Comparative Analysis of Handover Authentication Techniques in VANETs

Vehicular ad-hoc networks (VANETs) are the primary setting for smart driving, providing road information and instantaneous vehicle-to-vehicle (V2V) or vehicle-to-infrastructure (V2I) communication between vehicles. Nevertheless, providing a VANET system with low computational costs and great serving...

Full description

Saved in:
Bibliographic Details
Published inWireless personal communications Vol. 132; no. 4; pp. 2487 - 2506
Main Authors Rewal, Purva, Mishra, Dheerendra
Format Journal Article
LanguageEnglish
Published New York Springer US 01.10.2023
Springer Nature B.V
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Vehicular ad-hoc networks (VANETs) are the primary setting for smart driving, providing road information and instantaneous vehicle-to-vehicle (V2V) or vehicle-to-infrastructure (V2I) communication between vehicles. Nevertheless, providing a VANET system with low computational costs and great serving capacities is critical. However, the efficiency of the whole VANET is significantly reduced since vehicles must re-authenticate with the current roadside unit (RSU) whenever they enter a new RSU coverage region. Handover authentication for VANETs has been the subject of many recent studies, notably secure V2V or V2I communications. We examine the security of recently proposed handover authentication methods for VANETs because it is an emerging and developing field. This study attempts to get an in-depth comprehension of handover authentication mechanisms for VANETs. We have considered Son et al., Maria et al., and Xie et al.’s schemes for our study. These protocols improve compatibility and give vehicles and RSUs a more straightforward way to send messages. However, we have discovered a fundamental security flaw in these systems that leaves them open to attacks, including replay and impersonation. Additionally, to develop a trade-off between efficiency and security, we propose a comparison based on execution cost and security qualities.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:0929-6212
1572-834X
DOI:10.1007/s11277-023-10727-3