: https://doi.org/10.1007/s11276-004-4744-y
  7. Papadimitratos P., Z. J. Haas, “Secure Routing for Mobile Ad hoc Networks”, in Proceedings of Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), pp. 193-204, doi:10.1.1.12.2420.
  8. K. Sanzgiri, D. LaFlamme, B. Dahill, B.N. Levine, C. Shields and E.M. Belding-Royer (2005) “Authenticated Routing for Ad Hoc Networks”, IEEE Journal on Selected Areas in Communications, Vol. 23, No. 3, DOI: http://doi.org/10.1109/JSAC.2004.842547
  9. 1609.2-2016 - IEEE Standard for Wireless Access in Vehicular Environments--Security Services for Applications and Management Messages, IEEE, 2016, DOI: 10.1109/ IEEESTD.2016.7426684
  10. C. Lyu, D. Gu, Y. Zeng and P. Mohapatra, (2016) “PBA: Prediction-Based Authentication for Vehicle-to-Vehicle Communications”, IEEE Transactions on Dependable and Secure Computing, Vol. 13, No. 1, DOI: https://10.1109/TDSC.2015.2399297
  11. S. Bao1, W. Hathal, H. Cruickshank, Z. Sun, P. Asuquo and A. Lei, (2018) “A Lightweight Authentication and Privacy-Preserving Scheme for VANETs using TESLA and Bloom Filters”, ICT Express, Vol. 4, No. 4, pp. 221-227, DOI:https://doi.org/10.1016/j.icte.2017.12.001
  12. M. Sohail and L. Wang, (2018) “3VSR: Three Valued Secure Routing for Vehicular Ad Hoc Networks using Sensing Logic in Adversarial Environment”, Sensors (Basel), Vol. 18, No. 3, DOI: 10.3390/s18030856.
  13. M. Raya and J. P. Hubaux, (2007) “Securing Vehicular Ad Hoc Networks,” Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks, vol. 15, No. 1, pp. 39-68
  14. B. Mokhtara and M. Azab, (2015) “A Survey on Security in Vehicular Ad Hoc Networks”, Alexandria Engineering Journal, Vol. 54, No. 4, pp. 1115-1126, DOI: https://doi.org/ 10.1016/ j.aej.2015.07.011
  15. P. Michiardi and R. Molva, (2002) “CORE: A Collaborative Reputation Mechanism to enforce node cooperation in Mobile Ad hoc Networks”, In: Jerman-Blažič B., Klobučar T. (eds) Advanced Communications and Multimedia Security. IFIP — The International Federation for Information Processing, vol 100. Springer, Boston, MA, pp. 107-121.
  16. T. Leinmuller, E. Schoch and F. Kargl, (2006) “Position Verification Approaches for Vehicular Ad hoc Networks”, IEEE Wireless Communications, Special Issue on Inter-Vehicular Communications, Vol. 13, No. 5, pp. 15-21, DOI: 10.1109/WC-M.2006.250353
  17. The Network Simulator, http://www.isi.edu/nsnam/ns.
  18. Crypto++ Library, https://www.cryptopp.com
Index Terms

Computer Science
Information Sciences

Keywords

DV-CAST VANET safety application authentication non-repudiation privacy security mechanisms.