Skip to main content
Erschienen in: Telecommunication Systems 2/2022

26.07.2022

A mutual authentication scheme in VANET providing vehicular anonymity and tracking

verfasst von: Jiabei He, Xuchong Liu, Fan Wu, Chaoyang Chen, Xiong Li

Erschienen in: Telecommunication Systems | Ausgabe 2/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Nowadays, the intelligent transportation system (ITS) has developed prosperously all over the world. As a key technique in ITS, vehicular ad-hoc network (VANET) supports fast transmitting while bringing security problems simultaneously. To ensure efficiency, those unprotected data transmitting at a high speed can be easily eavesdropped on or forged, which will badly damage the ITS. To authenticate the identities of the vehicles in VANETs, signatures with certificates are often employed in historical research, but seldom study discusses the protection of generated data or mutual authentication between participants in VANETs. In order to tackle the problems above, we propose a new mutual authentication scheme for VANET where the private data can be kept away from attackers. In our scheme, the corresponding manager of each region can deal with the dynamic information of vehicles. The security analysis is also carried out and shown to emphasize the reliability of the scheme, such as anonymity, unlinkability and resistance to replay attacks, etc. Besides the resistance to different attacks, the real-time information secrecy can also be protected in our scheme, which is not achieved in the compared schemes. Moreover, the performance evaluation and simulation with NS-3 show that the packet delivery ratio reaches over 99% in most of the application scenarios, which proves that the scheme is efficient and practical.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Wang, W., Kumar, N., Chen, J., Gong, Z., Kong, X., Wei, W., & Gao, H. (2020). Realizing the potential of internet of things for smart tourism with 5G and AI. IEEE Network, 34(6), 295–301.CrossRef Wang, W., Kumar, N., Chen, J., Gong, Z., Kong, X., Wei, W., & Gao, H. (2020). Realizing the potential of internet of things for smart tourism with 5G and AI. IEEE Network, 34(6), 295–301.CrossRef
2.
Zurück zum Zitat Alamer, M., & Almaiah, M.A. (2021). Cybersecurity in smart city: A systematic mapping study. In 2021 International Conference on Information Technology (ICIT), IEEE, pp. 719–724. Alamer, M., & Almaiah, M.A. (2021). Cybersecurity in smart city: A systematic mapping study. In 2021 International Conference on Information Technology (ICIT), IEEE, pp. 719–724.
3.
Zurück zum Zitat Rustagi, A., Manchanda, C., & Sharma, N. (2020). Ioe: A boon & threat to the mankind. In 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT), IEEE, pp. 114–119. Rustagi, A., Manchanda, C., & Sharma, N. (2020). Ioe: A boon & threat to the mankind. In 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT), IEEE, pp. 114–119.
4.
Zurück zum Zitat Bai, J., Zeng, Z., Abualnaja, K.M., & Xiong, N.N. (2021). ADCC: An effective adaptive duty cycle control scheme for real time big data in green IoT. Alexandria Engineering Journal. Bai, J., Zeng, Z., Abualnaja, K.M., & Xiong, N.N. (2021). ADCC: An effective adaptive duty cycle control scheme for real time big data in green IoT. Alexandria Engineering Journal.
5.
Zurück zum Zitat Kaffash, S., Nguyen, A. T., & Zhu, J. (2021). Big data algorithms and applications in intelligent transportation system: A review and bibliometric analysis. International Journal of Production Economics, 231(107), 868. Kaffash, S., Nguyen, A. T., & Zhu, J. (2021). Big data algorithms and applications in intelligent transportation system: A review and bibliometric analysis. International Journal of Production Economics, 231(107), 868.
6.
Zurück zum Zitat Zhao, G., Jiang, Q., Huang, X., Ma, X., Tian, Y., & Ma, J. (2021). Secure and usable handshake based pairing for wrist-worn smart devices on different users. Mobile Networks and Applications pp 1–16. Zhao, G., Jiang, Q., Huang, X., Ma, X., Tian, Y., & Ma, J. (2021). Secure and usable handshake based pairing for wrist-worn smart devices on different users. Mobile Networks and Applications pp 1–16.
7.
Zurück zum Zitat Sumalee, A., & Ho, H. W. (2018). Smarter and more connected: Future intelligent transportation system. Iatss Research, 42(2), 67–71.CrossRef Sumalee, A., & Ho, H. W. (2018). Smarter and more connected: Future intelligent transportation system. Iatss Research, 42(2), 67–71.CrossRef
8.
Zurück zum Zitat Yang, Z., & Pun-Cheng, L. S. (2018). Vehicle detection in intelligent transportation systems and its applications under varying environments: A review. Image and Vision Computing, 69, 143–154.CrossRef Yang, Z., & Pun-Cheng, L. S. (2018). Vehicle detection in intelligent transportation systems and its applications under varying environments: A review. Image and Vision Computing, 69, 143–154.CrossRef
9.
Zurück zum Zitat Bai, J., Zeng, Z., Wang, T., Zhang, S., Xiong, N.N., & Liu, A. (2022). Tanto: An effective trust based unmanned aerial vehicle computing system for the internet-of-things. IEEE Internet of Things Journal. Bai, J., Zeng, Z., Wang, T., Zhang, S., Xiong, N.N., & Liu, A. (2022). Tanto: An effective trust based unmanned aerial vehicle computing system for the internet-of-things. IEEE Internet of Things Journal.
10.
Zurück zum Zitat Ghori, M.R., Zamli, K.Z., Quosthoni, N., Hisyam, M., & Montaser, M. (2018). Vehicular ad-hoc network (vanet). In 2018 IEEE international conference on innovative research and development (ICIRD), IEEE, pp. 1–6. Ghori, M.R., Zamli, K.Z., Quosthoni, N., Hisyam, M., & Montaser, M. (2018). Vehicular ad-hoc network (vanet). In 2018 IEEE international conference on innovative research and development (ICIRD), IEEE, pp. 1–6.
11.
Zurück zum Zitat Qu, F., Wu, Z., Wang, F. Y., & Cho, W. (2015). A security and privacy review of VANETs. IEEE Transactions on Intelligent Transportation Systems, 16(6), 2985–2996.CrossRef Qu, F., Wu, Z., Wang, F. Y., & Cho, W. (2015). A security and privacy review of VANETs. IEEE Transactions on Intelligent Transportation Systems, 16(6), 2985–2996.CrossRef
12.
Zurück zum Zitat Hussain, R., Hussain, F., & Zeadally, S. (2019). Integration of VANET and 5g security: A review of design and implementation issues. Future Generation Computer Systems, 101, 843–864.CrossRef Hussain, R., Hussain, F., & Zeadally, S. (2019). Integration of VANET and 5g security: A review of design and implementation issues. Future Generation Computer Systems, 101, 843–864.CrossRef
13.
Zurück zum Zitat Hezam, M.A., Junaid, A., Syed, A., Nazri, M., Warip, M., Fazira, K.N., Azir, K., & Nurul Hidayah, R. (2018). Classification of security attacks in VANET: A review of requirements and perspectives. Hezam, M.A., Junaid, A., Syed, A., Nazri, M., Warip, M., Fazira, K.N., Azir, K., & Nurul Hidayah, R. (2018). Classification of security attacks in VANET: A review of requirements and perspectives.
14.
Zurück zum Zitat Mustafa, A.S., Hamdi, M.M., Mahdi, H.F., & Abood, M.S. (2020). VANET: Towards security issues review. In 2020 IEEE 5th international symposium on telecommunication technologies (ISTT), IEEE, pp. 151–156. Mustafa, A.S., Hamdi, M.M., Mahdi, H.F., & Abood, M.S. (2020). VANET: Towards security issues review. In 2020 IEEE 5th international symposium on telecommunication technologies (ISTT), IEEE, pp. 151–156.
15.
Zurück zum Zitat Lu, R., Lin, X., Zhu, H., Ho, P.H., & Shen, X. (2008). Ecpp: Efficient conditional privacy preservation protocol for secure vehicular communications. In INFOCOM 2008. The 27th Conference on Computer Communications. IEEE, IEEE, pp. 1229–1237. Lu, R., Lin, X., Zhu, H., Ho, P.H., & Shen, X. (2008). Ecpp: Efficient conditional privacy preservation protocol for secure vehicular communications. In INFOCOM 2008. The 27th Conference on Computer Communications. IEEE, IEEE, pp. 1229–1237.
16.
Zurück zum Zitat Zhang, C., Lu, R., Lin, X., Ho, P.H., & Shen, X. (2008). An efficient identity-based batch verification scheme for vehicular sensor networks. In INFOCOM 2008. The 27th Conference on Computer Communications. IEEE, IEEE, pp. 246–250. Zhang, C., Lu, R., Lin, X., Ho, P.H., & Shen, X. (2008). An efficient identity-based batch verification scheme for vehicular sensor networks. In INFOCOM 2008. The 27th Conference on Computer Communications. IEEE, IEEE, pp. 246–250.
17.
Zurück zum Zitat He, D., Zeadally, S., Xu, B., & Huang, X. (2015). An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Transactions on Information Forensics and Security, 10(12), 2681–2691.CrossRef He, D., Zeadally, S., Xu, B., & Huang, X. (2015). An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Transactions on Information Forensics and Security, 10(12), 2681–2691.CrossRef
18.
Zurück zum Zitat Horng, S. J., Tzeng, S. F., Huang, P. H., Wang, X., Li, T., & Khan, M. K. (2015). An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks. Information Sciences, 317, 48–66.CrossRef Horng, S. J., Tzeng, S. F., Huang, P. H., Wang, X., Li, T., & Khan, M. K. (2015). An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks. Information Sciences, 317, 48–66.CrossRef
19.
Zurück zum Zitat Li, J., Yuan, H., & Zhang, Y. (2015). Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks. Networks, 317, 48–66. Li, J., Yuan, H., & Zhang, Y. (2015). Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks. Networks, 317, 48–66.
20.
Zurück zum Zitat Cui, J., Zhang, J., Zhong, H., Shi, R., & Xu, Y. (2018). An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks. Information Sciences, 451, 1–15. Cui, J., Zhang, J., Zhong, H., Shi, R., & Xu, Y. (2018). An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks. Information Sciences, 451, 1–15.
21.
Zurück zum Zitat Gayathri, N., Thumbur, G., Reddy, P. V., & Muhammad, Z. U. R. (2018). Efficient pairing-free certificateless authentication scheme with batch verification for vehicular ad-hoc networks. IEEE Access, 6, 31,808-31,819.CrossRef Gayathri, N., Thumbur, G., Reddy, P. V., & Muhammad, Z. U. R. (2018). Efficient pairing-free certificateless authentication scheme with batch verification for vehicular ad-hoc networks. IEEE Access, 6, 31,808-31,819.CrossRef
22.
Zurück zum Zitat Liu, Y. N., Lv, S. Z., Xie, M., Chen, Z. B., & Wang, P. (2019). Dynamic anonymous identity authentication (DAIA) scheme for VANET. International Journal of Communication Systems, 32(5), e3892.CrossRef Liu, Y. N., Lv, S. Z., Xie, M., Chen, Z. B., & Wang, P. (2019). Dynamic anonymous identity authentication (DAIA) scheme for VANET. International Journal of Communication Systems, 32(5), e3892.CrossRef
23.
Zurück zum Zitat Li, X., Niu, J. W., Ma, J., Wang, W. D., & Liu, C. L. (2011). Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. Journal of network and computer applications, 34(1), 73–79.CrossRef Li, X., Niu, J. W., Ma, J., Wang, W. D., & Liu, C. L. (2011). Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. Journal of network and computer applications, 34(1), 73–79.CrossRef
24.
Zurück zum Zitat Li, X., Xiong, Y., Ma, J., & Wang, W. (2012). An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards. Journal of Network and Computer Applications, 35(2), 763–769.CrossRef Li, X., Xiong, Y., Ma, J., & Wang, W. (2012). An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards. Journal of Network and Computer Applications, 35(2), 763–769.CrossRef
25.
Zurück zum Zitat Li, X., Ma, J., Wang, W., Xiong, Y., & Zhang, J. (2013). A novel smart card and dynamic id based remote user authentication scheme for multi-server environments. Mathematical and Computer Modelling, 58(1–2), 85–95.CrossRef Li, X., Ma, J., Wang, W., Xiong, Y., & Zhang, J. (2013). A novel smart card and dynamic id based remote user authentication scheme for multi-server environments. Mathematical and Computer Modelling, 58(1–2), 85–95.CrossRef
26.
Zurück zum Zitat Wu, F., Li, X., Sangaiah, A. K., Xu, L., Kumari, S., Wu, L., & Shen, J. (2018). A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks. Future Generation Computer Systems, 82, 727–737.CrossRef Wu, F., Li, X., Sangaiah, A. K., Xu, L., Kumari, S., Wu, L., & Shen, J. (2018). A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks. Future Generation Computer Systems, 82, 727–737.CrossRef
28.
Zurück zum Zitat Islam, S. H., Obaidat, M. S., Vijayakumar, P., Abdulhay, E., Li, F., & Reddy, M. K. C. (2018). A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for vanets. Future Generation Computer Systems, 84, 216–227.CrossRef Islam, S. H., Obaidat, M. S., Vijayakumar, P., Abdulhay, E., Li, F., & Reddy, M. K. C. (2018). A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for vanets. Future Generation Computer Systems, 84, 216–227.CrossRef
29.
Zurück zum Zitat Cui, J., Tao, X., Zhang, J., Xu, Y., & Zhong, H. (2018). Hcpa-gka: A hash function-based conditional privacy-preserving authentication and group-key agreement scheme for vanets. Vehicular Communications, 14, 15–25.CrossRef Cui, J., Tao, X., Zhang, J., Xu, Y., & Zhong, H. (2018). Hcpa-gka: A hash function-based conditional privacy-preserving authentication and group-key agreement scheme for vanets. Vehicular Communications, 14, 15–25.CrossRef
30.
Zurück zum Zitat Zc, Liu, Xiong, L., Peng, T., Dy, Peng, & Hb, Liang. (2018). A realistic distributed conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Access, 6, 26,307-26,317.CrossRef Zc, Liu, Xiong, L., Peng, T., Dy, Peng, & Hb, Liang. (2018). A realistic distributed conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Access, 6, 26,307-26,317.CrossRef
31.
Zurück zum Zitat Wang, Y., Ding, Y., Wu, Q., Wei, Y., Qin, B., & Wang, H. (2018). Privacy-preserving cloud-based road condition monitoring with source authentication in VANETs. IEEE Transactions on Information Forensics and Security, 14(7), 1779–1790.CrossRef Wang, Y., Ding, Y., Wu, Q., Wei, Y., Qin, B., & Wang, H. (2018). Privacy-preserving cloud-based road condition monitoring with source authentication in VANETs. IEEE Transactions on Information Forensics and Security, 14(7), 1779–1790.CrossRef
32.
Zurück zum Zitat Luo, M., Sun, A., He, D., & Li, X. (2018). An efficient and secure 3-factor user-authentication protocol for multiserver environment. International Journal of Communication Systems, 31(14), e3734.CrossRef Luo, M., Sun, A., He, D., & Li, X. (2018). An efficient and secure 3-factor user-authentication protocol for multiserver environment. International Journal of Communication Systems, 31(14), e3734.CrossRef
33.
Zurück zum Zitat Zhang, Y., Luo, M., Choo, K.K.R., & He, D. (2018). A general architecture for multiserver authentication key agreement with provable security. Security and Communication Networks 2018. Zhang, Y., Luo, M., Choo, K.K.R., & He, D. (2018). A general architecture for multiserver authentication key agreement with provable security. Security and Communication Networks 2018.
34.
Zurück zum Zitat Ma, M., He, D., Wang, H., Kumar, N., & Choo, K. K. R. (2019). An efficient and provably-secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks. IEEE Internet of Things Journal, 6(5), 8065–8075.CrossRef Ma, M., He, D., Wang, H., Kumar, N., & Choo, K. K. R. (2019). An efficient and provably-secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks. IEEE Internet of Things Journal, 6(5), 8065–8075.CrossRef
35.
Zurück zum Zitat Malhi, A. K., Batra, S., & Pannu, H. S. (2019). An efficient privacy preserving authentication scheme for vehicular communications. Wireless Personal Communications, 106(2), 487–503.CrossRef Malhi, A. K., Batra, S., & Pannu, H. S. (2019). An efficient privacy preserving authentication scheme for vehicular communications. Wireless Personal Communications, 106(2), 487–503.CrossRef
36.
Zurück zum Zitat Cui, J., Zhang, X., Zhong, H., Ying, Z., & Liu, L. (2019). Rsma: Reputation system-based lightweight message authentication framework and protocol for 5g-enabled vehicular networks. IEEE Internet of Things Journal, 6(4), 6417–6428.CrossRef Cui, J., Zhang, X., Zhong, H., Ying, Z., & Liu, L. (2019). Rsma: Reputation system-based lightweight message authentication framework and protocol for 5g-enabled vehicular networks. IEEE Internet of Things Journal, 6(4), 6417–6428.CrossRef
38.
Zurück zum Zitat Cui, J., Wu, D., Zhang, J., Xu, Y., & Zhong, H. (2019). An efficient authentication scheme based on semi-trusted authority in vanets. IEEE Transactions on Vehicular Technology, 68(3), 2972–2986.CrossRef Cui, J., Wu, D., Zhang, J., Xu, Y., & Zhong, H. (2019). An efficient authentication scheme based on semi-trusted authority in vanets. IEEE Transactions on Vehicular Technology, 68(3), 2972–2986.CrossRef
39.
Zurück zum Zitat Cui, J., Xu, W., Han, Y., Zhang, J., & Zhong, H. (2020). Secure mutual authentication with privacy preservation in vehicular ad hoc networks. Vehicular Communications, 21(100), 200. Cui, J., Xu, W., Han, Y., Zhang, J., & Zhong, H. (2020). Secure mutual authentication with privacy preservation in vehicular ad hoc networks. Vehicular Communications, 21(100), 200.
40.
Zurück zum Zitat Jiang, Q., Zhang, N., Ni, J., Ma, J., Ma, X., & Choo, K. K. R. (2020). Unified biometric privacy preserving three-factor authentication and key agreement for cloud-assisted autonomous vehicles. IEEE Transactions on Vehicular Technology, 69(9), 9390–9401. Jiang, Q., Zhang, N., Ni, J., Ma, J., Ma, X., & Choo, K. K. R. (2020). Unified biometric privacy preserving three-factor authentication and key agreement for cloud-assisted autonomous vehicles. IEEE Transactions on Vehicular Technology, 69(9), 9390–9401.
41.
Zurück zum Zitat Jiang, Q., Zhang, X., Zhang, N., Tian, Y., Ma, X., & Ma, J. (2021). Three-factor authentication protocol using physical unclonable function for IoV. Computer Communications, 173, 45–55.CrossRef Jiang, Q., Zhang, X., Zhang, N., Tian, Y., Ma, X., & Ma, J. (2021). Three-factor authentication protocol using physical unclonable function for IoV. Computer Communications, 173, 45–55.CrossRef
44.
Zurück zum Zitat Pointcheval, D., & Stern, J. (1996). Security proofs for signature schemes. In International conference on the theory and applications of cryptographic techniques (Springer, pp. 387–398). Pointcheval, D., & Stern, J. (1996). Security proofs for signature schemes. In International conference on the theory and applications of cryptographic techniques (Springer, pp. 387–398).
Metadaten
Titel
A mutual authentication scheme in VANET providing vehicular anonymity and tracking
verfasst von
Jiabei He
Xuchong Liu
Fan Wu
Chaoyang Chen
Xiong Li
Publikationsdatum
26.07.2022
Verlag
Springer US
Erschienen in
Telecommunication Systems / Ausgabe 2/2022
Print ISSN: 1018-4864
Elektronische ISSN: 1572-9451
DOI
https://doi.org/10.1007/s11235-022-00911-4

Weitere Artikel der Ausgabe 2/2022

Telecommunication Systems 2/2022 Zur Ausgabe

Neuer Inhalt