Multi-Level ECDH-Based Authentication Protocol for Secure Software-Defined VANET Interaction

Multi-Level ECDH-Based Authentication Protocol for Secure Software-Defined VANET Interaction

Umesh K. Raut, Vishwamitra L. K.
Copyright: © 2022 |Volume: 13 |Issue: 1 |Pages: 28
ISSN: 1937-9412|EISSN: 1937-9404|EISBN13: 9781683180449|DOI: 10.4018/IJMCMC.297961
Cite Article Cite Article

MLA

Raut, Umesh K., and Vishwamitra L. K. "Multi-Level ECDH-Based Authentication Protocol for Secure Software-Defined VANET Interaction." IJMCMC vol.13, no.1 2022: pp.1-28. http://doi.org/10.4018/IJMCMC.297961

APA

Raut, U. K. & Vishwamitra L. K. (2022). Multi-Level ECDH-Based Authentication Protocol for Secure Software-Defined VANET Interaction. International Journal of Mobile Computing and Multimedia Communications (IJMCMC), 13(1), 1-28. http://doi.org/10.4018/IJMCMC.297961

Chicago

Raut, Umesh K., and Vishwamitra L. K. "Multi-Level ECDH-Based Authentication Protocol for Secure Software-Defined VANET Interaction," International Journal of Mobile Computing and Multimedia Communications (IJMCMC) 13, no.1: 1-28. http://doi.org/10.4018/IJMCMC.297961

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The proposed multi-layer ECDH based authentication model, the vehicles in the VANET are authenticated and authorized to protect the network from the attacks for which the vehicles undergo the registration process initially. After the successful registration, the messages generated from the vehicles are communicated with each other through multi-step authentication, which assures the exactness of the received messages. Then, the authorization process is executed in the VANET so as to ensure the safe and secure interactions between the vehicles. The implemented authentication model is analyzed using the comparative methods based on the performance standards, such as detection accuracy, execution time, packet delivery ratio (PDR) and throughput. The detection accuracy, execution time, PDR and the throughput of the network while executing the proposed multi-level ECDH based authentication system is better than the prevailing security models as the security features of the existing models are enhanced better than the existing state-of-art methods.