You are on page 1of 6

IJIRST International Journal for Innovative Research in Science & Technology| Volume 3 | Issue 02 | July 2016

ISSN (online): 2349-6010

Secure and Privacy Preserving Message


Authentication with Chameleon Hashing using
Proxy Vehicles in VANETS
Athira P J
M. Tech. Student
Department of Computer Science & Engineering
NCERC, Pampady Thrissur, Kerala

Dr. S Dhanabal
Associate Professor
Department of Computer Science & Engineering
NCERC, Pampady Thrissur, Kerala

Mr. Naveen Raja S M


Assistant Professor
Department of Computer Science & Engineering
NCERC, Pampady Thrissur, Kerala

Abstract
Several services and applications are there in daily life which requires preserving privacy and data security in communications.
In Vehicular Ad-hoc Networks to improve the driving comfort and safety of information, the messages are broadcasted regularly.
Because of broadcasting of messages without the security and privacy guarantees, the messages can be easily retrieved by the
third party. Only the certificate authority should be able to recover vehicles real identity when the vehicles are in a dispute
event. To overcome this issue chameleon hashing based privacy preserving method is used. This scheme uses an elliptic curve
based light weight privacy preserving protocol that exploits dynamic public keys to improve the security and efficiency of
VANET communications. Although it is one of the best schemes, it fails to deal with certain issues. One of the main
disadvantages is that it is difficult for a single Road Side Unit (RSU) to verify each vehicles signature sequentially when a large
number of vehicles emerge under the coverage area of an RSU. To reduce this computational difficulty, the proposed scheme
uses proxy vehicles which are acting as an intermediate between RSU and vehicles. Proxy vehicles are used to authenticate
multiple messages from the requested users using a verification function at the same time. The proposed system improves the
total security of the existing system by adding separate secure and private authentication on messages so that the third party
cannot access the messages and modify it.
Keywords: Elliptic Curve Based Chameleon Hashing, Privacy Preservation, Proxy Authentication, Proxy Vehicle,
Security and Privacy, Vehicular Ad-Hoc Networks
_______________________________________________________________________________________________________
I.

INTRODUCTION

Numbers of techniques are there in VEHICULAR AD-HOC network which make the comfort and safety of vehicles and for the
drivers also. VANET encloses the communication between different entities such as RSU, known as which is capable of
exchanging information or certain messages between OBU (On Board Unit normally inside vehicles). Other than RSU's and
OBUs, a Certificate Authority (CA) which is capable of handover the certificates for the units which are in transmission of
messages. VANET communication empowers vehicles in an unprecedented way.V2R enables the vehicle to become itself a
source of traffic information. Most of the research work in the symmetric cryptography area was for security in networks. It deals
with the chameleon hashing scheme using Elliptic curve cryptography. Fig (1) shows the entities in a vehicular ad-hoc network.
Main classification of VANET will be in to three groups such as Vehicles, Road Sid Unit and Authorities. Vehicles are capable
in transmission of messages depending up on each users interest. It will also check the data that are received from each vehicle
or road side unit and verifies those messages to prove trustworthy of data.

Fig. 1: VANET Architecture

All rights reserved by www.ijirst.org

149

Secure and Privacy Preserving Message Authentication with Chameleon Hashing using Proxy Vehicles in VANETS
(IJIRST/ Volume 3 / Issue 02/ 027)

The above figure shows a Service Provider (SP) which is capable of issuing various levels of services that are needed by the
users for the communication. In vehicle to RSU communication each driver registers to their corresponding nearby RSU for the
session initialization. After the request made by each driver has been received by the corresponding RSU, RSU will verify each
request with the related stored information in its database and verifies if the requested vehicle is a real one or a malicious vehicle.
After the correct verification made by the Road Side Unit it acknowledges each vehicles (On Board Unit) and the session starts.
II. RELATED WORKS
There are many studies which mainly focuses on the security of vehicles by treating their location information and privacy of
data etc. A basic idea is by using pseudonyms [3]. In this paper after each transmission of messages each vehicles can update its
pseudonym so that to break the linkability of the locations. The pseudonym scheme has been enhanced by Hubaux and Raya[4].
It describes various vulnerabilities in security and challenges in VANET. If VANET entities use same ID whenever transmitting
any packet, a third party could retrieve their data and can build a profile of their corresponding locations which affects the users
privacy. Raya et al. [5] propose a scheme, in which each OBU stores a set of anonymous public/private keys to sign traffic
messages so as to avoid being tracked by periodically changing private keys. This method allows anonymous message
The ABAKA protocol [6] uses ECC at the Road Side Units for the authentication of requests from more than one vehicle
together. ABAKA uses a tamper-proof device which is to be installed in each vehicle and requires service providers to generate
session keys that will be used in their connection with vehicles.
III. CHAMELEON BASED SYSTEM
Chameleon hashing for secure transmissions in vehicular communications [1], uses a Chameleon hashing scheme which provide
security for data transmission using signatures is defined. Those signatures which are created based on chameleon hashing
provide the properties of non-repudiation for the signed messages. However, the chameleon signatures initial construction
suffers from the problem of key exposure of chameleon hashing. This creates a strong difficulty at the receiver side to compute
hash collisions, partially undermining the concept of non-transferability. To avoid this fixed public key uses Elliptic curve
cryptography is used for encryption of messages. Elliptic curves was used for cryptographic transmissions (Miller, 1986) based
on the difficulty of elliptic curve discrete logarithm problem (ECDLP).
IV. ECC ALGORITHM
The equation of an elliptic curve is given as,
Few basic parameters for an elliptic curve used are,
E -> Elliptic Curve
P -> Point on the curve, prime number
G -> The generator Point
a &b ->Define the curve
n -> Maximum limit ( This should be a prime number )
h -> Cofactor
Elliptic curve cryptography mainly concentrating in the generation of public key from the private key and the generator point.
The equation to find the public key is
Public Key = Private Key + Generator Point

It leads to define the Diffie-Hellman key exchange protocol. It is an important protocol in cryptography for exchanging the
key. It focuses on elliptic curve logarithm problem. In this a scalar multiplication has been used which a combination of repeated
addition and point doubling. Repeated addition can be defined as
Q = KP i.e.
Q = P + P + P P} K times
And the point doubling is defined by,
P + P = R = 2P
Where,
2P = 3 xp + a / 2yp

All rights reserved by www.ijirst.org

150

Secure and Privacy Preserving Message Authentication with Chameleon Hashing using Proxy Vehicles in VANETS
(IJIRST/ Volume 3 / Issue 02/ 027)

V. ENCRYPTION AND DECRYPTION OF MESSAGES


Encryption method using Chameleon hashing based on signatures will work as follows. Chameleon hashing avoids encryption
and decryption by using fixed public keys. It automatically generates different keys for each session from an Abelian group Gp
and assigns to Road Side unit as well as On Board Unit. Each entity used the public keys which are allocated to them by the
Certificate Authority to transmitting the messages.
Initially, the prover generates its chameleon C from Gp as secret information to the prover. Once the prover authenticated by
the verifier, it generates a new private key which is chosen randomly from the curve and then obtains its corresponding public
key. For each session a nonce is created that will be different to sessions. At the verification side, the received information (C, m,
y, nonce) is used by the prover to authenticate by checking if CH ( m, y, nonce) = C holds, the verifier passes the authentication
for the prover. Otherwise, the prover will be considered illegal. For a valid user, the authentication is always successful

Fig. 2: Registration Phase of OBU and RSU with CA

In chameleon hashing based privacy preservation each Road side unit as well as On board units will register to Certificate
authority before the session starts. The whole communication system maintains transmission through wireless channels. In
registration phase each OBU generates a random number S as its secret key, and also sends its initial Chameleon and the real
identity as well as ID to the Certificate authority, CA. On receiving the request based on the legitimacy of user and verification
of the request, CA produces certificate to the OBU by signing using private key. The information (CER, ID) will be then
transmitted to the requested OBU through a secure channel. Similarly certificate for the RSU also produced through these steps.
After the registration and receiving of certificate, the session initiates for transmission
VI. PROXY BASED SYSTEM
Vehicular ad hoc networks (VANETs) uses public key infrastructure for the verification of messages and the identity of message
senders in authentication. Most of the schemes which are existing mainly focus on the security and privacy of VANET
information in communication. However, these Chameleon based authentication schemes is a good scheme it may not work well
in certain scenarios. In chameleon based authentication scheme it is difficult for a roadside unit (RSU) to verify each vehicles
request sequentially when a large number of vehicles comes under the coverage areas of an RSU in peak traffic time. To reduce
the computational overhead in RSUs, a proxy based authentication scheme using distributed computing has been proposed. In
the PBAS, proxy vehicles are used to authenticate multiple messages at the same time. In addition, the RSU can able to
independently verify the outputs from the proxy vehicles than that of verifying separate requests from each OBU.

Fig. 3: Proxy based authentication

In this proposed scheme, each proxy vehicle plays an important role, which is adopted to authenticate multiple messages. It
consists the whole execution in total four steps
System Initialization Phase
Message Signing Phase
Selection of Proxy Vehicles and Communication
Communication between Proxy and RSU

All rights reserved by www.ijirst.org

151

Secure and Privacy Preserving Message Authentication with Chameleon Hashing using Proxy Vehicles in VANETS
(IJIRST/ Volume 3 / Issue 02/ 027)

In the system initialization phase each entities has to register with their respective keys, chameleon as well as ID to the
Certificate Authority. According to the request CA will generate certificate for the requested entities. In message signing phase
proxy vehicles signs each messages and send as a single message to the road side unit. Proxy vehicles can efficiently authenticate
multiple messages sent from the other vehicles and then output the result of their authentication process and send it to the entities
that have relatively low computing capabilities. First of all, proposing an efficient proxy vehicle selection strategy. Verify that
vehicles have extra computation resources to serve for the others.
For selecting the Proxy the energy conservation in each node has been taken. Each node is having its on energy in computing.
Initially a unique energy has been given to all the nodes which are participating in the process. As soon as the execution starts the
energy will vary according to the communication between the nodes. Sometimes it may decrease or sometimes it causes an
increase. The energy difference in each node is calculated by the means of the difference between the residual energy and
consumed energy rate. It is named as energy trust
On proxy selection the node which is having greatest energy has been selected as proxy. Suppose the second vehicle is having
the highest energy that of first and third the proxy is the vehicle moving in second position. After the proxy selection the proxy
collects all requests from the remaining vehicles and makes it as a single one and will send to nearby road side unit by the means
of vehicle to road side unit communication in the last phase. After the acceptance of the request whole process has been
performed as per the Chameleon hashing based authentication. It also detects two types of attack, that are Internal as well as
External attack. In both cases Certificate Authority tracks the nodes and drops packets if it is malicious. The system allows
communication in the case of emergency vehicles such as ambulance, fire engines etc.
In this system for communication by exchanging messages, the elliptic curve is given as, E= (x^3+1x+1) mod 263. It
generates G acyclic groups with order n on the elliptic curve. While taking two points P&Q it proceeds with the scalar
multiplication by point doubling and repeated addition. It is defined by a message encryption as an example between two nodes
in the communication. Suppose OBU-47 and RSU-20 is communicating with each other. It first creates an acyclic group G =
(184,220) from the curve with order 64. Then the algorithm computes public keys by
OBU-47's public key Pa = 132*(184, 220) = (116, 125)
RSU-20's public key Pb = 155*(184, 220) = (173, 173)
After generation of keys messages are transmitted. Suppose the plain text message from OBU to RSU is (19, 72). OBU
encrypt the message to RSU as {Pa, c1, c2} this will be {(116, 125), 86, 27}. At the receiver side RSU decrypts the message
from OBU as (19, 72) . If there is an attack by an Unauthorized road side unit or vehicle the Unauthorized user will decrypted
message from OBU as (59, 247) because it cannot plot the curve using the respected generated points. We can prevent these
type of attacks to a limit by using elliptic curve cryptography.
VII. ANALYSIS ON SIMULATION RESULTS
Fig(5) shows the simulation infrastructure of VANET using Chameleon hashing using privacy preservation scheme by Network
Simulator 2. It consists total 50 nodes including both OBU and RSU also the Certificate Authority. The figure shows the path
and intersection through which the vehicles are transmitting from one end to other by secure transmission of messages between
vehicle to vehicle as well as vehicle to RSU. The figure also shows the communication between Road Side Units.

Fig. 5: Chameleon Based Architecture

Fig. 6: Proxy based Architecture

Fig (6) shows Proxy based system architecture. In Proxy based architecture the total number of nodes are increased up to 60
i.e., 0-59. Proxy selections are done based on the energy levels of each node with the help of consumed as well as the residual
energy of each node.

All rights reserved by www.ijirst.org

152

Secure and Privacy Preserving Message Authentication with Chameleon Hashing using Proxy Vehicles in VANETS
(IJIRST/ Volume 3 / Issue 02/ 027)

VIII. PERFORMANCE ANALYSIS

Fig. 7: Chameleon Based End to End Delay

Fig. 8: Proxy based End to End Delay

The performance of the system is compared based on the end to end packet transmission delay and throughput obtained during
the execution of the systems. Fig 7 and Fig 8 shows the end to end delay i.e. the total time taken from a packet to reach at the
destination are plotted. In the graph x-axis shows the time and y-axis shows the delay. It clearly shows the Chameleon based
system has highest delay that of compared to the Proxy based system. In this execution between 3.0000 to 8.0000 time period has
taken as the peak time. In this interval Chameleon based systems shows highest delay than that of the next.

Fig. 9: Chameleon Based Throughput

Fig. 10: Proxy Based Throughput

Fig 5.11 and 5.12 shows the number of packets received in each transmission by the destinations in both systems. In
throughput graph x-axis shows the time and y-axis shows the throughput. Proxy based system gives higher throughput than that
of the Chameleon in given amount of time i.e. number of packets in bytes received at the destination is more than that of the first
one. It shows a reduction in the level of packet drop.
By analyzing these graphs it is clear that the proposed work gives less end to end delay of transmission of packets and high
throughput in the given amount of time.
IX. CONCLUSION
Chameleon hashing for communication presents a good authentication scheme for VANETs. It preserves data for secure data
transmission by Chameleon hashing scheme by introducing Elliptic Curve Cryptographic algorithm for key generation and
powerful encryption by signing the certificates using signatures provided by Certificate Authority is presented. However, the
Chameleon based authentication schemes is a good scheme it may not work well in certain scenarios. It is difficult for a roadside
unit (RSU) to accept and verify each vehicles request sequentially when a large number of vehicles comes in the coverage area
of a road side unit in peak traffic time. For reducing the computational overhead of road side units, a proxy based authentication
scheme has been proposed. In the proxy based scheme, proxy vehicles are used to authenticate multiple messages at the same
time. In addition, the RSU can able to independently verify the outputs from the proxy vehicles than that of verifying separate
requests from each OBU.

All rights reserved by www.ijirst.org

153

Secure and Privacy Preserving Message Authentication with Chameleon Hashing using Proxy Vehicles in VANETS
(IJIRST/ Volume 3 / Issue 02/ 027)

REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]

Song Guo,Senior Member,IEEE,Deze Zeng,Member,IEEE, and Yang Xiang Senior Member, IEEE Chameleon Hashing for Secure and Privacy
Preserving Navigation IEEE Trans.VOL.25,NO.11,NOVEMBER 2014
Mershad, K.; Artail, H., "A Framework for Secure and Efficient Data Acquisition in Vehicular Ad Hoc Networks," in Vehicular Technology, IEEE
Transactions on , vol.62, no.2, pp.536-551, Feb.2013
L. Buttyan, T. Holczer, and I. Vajda, ``On the effectiveness of chang-ing pseudonyms to provide location privacy,'' in Proc. ESAS, 2007, pp. 129_141.
M. Raya and J. P. Hubaux, The security of vehicular ad hoc networks, in Proc. SASN, Alexandria, VA, Nov. 2005, pp. 1121.
An-Ni Shen; Song Guo; Deze Zeng; Guizani, M., "A lightweight privacy-preserving protocol using chameleon hashing for secure vehicular
communications," in Wireless Communications and Networking Conference (WCNC), 2012 IEEE , vol., no., pp.2543-2548, 1-4 April 2012
J. L. Huang, L. Y. Yeh, and H. Y. Chien, ABAKA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular
ad hoc networks, IEEE Trans. Veh. Technol., vol. 60, no. 1, pp. 248262, Jan. 2011.
B. Kaliski, PKCS# 5: Password-Based Cryptography Specification Version 2, RSA Lab., Cambridge, MA, 2898, Sep. 2000.

All rights reserved by www.ijirst.org

154

You might also like