Next Article in Journal
Real-Time Traffic Sign Detection and Recognition Method Based on Simplified Gabor Wavelets and CNNs
Next Article in Special Issue
Error Resilient Coding Techniques for Video Delivery over Vehicular Networks
Previous Article in Journal
Development of Organic-Inorganic Hybrid Optical Gas Sensors for the Non-Invasive Monitoring of Pathogenic Bacteria
Previous Article in Special Issue
Source Coding Options to Improve HEVC Video Streaming in Vehicular Networks
Open AccessArticle

Secure Authentication Protocol for Wireless Sensor Networks in Vehicular Communications

1
School of Electronics Engineering, Kyungpook National University, Daegu 41566, Korea
2
Samsung Electronics, Suwon 16677, Korea
*
Authors to whom correspondence should be addressed.
Sensors 2018, 18(10), 3191; https://doi.org/10.3390/s18103191
Received: 27 July 2018 / Revised: 18 September 2018 / Accepted: 18 September 2018 / Published: 21 September 2018
(This article belongs to the Special Issue Advances on Vehicular Networks: From Sensing to Autonomous Driving)
With wireless sensor networks (WSNs), a driver can access various useful information for convenient driving, such as traffic congestion, emergence, vehicle accidents, and speed. However, a driver and traffic manager can be vulnerable to various attacks because such information is transmitted through a public channel. Therefore, secure mutual authentication has become an important security issue, and many authentication schemes have been proposed. In 2017, Mohit et al. proposed an authentication protocol for WSNs in vehicular communications to ensure secure mutual authentication. However, their scheme cannot resist various attacks such as impersonation and trace attacks, and their scheme cannot provide secure mutual authentication, session key security, and anonymity. In this paper, we propose a secure authentication protocol for WSNs in vehicular communications to resolve the security weaknesses of Mohit et al.’s scheme. Our authentication protocol prevents various attacks and achieves secure mutual authentication and anonymity by using dynamic parameters that are changed every session. We prove that our protocol provides secure mutual authentication by using the Burrows–Abadi–Needham logic, which is a widely accepted formal security analysis. We perform a formal security verification by using the well-known Automated Validation of Internet Security Protocols and Applications tool, which shows that the proposed protocol is safe against replay and man-in-the-middle attacks. We compare the performance and security properties of our protocol with other related schemes. Overall, the proposed protocol provides better security features and a comparable computation cost. Therefore, the proposed protocol can be applied to practical WSNs-based vehicular communications. View Full-Text
Keywords: authentication; wireless sensor network; vehicular communications; formal security analysis; BAN logic; AVISPA authentication; wireless sensor network; vehicular communications; formal security analysis; BAN logic; AVISPA
Show Figures

Figure 1

MDPI and ACS Style

Yu, S.; Lee, J.; Lee, K.; Park, K.; Park, Y. Secure Authentication Protocol for Wireless Sensor Networks in Vehicular Communications. Sensors 2018, 18, 3191.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Search more from Scilit
 
Search
Back to TopTop