Karimireddy 2016
Karimireddy 2016
data integrity of the data exchanged over VANETs [7] The incorporation of IEEE 802.1 Ii security engine in the
[8] [9] [10]. This lack of proper security policies has become MAC layer serves the purpose of ensuring security to the
one of the reasons to limit the applicability of VANET in wireless communication. In the network layer, security
different applications such as traffic jams detection. provision is done through the routing protocols. The commonly
Provision of security to vehicular communications over used network routing protocol for vehicular ad-hoc network is
VANET has become one of the serious issues due to the ad-hoc on Demand Distance Vector (AODV) routing protocol.
transmission of the information over open and wireless However, AODV don't implicitly offered security polices
medium. during information routing which makes security provision very
difficult when applying this routing protocol. Being a source
In highly time critical applications, it is very important to routing technique, AODV provides overhead in data
secure the information transmitted through a VANET so that transmission. Even though solutions [10] [14] are available to
it cannot be accessed by malicious users or attackers. On the overcome the routing overhead involved in AODV,
other hand resolving the current security issues of V ANET implementation of these techniques is very difficult and costly.
have become challenging because of huge network size,
random speed of vehicles and stable node position and due to III. NEED OF VANET SECURITY
the error prone wireless links connecting vehicles in the
VANET. A security system designed for VANET is intended Among the several reasons of offering security to V ANET
to identify attackers and the malicious users present in the privacy is considered as one of the most crucial ones. Consider
network and must also ensure in providing the required level a user taking long distance trip, in this trip he is required to
of privacy to the data exchanged over MANET [11]. In move from one access point to another one which are under the
general, attackers are divided into three main categories control of different service providers. Lack of proper security
policies result in various privacy issues when a user is moved
1. First category include active and passive attackers, from one access point to other rI5l Securing driver information
2. Secondary category includes malicious and rational about their identify path they are travelling, speed is one of the
attackers, crucial requirements of a vehicle driver. In the process of
3. Third category includes insider and outsider securing their information need to restrict unauthorized users in
attackers. accessing the data. Hence there is a great need of a security
framework that provides the intended level of security to
All these different kind of attackers can launch several VANET so that private data and time critical data can be
attacks in VANET such as Black hole attack, Denial of exchanged over the wireless channel.
Service (DoS), Distributed Denial of Service (DDoS) very
easily in the network [7] [12]. IV. CRYPTOGRAPHIC ALGORITHMS
1930
This fUll-text paper was peer-reviewed and accepted to be presented at the IEEE WiSPNET 2016 conference.
method for VANET. The symmetric cryptography are private As given in figure 3, using this hybrid encryption method
key cryptography uses the same key for encrypting the data the private data will be initially encrypted using the RSA
to cipher text and decrypting it back to plain text. algorithm. The cipher text that is obtained from the RSA
Asymmetric key cryptography or public key cryptography is algorithm will be given as the input to the AES algorithms and
another possible security method that can be applied for then the encryption will take place to produce the cipher text.
VANET. This method uses two keys; private key and public
key [17]. Here private key is used for data encryption and
public key is used for data decryption. One way hash function
is one of security mechanism that uses pseudo numbers to
generate has value of the original message.
Among all private key cryptographic methods, AES Fig 3: The security framework of hybrid cryptography
algorithm is used in this framework as it offers higher level of
security through strong mathematical foundation which As given in figure 3 the private data or secret data of the
makes the attacker very difficult to decrypt the encrypted user will be secured by double encrypting it using hybrid
information. Among the different asymmetric key algorithms, cryptography. In the encryption process initially RSA algorithm
RSA is chosen for this proposed framework for VANET. The is used to encrypt the secret data the output of the RSAS
reason being choosing RSA algorithm is less resource algorithm is given as input to AES algorithm. The output of
consumption and high security level. The wide applicability AES algorithm is the cipher text which is encrypted twice using
of RSA security algorithm in various real time applications hybrid cryptography. This cipher text will be transmitted over
has also resulted in the selection of this RSA algorithm for the wireless channel to the other vehicle user in VANET. The
hybrid cryptography. The security framework that is receiver of this encrypted data can understand the message
proposed for the vehicle ad-hoc networks is aimed at contents only by decrypting it using hybrid cryptography. The
providing higher level of security by consuming less number decryption process of this proposed framework is designed as
of resources. To satisfy this aim, the combination of RSA and the reverse process of encryption. That is, the received cipher
AES algorithms is chosen for the security framework of text is decrypted first by AES algorithm and the output of AES
hybrid cryptography given in Figure 3. algorithm will be given as input to RSA algorithm for further
decryption. The resultant output of RSA algorithm will be the
1931
This fUll-text paper was peer-reviewed and accepted to be presented at the IEEE WiSPNET 2016 conference.
original message sent by the sender over the wireless TABLE I : SIMULATION PARAMETERS
channel of VANET.
The hybrid cryptography offers comparatively high level Simulation Parameter Value
of security as it is difficult for the attacker to decrypt the
information that is encrypted by two cryptographic Number of nodes 64
algorithms. As the attacker must choose the exactly the same
algorithms RSA and AES for decryption process in order to Type of the nodes Mobile nodes
decrypt the data, guessing the algorithms takes time and is
also not practically possible. Implementation of this proposed Type of the packets Data packets and
security framework is cost effective as the algorithm chosen control packets
for hybrid cryptography requires less number of
Packet size 50 bytes
computational resources. On the other hand the chosen
algorithms RSA and AES increases security level of
Type of the traffic CBR traffic
application. By the application of security framework for
vehicular ad-hoc network, every message that is either
Traffic generator BRUTE
marked as private or secret will be secured using hybrid
cryptography. Network area 500 * 500 square meters
In this section, the details of the network simulation The Simulated VANET possess 64 vehicles In the network
carried out to validate the security level and effectiveness of without any proper network topology. Three different mobility
the propose hybrid cryptographic method in securing the patterns of the vehicles are considered in designing VANET
vehicular communications between the vehicles. The design and shown in figure 4. The first mobility pattern assigns
of the vehicular ad-hoc network is done using the network random movement to each vehicle, second and the third
animator. The scenario of VANET is simulated in the form of mobility patterns offer unique speed and movement of the
ad-hoc network topology as given in Figure 4. vehicles in MANET.
1932
This fUll-text paper was peer-reviewed and accepted to be presented at the IEEE WiSPNET 2016 conference.
framework for VANET in the form of hybrid cryptography. [11]. Chammem, M. H. , Hamdi, M., & Boudriga, N. (2011, March).
Notice of Violation of IEEE Publication Principles
The effectiveness of this hybrid cryptography is validated in
Cooperative Security in Vehicular Communication Systems.
terms of performance and security in this paper using the
In Advanced Information NetworkinR and Applications (AlNA),
network simulator results. The simulation results revealed 2011 iEEE international Conference on (pp. 495-500). IEEE.
the better performance level and security level offered by [I2]. Chen, L., Tang, H., & Wang, J. (2013, June). Analysis of
hybrid cryptography than the individual cryptographic VANET security based on routing protocol information.
methods like AES. In intelliRent Control and Information ProcessinR (IClClP),
2013 Fourth international Conference on (pp. 134-138). IEEE.
[13]. Sabahi, F. (2011, July). The Security of Vehicular Adhoc
REFERENCES
Networks. InComputational IntelliRence, Communication
Systems and Networks (ClCSyN), 2011 Third International
[I]. Engoulou, R. G. , Bellarche, M., Pierre, S. , & Quintero, A Conference on (pp. 338-342). IEEE.
(2014). VANET security surveys. Computer [14].Wagan, A A. , Mughal, B. M., & Hasbullah, H. (2010, June).
Communications, 44, 1-13. VANET security framework for trusted grouping using TPM
[2]. Sharef, B. T., Alsaqour, R. A, & Ismail, M. (2014). hardware: Group formation and message dissemination.
Vehicular communication ad hoc routing protocols: A In Information TechnoloRY (ITSim), 2010 International
survey. Journal of Network and Computer Applications, 40, Symposium in (Vol. 2, pp. 607-611). IEEE.
363-396.
1933
This fUll-text paper was peer-reviewed and accepted to be presented at the IEEE WiSPNET 2016 conference.
1934