Skip to main content

2018 | OriginalPaper | Buchkapitel

A VANET Anonymous Authentication Mechanism for Multi-level Application Scenarios

verfasst von : Xiaoliang Wang, Jianming Jiang, Baowei Wang, Zhihua Xia

Erschienen in: Cloud Computing and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Vehicular Ad-hoc Network (VANET) is a rapid developing application of the Internet of Things, which has totally difference with the conventional traffic network. On one hand, a VANET needs to provide end-to-end verification that has been widely concerned by researchers. On the other hand, the privacy is also very important in a VANET. Because of the openness of VANETs, conventional security measures do not effectively guarantee vehicle’s privacy. In other words, there is an urgent requirement for new security schemes to guarantee vehicular privacy in VANETs. Therefore, ensuring anonymity and authentication is a double requirement in VANETs. The both requirements seem contradictory but have to coexist. However, effective technology is few in literature and the existing anonymous authentication schemes cannot provide reverse trace mechanism when anonymity abuse happens. At the same time, these existing researches are limited to the application layer without considering the particularity of the perception layer and network layer. Without the support of the lower layer, the upper layer cannot achieve real security. Our aim is to build a lightweight anonymous authentication security system under the privacy preserving which considers the limitation of bottom layer devices and anonymity abuse problem.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Cheng, W., Cheng, X., Song, M., Chen, B., Zhao, W.W.: On the design and deployment of RFID assisted navigation systems for VANETs. IEEE Trans. Parallel Distrib. Syst. 23, 1267–1274 (2012)CrossRef Cheng, W., Cheng, X., Song, M., Chen, B., Zhao, W.W.: On the design and deployment of RFID assisted navigation systems for VANETs. IEEE Trans. Parallel Distrib. Syst. 23, 1267–1274 (2012)CrossRef
2.
Zurück zum Zitat Mojtaba, A., Wan, H.H., Mazdak, Z., Sasan, K., Eghbal, G.: Implementation and evaluation of lightweight encryption algorithms suitable for RFID. J. Next Gener. Inf. Technol. 4, 65–77 (2013)CrossRef Mojtaba, A., Wan, H.H., Mazdak, Z., Sasan, K., Eghbal, G.: Implementation and evaluation of lightweight encryption algorithms suitable for RFID. J. Next Gener. Inf. Technol. 4, 65–77 (2013)CrossRef
3.
Zurück zum Zitat Sun, X., Lin, X., Ho, P.H.: Secure vehicular communications based on group signature and id-based signature scheme. In: IEEE International Conference on Communications, pp. 1539–1545. IEEE Press, New York (2007) Sun, X., Lin, X., Ho, P.H.: Secure vehicular communications based on group signature and id-based signature scheme. In: IEEE International Conference on Communications, pp. 1539–1545. IEEE Press, New York (2007)
4.
Zurück zum Zitat Guo, J., Baugh, J.P., Wang, S.: A group signature based secure and privacy-preserving vehicular communication framework. In: Mobile Networking for Vehicular Environments, pp. 103–108 (2007) Guo, J., Baugh, J.P., Wang, S.: A group signature based secure and privacy-preserving vehicular communication framework. In: Mobile Networking for Vehicular Environments, pp. 103–108 (2007)
5.
Zurück zum Zitat Calandriello, G., Papadimitratos, P., Hubaux, J.P., Lioy, A.: Efficient and robust pseudonymous authentication in VANET. In: International Workshop on Vehicular Ad Hoc Networks, Vanet 2007, Montréal, Québec, Canada, September, pp. 19–28 (2007) Calandriello, G., Papadimitratos, P., Hubaux, J.P., Lioy, A.: Efficient and robust pseudonymous authentication in VANET. In: International Workshop on Vehicular Ad Hoc Networks, Vanet 2007, Montréal, Québec, Canada, September, pp. 19–28 (2007)
6.
Zurück zum Zitat Sun, J., Zhang, C., Zhang, Y., Fang, Y.: An identity-based security system for user privacy in vehicular ad hoc networks. IEEE Trans. Parallel Distrib. Syst. 21, 1227–1239 (2010)CrossRef Sun, J., Zhang, C., Zhang, Y., Fang, Y.: An identity-based security system for user privacy in vehicular ad hoc networks. IEEE Trans. Parallel Distrib. Syst. 21, 1227–1239 (2010)CrossRef
7.
Zurück zum Zitat Li, J., Lu, H., Guizani, M.: ACPN: a novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs. IEEE Trans. Parallel Distrib. Syst. 26, 938–948 (2015)CrossRef Li, J., Lu, H., Guizani, M.: ACPN: a novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs. IEEE Trans. Parallel Distrib. Syst. 26, 938–948 (2015)CrossRef
8.
Zurück zum Zitat Bevish, J.Y.: An efficient authentication scheme for VANET using Cha Cheon’s ID based signatures. Indian J. Appl. Res. 4, 106–109 (2014) Bevish, J.Y.: An efficient authentication scheme for VANET using Cha Cheon’s ID based signatures. Indian J. Appl. Res. 4, 106–109 (2014)
9.
Zurück zum Zitat He, D., Zeadally, S., Xu, B., Huang, X.: An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans. Inf. Forensics Secur. 10, 2681–2691 (2015)CrossRef He, D., Zeadally, S., Xu, B., Huang, X.: An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans. Inf. Forensics Secur. 10, 2681–2691 (2015)CrossRef
10.
Zurück zum Zitat Wang, X., Li, S., Zhao, S., Xia, Z., Bai, L.: A vehicular ad hoc network privacy protection scheme without a trusted third party. Int. J. Distrib. Sens. Netw. 13, 1–10 (2017) Wang, X., Li, S., Zhao, S., Xia, Z., Bai, L.: A vehicular ad hoc network privacy protection scheme without a trusted third party. Int. J. Distrib. Sens. Netw. 13, 1–10 (2017)
11.
Zurück zum Zitat He, D.B., Zeadally, S., Xu, B.W., Huang, X.Y.: An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans. Inf. Forensic Secur. 10, 2681–2691 (2015)CrossRef He, D.B., Zeadally, S., Xu, B.W., Huang, X.Y.: An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans. Inf. Forensic Secur. 10, 2681–2691 (2015)CrossRef
12.
Zurück zum Zitat Chim, T.W., Yiu, S.M., Hui, L.C.K., Li, V.O.K.: VSPN: VANET-based secure and privacy-preserving navigation. IEEE Trans. Comput. 63, 510–524 (2014)MathSciNetCrossRef Chim, T.W., Yiu, S.M., Hui, L.C.K., Li, V.O.K.: VSPN: VANET-based secure and privacy-preserving navigation. IEEE Trans. Comput. 63, 510–524 (2014)MathSciNetCrossRef
13.
Zurück zum Zitat Berg, E.V.D., Zhang, T., Pietrowicz, S.: Blend-in: a privacy-enhancing certificate-selection method for vehicular communication. IEEE Trans. Veh. Technol. 58, 5190–5199 (2009)CrossRef Berg, E.V.D., Zhang, T., Pietrowicz, S.: Blend-in: a privacy-enhancing certificate-selection method for vehicular communication. IEEE Trans. Veh. Technol. 58, 5190–5199 (2009)CrossRef
14.
Zurück zum Zitat Chen, J., Xu, H., Zhu, L.: Query-aware location privacy model based on p-sensitive and k-anonymity for road networks. Internet Things 2012, 157–165 (2012)CrossRef Chen, J., Xu, H., Zhu, L.: Query-aware location privacy model based on p-sensitive and k-anonymity for road networks. Internet Things 2012, 157–165 (2012)CrossRef
15.
Zurück zum Zitat Caballero-Gil, C., Molina-Gil, J., Hernandez-Serrano, J., Leon, O., Soriano-Ibanez, M.: Providing k-anonymity and revocation in ubiquitous VANETs. Ad Hoc Netw. 36, 482–494 (2016)CrossRef Caballero-Gil, C., Molina-Gil, J., Hernandez-Serrano, J., Leon, O., Soriano-Ibanez, M.: Providing k-anonymity and revocation in ubiquitous VANETs. Ad Hoc Netw. 36, 482–494 (2016)CrossRef
16.
Zurück zum Zitat Wang, M.Z., Liu, D., Zhu, L.H., Xu, Y.J., Wang, F.: LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication. Computing 98, 685–708 (2016)MathSciNetCrossRef Wang, M.Z., Liu, D., Zhu, L.H., Xu, Y.J., Wang, F.: LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication. Computing 98, 685–708 (2016)MathSciNetCrossRef
17.
Zurück zum Zitat Wang, F., Xu, Y.J., Zhang, H.W., Zhang, Y.J., Zhu, L.H.: 2FLIP: a two-factor lightweight privacy-preserving authentication scheme for VANET. IEEE Trans. Veh. Technol. 65, 896–911 (2016)CrossRef Wang, F., Xu, Y.J., Zhang, H.W., Zhang, Y.J., Zhu, L.H.: 2FLIP: a two-factor lightweight privacy-preserving authentication scheme for VANET. IEEE Trans. Veh. Technol. 65, 896–911 (2016)CrossRef
18.
Zurück zum Zitat Tzeng, S.F., Horng, S.J., Li, T.R., Wang, X., Huang, P.H., Khan, M.K.: Enhancing security and privacy for identity-based batch verification scheme in VANETs. IEEE Trans. Veh. Technol. 66, 3235–3248 (2017)CrossRef Tzeng, S.F., Horng, S.J., Li, T.R., Wang, X., Huang, P.H., Khan, M.K.: Enhancing security and privacy for identity-based batch verification scheme in VANETs. IEEE Trans. Veh. Technol. 66, 3235–3248 (2017)CrossRef
19.
Zurück zum Zitat Vijayakumar, P., Chang, V., Deborah, L.J., Balusamy, B., Shynu, P.G.: Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks. Futur. Gener. Comp. Syst. 78, 943–955 (2018)CrossRef Vijayakumar, P., Chang, V., Deborah, L.J., Balusamy, B., Shynu, P.G.: Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks. Futur. Gener. Comp. Syst. 78, 943–955 (2018)CrossRef
20.
21.
Zurück zum Zitat Chao, W., Xiang-yong, S., Zhi-hua, N.: The research of the promotion for ECDSA algorithm based on Montgomery-form ECC. J. Commun. 31, 9–13 (2010) Chao, W., Xiang-yong, S., Zhi-hua, N.: The research of the promotion for ECDSA algorithm based on Montgomery-form ECC. J. Commun. 31, 9–13 (2010)
22.
Zurück zum Zitat Pathak, V., Yao, D., Iftode, L.: Securing location aware services over VANET using geographical secure path routing. In: IEEE International Conference on Vehicular Electronics and Safety, pp. 346–353. IEEE Press, New York (2010) Pathak, V., Yao, D., Iftode, L.: Securing location aware services over VANET using geographical secure path routing. In: IEEE International Conference on Vehicular Electronics and Safety, pp. 346–353. IEEE Press, New York (2010)
23.
Zurück zum Zitat Chao, W., Guang-yue, H., Huan-guo, Z.: Lightweight security architecture design for wireless sensor network. J. Commun. 33, 30–35 (2012) Chao, W., Guang-yue, H., Huan-guo, Z.: Lightweight security architecture design for wireless sensor network. J. Commun. 33, 30–35 (2012)
25.
Zurück zum Zitat Wang, H., Li, B., Yu, W.: Montgomery algorithm on elliptic curves over finite fields of character three. J. Commun. 29, 25–28 (2008) Wang, H., Li, B., Yu, W.: Montgomery algorithm on elliptic curves over finite fields of character three. J. Commun. 29, 25–28 (2008)
Metadaten
Titel
A VANET Anonymous Authentication Mechanism for Multi-level Application Scenarios
verfasst von
Xiaoliang Wang
Jianming Jiang
Baowei Wang
Zhihua Xia
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-030-00015-8_61