Professional Documents
Culture Documents
Decentralized and Scalable Privacy-Preserving Authentication Scheme in Vanets
Decentralized and Scalable Privacy-Preserving Authentication Scheme in Vanets
Abstract—Existing authentication schemes are based on either enables each vehicle to communicate with its neighboring vehi-
symmetric or asymmetric cryptography such as public-key cles and fixed devices located at roadside known as Road Side
infrastructure (PKI). These PKI-based authentication schemes Units (RSUs) [2]–[5].
are highly recommended to address the security challenges in The main objective of VANET is to provide safety to vehicle
VANETs. However, they have certain shortcomings such as: 1) lack
passengers by broadcasting safety messages between vehicles
of privacy-preservation due to revealing of vehicle identity and
broadcasting of safety-message and 2) lengthy certificates leading
and these safety messages comprise life critical information.
to communication and computation overheads. The symmetric Efficient multi-hop routing protocols are needed for scaling and
cryptography based schemes on the other hand are faster because efficient deployment of safety-related applications in VANET
they use a single secret key and are very simple; however, it does not [6]. The routing protocols must perform better interms of packet
ensure nonrepudiation. In this paper, we present a decentralized delivery ratio and delays. The discussion of routing is not in the
and scalable privacy-preserving authentication (DSPA) scheme for scoope of this paper.
secure vehicular ad hoc networks. The proposed scheme employs According to the DSRC, each vehicle periodically broadcasts
a hybrid cryptography. In DSPA, the asymmetric identity-based safety messages every 100–300 milliseconds about road safety
(ID-based) cryptography and the symmetric hash message authen- warnings and road traffic conditions [7], [8]. Since, safety mes-
tication code (HMAC) based authentication are adopted during sages are broadcasted through an open wireless medium, it is
vehicle to infrastructure and vehicle to vehicle communications,
respectively. Extensive simulations are conducted to validate the
vulnerable to diverse kinds of security attacks such as imper-
proposed DSPA scheme by comparing the existing works based on sonation, modification, identity-disclosure, Sybil attacks and so
PKI, ID-based, group signature, batch verification, and HMAC. on. Therefore our primary objective is to address these security
The performance analysis showed that DSPA is more efficient, issues by providing security before we put VANET application
decentralized, scalable, and also a privacy-preserving secured scenarios into practice [9]. Security can be achieved by provid-
scheme than the existing authentication schemes. ing primary security requirements, such as: node authentication,
message integrity, and non-repudiation.
Index Terms—Security, public key infrastructure (PKI),
identity-based (ID-based) cryptography, hybrid cryptography,
In VANETs, due to the wireless broadcast communication
vehicular ad hoc networks (VANETs). mode, adversaries can control wireless communication channels
fairly effortlessly. Adversaries can modify, intercept, delete, and
replay messages broadcasted in VANETs very easily. For exam-
I. INTRODUCTION ple, an adversary vehicle can turn the traffic red light to green
HE vehicular ad hoc network (VANET) is a class of the light so that other vehicles are forced to make way for his vehi-
T mobile ad-hoc network (MANET). It is a self-configuring,
dynamic, and infrastructure-less network [1]. The VANETs have
cle to pass. Hence, the security of safety-messages in VANETs
is very essential [10], [11]. In VANETs, another key issue is ve-
hicle privacy [11]–[15]. For many safety applications, a vehicle
attracted significant attention in both academia and industry. In
VANETs, vehicles are nodes, which are embedded with On- sends out a safety message which comprises of information such
Board Units (OBUs) devices, it enables Vehicle to Infrastructure as, identity (ID), location, speed, etc. to its neighbour vehicles
(V2I) and Vehicle to Vehicle (V2V) wireless communications by or RSUs in plaintext. The adversary can capture these vehicle’s
making use of Dedicated Short Range Communication (DSRC) messages, and he could trace the traveling routes of vehicle and
protocol standard. These OBU and DRSC protocol together track the driver’s private information, which leads to serious
effects. Therefore, anonymity and conditional privacy must be
provided in VANETs to address this privacy issue. This ensures,
only the trusted authority can extract the real identity of vehicle
Manuscript received December 15, 2017; revised April 14, 2018; accepted from the safety message [16].
May 16, 2018. Date of publication May 23, 2018; date of current version
September 17, 2018. The review of this paper was coordinated by Prof. J. Liu. A. Problem Statement
(Corresponding author: Shrikant Tangade.)
S. Tangade is with the Department of Electronics and Communication The objective of this paper is to design a privacy preser-
Engineering, REVA Institute of Technology and Management, Bengaluru vation scheme in VANET that performs the following: node
560064, India (e-mail:,shrikantstangade@reva.edu.in). authentication, message authentication, non-repudiation, real-
S. S. Manvi is with the School of Computing and Information Technology, time processing, decentralized operation, scalability, privacy,
REVA University, Bengaluru 560064, India (e-mail:,ssmanvi@reva.edu.in).
P. Lorenz is with the University of Haute-Alsace, Colmar 68008, France
and reduced overheads. The scheme employs ID-based cryp-
(e-mail:,lorenz@ieee.org). tography and hash message authentication code (HMAC) to
Digital Object Identifier 10.1109/TVT.2018.2839979 achieve the objectives.
0018-9545 © 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications standards/publications/rights/index.html for more information.
8648 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 67, NO. 9, SEPTEMBER 2018
B. Our Contributions
The major contributions of this paper are summarized as
follows.
r Firstly, we propose a new hybrid cryptography based DSPA
scheme for VANETs. In DSPA, the asymmetric ID-based
cryptography and the symmetric HMAC based authentica-
tion are adopted to improve performance.
r Secondly, we perform a security analysis to prove that the
proposed DSPA scheme could satisfy privacy and security
requirements in VANETs.
r Finally, we present performance analysis of the communi-
cation cost and the computation cost to demonstrate that
the proposed DSPA scheme provides greater performance
than formerly proposed schemes for VANETs.
communications. These are: (i) Master TA Initialization, (ii) update their database of RSU with newly registered RSU’s
Agent TA Initialization, (iii) RSU Initialization, and (iv) Vehi- details as given in Eqs. (8) and (9).
cle Initialization. The detailed initialization process is discussed
in following sections. AT A DB RSU := {RIDR , P rKR , P uKR } (8)
1) Master TA Initialization: The Master TA executes the
following steps. M T A DB RSU := {RIDA , RIDR , P rKR , P uKR }
r Master TA (MTA) generates master private and public (9)
keys: { mPrk, mPuk }. The mPrk key is used to gener- r At the same time, ATA uploads parameters into newly
ate private keys for ATAs, RSUs, and vehicles. It is only
known to MTA. The mPuk key is made public and it is used registered RSU, they are: {P rKR , P uKR , P uKA , mPuK,
to generate public keys for ATAs, RSUs, and vehicles. and mSrK}. Hence, RSU-parameters after registration with
r It also generates master secrete key { mSrk } as given in ATA are:
Eq. (1). RSU_Parameters: [RIDR , P rKR , P uKR , mPuK, mSrk].
4) Vehicle Initialization: Before any vehicle takes part in
mSrK := KeyGen(RIDTA , mP rK, T S) (1) VANET, it must register with MTA.
r This mSrk key is used during V2V authentication and also r Each vehicle ’V’ registers with MTA with its real identity
RIDV and area code ACodeH m A TA of its home ATA.
for generating unique secrete keys for each ATA during r MTA then computes master pseudo-ID mP sIDV of vehi-
their registration. The mSrk changes after every 24 Hrs.
r The mPrk key will be kept secret with MTA and { mPuk, cle using RIDV and validity time period V T P m P sI D of
mSrk, & SrKA i } keys are uploaded into each ATA, RSU, mP sIDV as given in Eq. (10).
and vehicles during their registration with MTA.
r The MTA maintains three separate databases for registered mP sIDV := Hash(RIDV ||ACodeHm ATA ||V T Pm PsID)
(10)
ATAs, RSUs, and vehicles.
r The MTA parameters after initialization are: r Vehicle’s private and public key pair { P rKV , P uKV }
MTA_Parameters: [mPrK, mPuK, mSrK, & SrKA i ] are generated by MTA using mP sIDV , mPrK, & mPuK
2) Agent TA Initialization: Before ATA takes part in as given in Eqs. (11) and (12).
VANET, it must be registered with MTA as follows:
r Each ATA registers with MTA with its real identity RIDA i P rKV := KeyGen5(mP sIDV , mP rK) (11)
r ATA’s private and public key pair {P rKA i , P uKA i } are
P uKV := KeyGen6(P rKV , mP uK) (12)
generated by MTA using { RIDA i , mPrK, and mPuK } as
given in Eqs. (2) and (3). r The MTA updates its database of vehicle with newly reg-
P rKAi := KeyGen1(RIDAi , mP rK) (2) istered vehicle’s details as given in Eq. (13).
P uKAi := KeyGen2(P rKAi , mP uK) (3) M T A DB V := {RIDV , mP sIDV , V T Pm PsID ,
r MTA then generates unique secrete key for registered (13)
P rKV , P uKV , ACodeH m A TA }
ATAi as given in Eq. (4).
SrKAi := KeyGen(RIDAi , mP rK, mSrK) (4)
r At the same time, MTA uploads parameters into Tamper
r The MTA updates its database of ATA with details of newly Proof Device (TPD) of newly registered vehicle ’V’, they
are: {P rKV , P uKV , P uKA , SrKA , & mPuK }. Hence,
registered ATAi as given in Eq. (5). the ’V’ parameters after registration with MTA are:
M T A DB AT A V_Parameters: [RIDV , mP sIDV , V T P m P sI D , P rKV ,
P uKV , SrKA , & mPuK].
:= {RIDAi , P rK Ai , P uK Ai , &SrK Ai } (5)
r At the same time MTA uploads these parameters {P rKA i ,
B. Phase-II: V2I Pre-Authentication
P uKA i , SrKA i , mPuK, & mSrK} into the newly regis-
tered ATA Ai. Hence, ATA-parameters after registration In Phase-II, each registered vehicle with MTA must perform
are: an online registration with nearest ATA by pre-authenticating
Ai_Parameters: [RIDA i , P rKA i , P uKA i , SrKA i , through RSU before taking part in V2V communication. The
mPuK, & mSrK]. detailed steps of proposed V2I pre-authentication are discussed
3) RSU Initialization: in: Algorithms-1, 2, 3, and 4. The detailed sequence of operation
r Each RSU within BTS coverage area must register with of Phase-II are depicted in Fig. 2.
ATA of its BTS and MTA using its real identity RID .
r RSU’s private and public key pair (P rKR , P uKR )R are
generated by ATA using RIDR , P rKA , and P uKA as C. Phase-III: V2V Authentication
given in Eqs. (6) and (7).
The vehicles which are pre-authenticated in Phase-II can only
P rKR := KeyGen3(RIDR , P rKA ) (6) take part in V2V communication. Each MTA’s coverage area
P uKR := KeyGen4(P rKR , P uKA ) (7) forms a group of pre-authenticated vehicles having same mSrK.
The detailed steps of V2V authentication are presented in the
r The ATA shares details of registered RSU to MTA through following Algorithm-5. The particular sequence of operation of
trusted wired/wireless channel. Then, both ATA and MTA Phase-III are depicted in Fig. 3.
TANGADE et al.: DECENTRALIZED AND SCALABLE PRIVACY-PRESERVING AUTHENTICATION SCHEME IN VANETS 8651
TABLE II TABLE IX
NS-3 SIMULATION PARAMETERS SIGNED SAFETY-MESSAGE IN BSPECS AUTHENTICATION SCHEME
TABLE III
SIGNED SAFETY-MESSAGE IN PROPOSED DSPA AUTHENTICATION SCHEME
TABLE IV
SIGNED SAFETY-MESSAGE IN ECPP AUTHENTICATION SCHEME
TABLE V
SIGNED SAFETY-MESSAGE IN ID-MAP SCHEME
TABLE VI
SIGNED SAFETY-mePrK V SSAGE IN PKI-CERTI AUTHENTICATION SCHEME
TABLE VII
SIGNED SAFETY-MESSAGE IN XIAOYAN’S AUTHENTICATION SCHEME
Fig. 5. Communication overhead: Payload = 50, 100, 150, and 200 bytes.
REFERENCES
[1] D. He, S. Zeadally, B. Xu, and X. Huang, “An efficient identity-based
conditional privacy-preserving authentication scheme for vehicular ad hoc
Fig. 6. Computation overhead. networks,” IEEE Trans. Inf. Forensics Security, vol. 10, no. 12, pp. 2681–
2691, Dec. 2015.
[2] L. Zhang, Q. Wu, J. Domingo-Ferrer, B. Qin, and C. Hu, “Distributed
aggregate privacy-preserving authentication in VANETs,” IEEE Trans.
Intell. Transp. Syst., vol. 11, no. 10, pp. 1–11, Jun. 2016.
[3] V. Daza, J. Domingo-Ferrer, F. Seb, and A. Viejo, “Trustworthy privacy-
preserving car-generated announcements in vehicular ad hoc networks,”
IEEE Trans. Veh. Technol., vol. 58, no. 4, pp. 1876–1886, May 2009.
[4] F. Qu, Z. Wu, F. Wang, and W. Cho, “A security and privacy review of
VANETs,” IEEE Trans. Intell. Transp. Syst., vol. 16, no. 6, pp. 2958–2996,
Dec. 2015.
[5] S. S. Manvi and S. Tangade, “A survey on authentication schemes in
VANETs for secured communication,” J. Veh. Commun., vol. 9, pp.
19–30, Mar. 2017.
[6] K. Z. Ghafoor, M. A. Mohammed, J. Lloret, K. A. Bakar, and Z. M.
Zainuddin, “Routing protocols in vehicular ad hoc networks: Survey and
research challenges,” Netw. Protocols Algorithms, vol. 5, no. 4, pp. 39–83,
Dec. 2013.
[7] D. Jiang and L. Delgrossi, “IEEE 802.11p: Towards an international stan-
dard for wireless access in vehicular environments,” in Proc. IEEE 68th
Fig. 7. Security processing delay. Veh. Technol. Conf., 2008, pp. 2036–2040.
[8] Dedicated Short Range Commun, 2015. [Online]. Available:
delay. It is observed that the computation overhead and security http://standards.ieee.org/develop/wg/1609WG.html
processing delay of proposed DSPA scheme is very less as [9] J. Cui, J. Zhang, H. Zhong, and Y. Xu, “SPACF: A secure privacy-
compared other schemes. The reason for less computation preserving authentication scheme for VANET with cuckoo filter,” IEEE
Trans. Veh. Technol., vol. 66, no. 11, pp. 10283–10295, Nov. 2017.
overhead in DSPA is that symmetric cryptography HMAC is [10] 1609.2-2013-IEEE Standard for Wireless Access in Vehicular
used for V2V communication. Environments-Security Services for Applications and Management Mes-
sages, IEEE Std. 1609, 2013.
[11] W. I. Khedr, “Improved lightweight authentication scheme for IEEE
VI. CONCLUSION AND FUTURE WORK 802.11p vehicle-to-infrastructure communication,” Adhoc Sensor Wire-
In this paper, we have proposed a decentralized and scalable less Netw., vol. 31, pp. 227–258, Mar. 2016.
[12] K. Grover, A. Lim, S. Lee, and Q. Yang, “Privacy-enabled probabilistic
privacy-preserving hybrid cryptography based DSPA scheme verification in broadcast authentication for vehicular networks,” Adhoc
for secure communication in VANETs. The entire communi- Sensor Wireless Netw., vol. 32, pp. 239–274, Jan. 2016.
cation network is divided into several domain areas, which are [13] S. Tzeng, S. Horng, T. Li, X. Wang, P. Huang, and M. K. Khan, “Enhanc-
locally monitored by ATAs. The proposed scheme consists of ing security and privacy for identity-based batch verification scheme in
three phases, phase-I, where MTA, ATAs, RSUs, and all vehi- VANETs,” IEEE Trans. Veh. Technol., vol. 66, no. 4, pp. 3235–3248, Apr.
2017.
cles registered with system parameters before they take part in [14] S. Tangade and S. S. Manvi, “Scalable and privacy-preserving authenti-
VANETs. The phase-II (V2I), where, vehicles do online reg- cation protocol for secure vehicular communications,” in Proc. IEEE Int.
istration with nearest ATA and pre-authenticate with RSUs. Conf. Adv. Netw. Telecommun. Syst., 2017, pp. 1–6.
In phase-III (V2V), the vehicle authenticates with other ve- [15] D. Johnson, A. Menezes, and S. Vanstone, “The elliptic curve digital
signature algorithm (ECDSA),” Int. J. Inf. Security, vol. 1, no. 1, pp. 36–
hicles in VANET. We employed an ID-based cryptography for 63, Aug. 2001.
pre-authenticating vehicles by RSUs during V2I communica- [16] M. Raya and J. Hubaux, “Securing vehicular ad hoc networks,” J. Comput.
tion. Whereas, HMAC is used for vehicle to vehicle authentica- Security, vol. 15, no. 1, pp. 39–68, Jan. 2007.
tion during V2V communication. The simulation results along [17] I. Syamsuddin, T. Dillon, E. Chang, and S. Han, “A survey of RFID
with the performance and security analysis show that, the pro- authentication protocols based on hash chain method,” in Proc. 3rd Int.
Conf. Convergence Hybrid Inf. Technol., 2008, pp. 559–564.
posed DSPA scheme can significantly reduce communication [18] A. Perrig, R. Canetti, J. D. Tygar, and D. Song, “The TESLA broadcast
and computation overheads. It also provides decentralization, authentication protocol,” RSA Cryptobytes, vol. 5, no. 2, pp. 2–13, Aug.
scalability, and privacy preserverance of vehicles by using PsID. 2002.
The proposed scheme performance can be further im- [19] J. Guo, J. P. Baugh, and S. Wang, “A group signature based secure and
privacy preserving vehicular communication framework,” in Proc. IEEE
proved by employing either group signature or batch signature Mobile Netw. Veh. Environ., Anchorage, AK, USA, 2007, pp. 103–108.
verification or cooperative message verification along with hy- [20] X. Lin et al., “TSVC: Timed efficient and secure vehicular communica-
brid cryptography based scheme. The group signature provides tions with privacy preserving,” IEEE Trans. Wireless Commun., vol. 7,
privacy and non-traceability of sender vehicles by its anony- no. 12, pp. 4987–4998, Dec. 2008.
TANGADE et al.: DECENTRALIZED AND SCALABLE PRIVACY-PRESERVING AUTHENTICATION SCHEME IN VANETS 8655
[21] J. Freudiger, M. Raya, and M. Feleghhazi, “Mix zones for location privacy Sunilkumar S. Manvi (SM’11) received the B.E. de-
in vehicular networks,” in Proc. 1st Int. Workshop Wireless Netw. Intell. gree from Karnataka University, Dharwad, India, in
Transp. Syst., 2007, pp. 1–7. 1987, the M.E. degree in electronics from the Uni-
[22] K. Sampigethaya, M. Li, L. Huang, and R. Poovendran, “AMOEBA: Ro- versity of Visweshwariah College of Engineering,
bust location privacy scheme for VANET,” IEEE J. Sel. Areas Commun., Bangalore, India, in 1993, and the Ph.D degree in
vol. 25, no. 8, pp. 1569–1589, Oct. 2007. electrical communication engineering, Indian Insti-
[23] C. Zhang, X. Lin, R. Lu, and P. H. Ho, “RAISE: An efficient RSU-aided tute of Science, Bangalore, India, in 2003. He is cur-
message authentication scheme in vehicular communication networks,” in rently working as a Principal Investigator with Wire-
Proc. IEEE Int. Conf. Commun., 2008, pp. 1451–1457. less Information Systems Research Lab, a Principal
[24] IEEE Trial-Use Standard for Wireless Access in Vehicular Environments with Reva Institute of Technology And Management,
(WAVE)-Security Services for Applications and Management Messages, Bengaluru, India, and the Director with the School
IEEE Std. 1609.2, Jul. 2006. of Computing And Information Technology, REVA University, Bangalore,
[25] X. Zhu, S. Jiang, L. Wang, and H. Li, “Efficient privacy-preserving au- India. He has experience of around 28 years in research and teaching. He is in-
thentication for vehicular ad hoc networks,” IEEE Trans. Veh. Technol., volved in research of Agent based applications in Multimedia Communications,
vol. 63, no. 2, pp. 907–919, Feb. 2014. Wireless Networks, Wireless Sensor Networks, Vehicle Networks, Grid/Cloud
[26] N. Lo and J. Tsai, “An efficient conditional privacy-preserving authentica- computing, and E-commerce. He has published 106 papers in national and in-
tion scheme for vehicular sensor networks without pairings,” IEEE Trans. ternational journals, 160 papers in national and international conferences, and
Intell. Transp. Syst., vol. 17, no. 5, pp. 1319–1328, May 2016. 15 publications as books/book-chapters. As per google scholar, he has 1200
[27] M. Bayat, M. Barmshoory, M. Rahimi, and M. R. Aref, “A secure au- citations (h-index = 20 and i-10index = 40). VGST Karnataka has awarded
thentication scheme for VANETs with batch verification,” Wireless Netw., best research publication in 2014. He is a Fellow IETE (FIETE, India)and
vol. 21, no. 5, pp. 1733–1743, 2015. a Fellow of IE (FIE, India). Some of his publications on Agent Technology,
[28] D. Boneh, B. Lynn, and H. Shacham, “Short signatures from the Weil Multicast Routing in MANETs, Wireless Grids, and Resource Management in
pairing,” J. Cryptology, vol. 17, no. 4, pp. 297–319, Sep. 2004. Cloud Computing are among top down loaded articles in Elsevier Journals,
[29] S. Horng, S. Tzeng, Y. Pan, and P. Fan, “b-SPECS+: Batch verification namely Computer Communications, Information Sciences, E-Commerce Re-
for secure pseudonymous authentication in VANET,” IEEE Trans. Inf. search and Applications, and Network and Computer Applications. He has been
Forensics Security, vol. 8, no. 11, pp. 1860–1875, Nov. 2013. technical programme committee member of more than 30 national/international
[30] W. Sun, J. Liu, and H. Zhang, “When smart wearables meet intelligent ve- conferences.
hicles: Challenges and future directions,” IEEE Wireless Commun. Mag.,
vol. 24, no. 3, pp. 58–65, Jun. 2017.
[31] J. Liu, S. Zhang, W. Sun, and Y. Shi, “In-vehicle network attacks and
countermeasures: Challenges and future directions,” IEEE Netw. Mag.,
vol. 31, no. 5, pp. 50–58, Sep. 2017.
[32] A. Dhamgaye and N. Chavhan, “Survey on security challenges in
VANET,” Int. J. Comput. Sci., vol. 2, no. 1, pp. 88–96, 2013.
[33] Z. Lei, W. Qian, A. Solanas, and J. Domingo, “A scalable robust authen-
tication protocol for secure vehicular communications,” IEEE Tran. Veh.
Technol., vol. 59, no. 4, pp. 1606–1617, May 2010.
[34] P. Vijayakumar, M. Azees, A. Kannan, and L. J. Deborah, “Dual authen-
tication and key management techniques for secure data transmission in
vehicular ad hoc networks,” IEEE Trans. Intell. Transp. Syst., vol. 17,
no. 4, pp. 1015–1028, Apr. 2016.
[35] M. Azees, P. Vijayakumar, and L. J. Deborah, “Comprehensive survey on
security services in vehicular ad-hoc networks,” IET Intell. Transp. Syst.,
vol. 10, no. 6, pp. 379–388, Mar. 2016. Pascal Lorenz (SM’00) received the M.Sc. and Ph.D.
[36] A. Shamir, “Identity-based cryptosystems and signature schemes,” in from the University of Nancy, France, in 1990 and
Proc. Adv. Workshop Theory Appl. Cryptographic Tech., 1984, pp. 47– 1994, respectively. Between 1990 and 1995, he was
53. a Research Engineer with WorldFIP Europe and
[37] H. Yoon, J. H. Cheon, and Y. Kim, “Batch verifications with ID-based Alcatel-Alsthom. Since 1995, he is a Professor with
signatures,” in Proc. Int. Conf. Inf. Security Cryptology, 2005, pp. 233– the University of Haute-Alsace, Colmar, France. He is
248. the author/coauthor of 3 books, 3 patents, and 200 in-
[38] K. A. Shim, “An ID-based aggregate signature scheme with constant ternational publications in refereed journals and con-
pairing computations,” J. Syst. Softw., vol. 83, no. 10, pp. 1873–1880, Oct. ferences. His research interests include QoS, wireless
2010. networks, and high-speed networks. He was the Tech-
nical Editor of the IEEE Communications Magazine
Shrikant Tangade (M’16) received the B.E. degree Editorial Board (2000–2006), Chair of the Communications Systems Integration
in computer science and engineering and the M.Tech. and Modeling Technical Committee (2003–2009), Chair of Vertical Issues in
degree in computer network engineering from Communication Systems Technical Committee Cluster (2008–2009), and Chair
Visvesvaraya Technological University, Belgaum, of the Communications Software Technical Committee (2008–2010). He has
India, in 2007 and 2010, respectively. He is currently served as Co-Program Chair of IEEE Wireless Communications and Network-
working toward the Ph.D. degree in electronics and ing Conference (WCNC)’2012, International Conference on Communications
communication engineering in the area of Security (ICC)’2004 and 2017, tutorial Chair of Vehicular Technology Conferenc’2013
in Vehicular Ad Hoc Networks (VANETs). He has Spring and WCNC’2010, track Chair of Personal Indoor and Mobile Radio
two years of research experience in Indian Institute Communications’2012, symposium Co-Chair at Globecom 2007–2011, ICC
of Science, Bangalore, India. He has also six years 2008–2010, and ICC’2014 and 2016. He has served as Co-Guest Editor for
of teaching experience. He has selected and attended special issues of IEEE Communications Magazine, Networks Magazine, Wire-
“BMW Summer School-2016” at Munich, Germany. He is currently working less Communications Magazine, Telecommunications Systems, and LNCS. He
as an Assistant Professor with the School of Electronics and Communication is an Associate Editor of International Journal of Communication Systems
Engineering, REVA University, Bengaluru, India, and he is also the IEEE Stu- (IJCS-Wiley), Journal on Security and Communication Networks (SCN-Wiley)
dent Branch Counselor. His research interests include vehicular ad hoc net- and International Journal of Business Data Communications and Networking,
works, wireless sensor networks, and optical networks. He is the recipient of Journal of Network and Computer Applications (JNCA-Elsevier). He is senior
“Outstanding IEEE Branch Counselor-2017” by IEEE Bangalore Section and member of IARIA fellow and member of many international program commit-
“Outstanding IEEE Branch Counselor and Advisor Award-2017” by IEEE. He tees. He has organized many conferences, chaired several technical sessions
is a member of the IEEE Vehicular Technology Society and the IEEE Computer and gave tutorials at major international conferences. He was IEEE ComSoc
Society. Distinguished Lecturer Tour during 2013–2014.