Comparative Analysis of Handover Authentication Techniques in VANETs
Vehicular ad-hoc networks (VANETs) are the primary setting for smart driving, providing road information and instantaneous vehicle-to-vehicle (V2V) or vehicle-to-infrastructure (V2I) communication between vehicles. Nevertheless, providing a VANET system with low computational costs and great serving...
Saved in:
Published in | Wireless personal communications Vol. 132; no. 4; pp. 2487 - 2506 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
New York
Springer US
01.10.2023
Springer Nature B.V |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Vehicular ad-hoc networks (VANETs) are the primary setting for smart driving, providing road information and instantaneous vehicle-to-vehicle (V2V) or vehicle-to-infrastructure (V2I) communication between vehicles. Nevertheless, providing a VANET system with low computational costs and great serving capacities is critical. However, the efficiency of the whole VANET is significantly reduced since vehicles must re-authenticate with the current roadside unit (RSU) whenever they enter a new RSU coverage region. Handover authentication for VANETs has been the subject of many recent studies, notably secure V2V or V2I communications. We examine the security of recently proposed handover authentication methods for VANETs because it is an emerging and developing field. This study attempts to get an in-depth comprehension of handover authentication mechanisms for VANETs. We have considered Son et al., Maria et al., and Xie et al.’s schemes for our study. These protocols improve compatibility and give vehicles and RSUs a more straightforward way to send messages. However, we have discovered a fundamental security flaw in these systems that leaves them open to attacks, including replay and impersonation. Additionally, to develop a trade-off between efficiency and security, we propose a comparison based on execution cost and security qualities. |
---|---|
Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ISSN: | 0929-6212 1572-834X |
DOI: | 10.1007/s11277-023-10727-3 |