Skip to main content
Erschienen in: Wireless Personal Communications 2/2019

18.02.2019

An Efficient Privacy Preserving Authentication Scheme for Vehicular Communications

verfasst von: Avleen Kaur Malhi, Shalini Batra, Husanbir Singh Pannu

Erschienen in: Wireless Personal Communications | Ausgabe 2/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The inter-vehicular communications need to be secure as well as anonymous as the security and privacy’s effective operations are demanding in order to deploy vehicular ad-hoc networks. In this paper, an effective private signature scheme is proposed to increase the effectiveness of the highly scalable networks such as VANETs. Initially, the regional transportation authority registers the vehicles in its region and the Key Generation Centre assigns the partial private key. A pseudonymous approach is employed for private communication among vehicles. Further, an aggregate signature verification scheme is employed which greatly reduces the signature verification time while enhancing the scalability of the proposed scheme. Thus, an effective private aggregate signature scheme is designed which reduces the signature verification time significantly while increasing the efficiency of the scheme. The empirical analysis on the proposed scheme using simulations confirms the superiority over the existing techniques.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat ElGamal, T. (1985). A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31(4), 469–472.MathSciNetMATHCrossRef ElGamal, T. (1985). A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31(4), 469–472.MathSciNetMATHCrossRef
2.
Zurück zum Zitat Johnson, D., & Menezes, A. (1999). The elliptic curve digital signature algorithm (ECDSA), Technical Report. Certicom Research, Canada; and Department Of Combinatorics and Optimization, University of Waterloo. Johnson, D., & Menezes, A. (1999). The elliptic curve digital signature algorithm (ECDSA), Technical Report. Certicom Research, Canada; and Department Of Combinatorics and Optimization, University of Waterloo.
3.
Zurück zum Zitat Gollan, L., & Meinel, C. (2002). Digital signatures for automobiles. In Proceedings of systemics, cybernetics and informatics. Gollan, L., & Meinel, C. (2002). Digital signatures for automobiles. In Proceedings of systemics, cybernetics and informatics.
4.
Zurück zum Zitat Cheng, X., Liu, J., & Wang, X. (2005). Identity-based aggregate and verifiably encrypted signatures from bilinear pairing. In Computational science and its applications—ICCSA 2005 (pp. 1046–1054). Berlin: Springer. Cheng, X., Liu, J., & Wang, X. (2005). Identity-based aggregate and verifiably encrypted signatures from bilinear pairing. In Computational science and its applications—ICCSA 2005 (pp. 1046–1054). Berlin: Springer.
5.
Zurück zum Zitat Gentry, C., & Ramzan, Z. (2006). Identity-based aggregate signatures. In Public key cryptography—PKC 2006 (pp. 257–273). Berlin: Springer. Gentry, C., & Ramzan, Z. (2006). Identity-based aggregate signatures. In Public key cryptography—PKC 2006 (pp. 257–273). Berlin: Springer.
6.
Zurück zum Zitat Herranz, J. (2006). Deterministic identity-based signatures for partial aggregation. The Computer Journal, 49(3), 322–330.CrossRef Herranz, J. (2006). Deterministic identity-based signatures for partial aggregation. The Computer Journal, 49(3), 322–330.CrossRef
7.
Zurück zum Zitat Gamage, C., Gras, B., Crispo, B., & Tanenbaum, A. S. (2006). An identity based ring signature scheme with enhanced privacy. In Proceedings of 2nd international conference on security and privacy in communication networks. Secure Comm. Gamage, C., Gras, B., Crispo, B., & Tanenbaum, A. S. (2006). An identity based ring signature scheme with enhanced privacy. In Proceedings of 2nd international conference on security and privacy in communication networks. Secure Comm.
9.
Zurück zum Zitat Baek, J., Steinfeld, R., & Zheng, Y. (2007). Formal proofs for the security of signcryption. Journal of Cryptography, 20, 203–235.MathSciNetMATH Baek, J., Steinfeld, R., & Zheng, Y. (2007). Formal proofs for the security of signcryption. Journal of Cryptography, 20, 203–235.MathSciNetMATH
10.
Zurück zum Zitat Kamat, P., Baliga, A., & Trappe, W. (2006). An identity-based security framework for VANETs. In Proceedings of the 3rd ACM international workshop on vehicular ad hoc networks 2006 (ppp. 94–95). Kamat, P., Baliga, A., & Trappe, W. (2006). An identity-based security framework for VANETs. In Proceedings of the 3rd ACM international workshop on vehicular ad hoc networks 2006 (ppp. 94–95).
11.
Zurück zum Zitat Sun, J., Zhang, C., & Fang, Y. (2007). An ID-based framework achieving privacy and non-repudiation in vehicular ad hoc networks. In Proceedings of IEEE military communications conference (pp. 1–7). Sun, J., Zhang, C., & Fang, Y. (2007). An ID-based framework achieving privacy and non-repudiation in vehicular ad hoc networks. In Proceedings of IEEE military communications conference (pp. 1–7).
12.
Zurück zum Zitat Biswas, S., & Misic, J. A. (2013). Cross layer approach to privacy-preventing authentication in WAVE-enabled VANETs. IEEE Transactions on Vehicular Technology, 62(5), 2182–2192.CrossRef Biswas, S., & Misic, J. A. (2013). Cross layer approach to privacy-preventing authentication in WAVE-enabled VANETs. IEEE Transactions on Vehicular Technology, 62(5), 2182–2192.CrossRef
13.
Zurück zum Zitat Gavril, O. (2009). Security in VANET. Graduation project. Polytehnica University of Bucharest. Gavril, O. (2009). Security in VANET. Graduation project. Polytehnica University of Bucharest.
14.
Zurück zum Zitat Bradai, A., & Afifi, H. (2011). A framework using IBC achieving non-repudiation and privacy in vehicular network. In Proceedings of IEEE conference on network and information system security (pp. 1–6). Bradai, A., & Afifi, H. (2011). A framework using IBC achieving non-repudiation and privacy in vehicular network. In Proceedings of IEEE conference on network and information system security (pp. 1–6).
15.
Zurück zum Zitat Malhi, A., & Batra, S. (2016). Privacy-preserving authentication framework using bloom filter for secure vehicular communications. International Journal of Information Security, 15(4), 433–453.CrossRef Malhi, A., & Batra, S. (2016). Privacy-preserving authentication framework using bloom filter for secure vehicular communications. International Journal of Information Security, 15(4), 433–453.CrossRef
16.
Zurück zum Zitat Malhi, A. K., & Batra, S. (2015). An efficient certificateless aggregate signature scheme for vehicular ad-hoc networks. Discrete Mathematics & Theoretical Computer Science, 17(1), 317–338.MathSciNetMATH Malhi, A. K., & Batra, S. (2015). An efficient certificateless aggregate signature scheme for vehicular ad-hoc networks. Discrete Mathematics & Theoretical Computer Science, 17(1), 317–338.MathSciNetMATH
17.
Zurück zum Zitat Boneh, D., & Franklin, M. K. (2001). Identity-based encryption from the Weil pairing. In J. Kilian (Ed.), CRYPTO. Lecture notes in computer science (Vol. 2139, pp. 213–229). Berlin: Springer. Boneh, D., & Franklin, M. K. (2001). Identity-based encryption from the Weil pairing. In J. Kilian (Ed.), CRYPTO. Lecture notes in computer science (Vol. 2139, pp. 213–229). Berlin: Springer.
18.
Zurück zum Zitat Boneh, D., Lynn, B., & Shacham, H. (2001). Short signatures from the Weil pairing. In Advances in cryptology ASIACRYPT (Vol. 2248, pp. 514–532). Berlin: Springer. Boneh, D., Lynn, B., & Shacham, H. (2001). Short signatures from the Weil pairing. In Advances in cryptology ASIACRYPT (Vol. 2248, pp. 514–532). Berlin: Springer.
19.
Zurück zum Zitat IEEE 1609.2. (2006). IEEE trial-use standard for wireless access in vehicular environments (WAVE). Security Services for Applications and Management Messages. IEEE Std. IEEE 1609.2, version. IEEE 1609.2. (2006). IEEE trial-use standard for wireless access in vehicular environments (WAVE). Security Services for Applications and Management Messages. IEEE Std. IEEE 1609.2, version.
Metadaten
Titel
An Efficient Privacy Preserving Authentication Scheme for Vehicular Communications
verfasst von
Avleen Kaur Malhi
Shalini Batra
Husanbir Singh Pannu
Publikationsdatum
18.02.2019
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2019
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-019-06175-7

Weitere Artikel der Ausgabe 2/2019

Wireless Personal Communications 2/2019 Zur Ausgabe

Neuer Inhalt