MoTIVE: Mobile two-hop integrity validation for emergency vehicle routing

Hsiao Ching Lin, Chinyang Henry Tseng, Hui Tang Lin

Research output: Contribution to journalArticlepeer-review

Abstract

For disaster rescue and crisis support services, secure and trusted communication among emergency vehicles and mobile devices is important. VANET has been incrementally experimented for rescue scenario. Therefore, one of the popular ad hoc protocols, ad hoc on-demand distance vector (AODV), is applied to adjust VANET environment. In AODV, its critical routing fields (CRF) are security leakages allowing malicious nodes to launch routing attacks by illegally modifying field content. To prevent CRF from being modified by forwarders, we propose Mobile Two-hop Integrity Validation for Emergency vehicle routing (MoTIVE) to enhance routing security of AODV. To design a secure VANET without introducing extra traffic, MoTIVE uses two-hop integrity stamping (THIS) and validation rules, accompanying routing information exchanges without modifying protocol design. With THIS, MoTIVE verifies the integrity of forwarded AODV routing messages within each two-hop area; consequently, it guarantees the routing correctness of whole network with induction concept. The main contribution of MoTIVE is that security-reinforced information is piggybacked in normal routing messages within two-hop locally instead of being flooded to the entire network globally. Compared with the original AODV, experiment results show that MoTIVE is scalable and causes no performance degradation while supplementary security protection is applied.

Original languageEnglish
Pages (from-to)1717-1724
Number of pages8
JournalSecurity and Communication Networks
Volume8
Issue number9
DOIs
Publication statusPublished - 2015 Jun 1

All Science Journal Classification (ASJC) codes

  • Information Systems
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'MoTIVE: Mobile two-hop integrity validation for emergency vehicle routing'. Together they form a unique fingerprint.

Cite this