Privacy Preservation Authentication Model for a Secure Infrastructure over Vehicular Communications

Authors

  • Soukayna Riffi Boualam Engineering, Systems and Applications Laboratory, National School of Applied Sciences, Sidi Mohamed Ben Abdellah University, Fez
  • Dr. Mariyam Ouaissa Moulay Ismail University Meknes
  • Dr. Mariya Ouaissa Moulay Ismail University Meknes
  • Prof. Dr. Abdellatif Ezzouhairi Engineering, Systems and Applications Laboratory, National School of Applied Sciences, Sidi Mohamed Ben Abdellah University, Fez

DOI:

https://doi.org/10.3991/ijim.v16i12.31533

Keywords:

ITS, VANET, Privacy Preservation, Authentication, ECDH, EdDSA

Abstract


Vehicle Ad-hoc Networks (VANET) are considered among recent wireless communication technologies. Nowadays, vehicles are no more than simple means of transport, they are endowed with a source of intelligence through their interaction with the road environment due to embedded equipment on board vehicles and integrated into stations along roads and highways. The mechanisms of security and protection of messages exchanged in VANET, thus preserving the privacy of users and satisfying the various security requirements, are a prerequisite for the deployment of vehicle networks. Increasingly, several research have been proposed to improve protocols for maintaining security and preserving privacy. This paper presents a hierarchical revocable infrastructure based privacy preservation authentication protocol for vehicles that involves authentication of each vehicle and the corresponding Road Side Unit (RSU) by a Certification Authority (CA). The proposed protocol used Elliptic Curve Diffie Hellman (ECDH) algorithm for reliable key exchange and Edwards-curve Digital Signature Algorithm (EdDSA) to speed up the execution of the authentication process especially at the key management level, message signing and verification of this signature. On the other hand, the creation of sub-lists of revoked certificates based on vehicle type makes it possible to minimize the response time by looking for a certificate if it is revoked or not. Our solution was checked by the security verification tool, Automated Validation of Internet Security Protocols and Applications (AVISPA), which indicated that it is a very secure level. Performance analysis illustrates that the protocol greatly saves computation resources.

Author Biographies

Soukayna Riffi Boualam, Engineering, Systems and Applications Laboratory, National School of Applied Sciences, Sidi Mohamed Ben Abdellah University, Fez

Soukayna Riffi Boualam is currently a Professor at Specialized Institute of Applied Technology. She received her engineer’s degree in Network and Telecommunications in 2016. She is a PhD student at ENSA, Sidi Mphammed Ben Abdallah  University Fez, Morocco. Her research interests include Network, Telecommunications, Internet of Things and Routing Protocols.

Dr. Mariyam Ouaissa, Moulay Ismail University Meknes

Mariyam Ouaissa is a Professor/Trainer and Researcher Associate. She is a Ph.D. in Computer Science and Networks graduated in 2019, at the Laboratory of Modelisation of Mathematics and Computer Science, from Moulay Ismail University, ENSAM, Meknes, Morocco. She is a Networks and Telecoms Engineer, graduated in 2013 from National School of Applied Sciences Khouribga. Her main research topics are IoT, M2M, WSN, Vehicular Networks, Cellular Networks. She is mainly working on M2M congestion overload problem, security and the resource allocation management. She has published more than 20 research papers. She is a Editor in several books (Springer, De Gruyter, RGN Publications ...) and Guest Editor in several special issues of journals (IGI Global, River Publishers, EAI Publisher, RGN Publications ...).

Dr. Mariya Ouaissa, Moulay Ismail University Meknes

Mariya Ouaissa is currently a Professor at Institute Specializing in New Information and Communication Technologies, Researcher Associate and practitioner with industry and academic experience. She is a Ph.D. graduated in 2019 in Computer Science and Networks, at the Laboratory of Modelisation of Mathematics and Computer Science from ENSAM-Moulay Ismail University, Meknes, Morocco. She is a Networks and Telecoms Engineer, graduated in 2013 from National School of Applied Sciences Khouribga, Morocco. Dr. Ouaissa has made contributions in the fields of information security and privacy, Internet of Things security, and wireless and constrained networks security. Her main research topics are IoT, M2M, D2D, WSN, Cellular Networks, and Vehicular Networks. She has published over 20 papers (book chapters, international journals, and conferences/workshops), 8 edited books, and 5 special issue as guest editor.

Prof. Dr. Abdellatif Ezzouhairi, Engineering, Systems and Applications Laboratory, National School of Applied Sciences, Sidi Mohamed Ben Abdellah University, Fez

Abdellatif Ezzouhairi received the M.Sc and the PhD degrees in Mobile computing from Ecole Polytechnique Montreal Canada. He worked as an adjunct researcher at the Mobile Computing and Networking Research Laboratory (LARIM) Chair Ericsson Canada. He is now a Professor at ENSA Fez Morocco. His interests: NGN integration, mobility and sensor/MANET.

Downloads

Published

2022-06-21

How to Cite

Riffi Boualam, S., Ouaissa, M., Ouaissa, M., & Ezzouhairi, A. (2022). Privacy Preservation Authentication Model for a Secure Infrastructure over Vehicular Communications. International Journal of Interactive Mobile Technologies (iJIM), 16(12), pp. 52–71. https://doi.org/10.3991/ijim.v16i12.31533

Issue

Section

Papers