Skip to main content
Erschienen in: Wireless Personal Communications 2/2019

14.02.2019

An Enhanced Secure Authentication Scheme for Vehicular Ad Hoc Networks Without Pairings

verfasst von: J. Jenefa, E. A. Mary Anita

Erschienen in: Wireless Personal Communications | Ausgabe 2/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In the recent paper, Nai-Wei Lo and Jia-Lun Tsai mathematically proposed an efficient authentication scheme for vehicular sensor network. It uses elliptic curve cryptography based ID-based signature (IBS) for authentication purpose without pairings. The proposed scheme provides secure authentication in Vehicle-to-RSU (V2R) and RSU-to-Vehicle (R2V) communications. But it does not provide secure Vehicle-to-Vehicle (V2V) communications. It also has few other drawbacks. Hence, we propose a new ID-based authentication scheme without pairings for vehicular networks. It provides secure V2R, R2V and V2V communications with other security features like privacy preservation, message integrity and tracability. In this paper, we first review the authentication scheme proposed by Nai-Wei Lo et al. along with its limitations. Then we illustrate the proposed IBS based authentication scheme without pairings. At last, the performance of the proposed scheme is compared with that of the Nai-Wei Lo et al.’s scheme. NS2 simulation result shows that the proposed scheme has less computation and communication overhead than the latter scheme.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Azimi, R., Bhatia, G., Rajkumar, R., & Mudalige, P. (2011). Vehicular networks for collision avoidance at intersections. In Proceedings of SAE World Congress, Detroit, MI, USA, April 2011 (pp. 1–11). Azimi, R., Bhatia, G., Rajkumar, R., & Mudalige, P. (2011). Vehicular networks for collision avoidance at intersections. In Proceedings of SAE World Congress, Detroit, MI, USA, April 2011 (pp. 1–11).
2.
Zurück zum Zitat Zeadally, S., et al. (2012). Vehicular ad hoc networks (VANETS): Status, results, and challenges. Telecommunication Systems, 50(4), 217–241.CrossRef Zeadally, S., et al. (2012). Vehicular ad hoc networks (VANETS): Status, results, and challenges. Telecommunication Systems, 50(4), 217–241.CrossRef
3.
Zurück zum Zitat Misener, J. A. (2005). Vehicle-infrastructure integration (VII) and safety: Rubber and radio meets the road in California. Intellimotion, 11(2), 1–3. Misener, J. A. (2005). Vehicle-infrastructure integration (VII) and safety: Rubber and radio meets the road in California. Intellimotion, 11(2), 1–3.
4.
Zurück zum Zitat Lee, U., et al. (2006). Mobeyes: Smart mobs for urban monitoring with a vehicular sensor network. IEEE Wireless Communications, 13(5), 52–57.CrossRef Lee, U., et al. (2006). Mobeyes: Smart mobs for urban monitoring with a vehicular sensor network. IEEE Wireless Communications, 13(5), 52–57.CrossRef
5.
Zurück zum Zitat Fuentes, J. M. D., et al. (2011). Overview of security issues in vehicular ad-hoc networks. In M. M. Cruz-Cunha & F. Moreira (Eds.), Handbook of research on mobility and computing (pp. 894–911), IGI Global. https://www.igi-global.com/. Fuentes, J. M. D., et al. (2011). Overview of security issues in vehicular ad-hoc networks. In M. M. Cruz-Cunha & F. Moreira (Eds.), Handbook of research on mobility and computing (pp. 894–911), IGI Global. https://​www.​igi-global.​com/​.
6.
Zurück zum Zitat Armknecht, F., et al. (2007). Cross-layer privacy enhancement and non-repudiation in vehicular communication. In Proceedings of ITG-GI conference on communication in distributed systems (KiVS) (pp. 1–12). Armknecht, F., et al. (2007). Cross-layer privacy enhancement and non-repudiation in vehicular communication. In Proceedings of ITG-GI conference on communication in distributed systems (KiVS) (pp. 1–12).
7.
Zurück zum Zitat Yoon, H., Cheon, J. H., & Kim, Y. (2005). Batch verifications with ID-based signatures. In Proceedings of ICISC (pp. 233–248). Yoon, H., Cheon, J. H., & Kim, Y. (2005). Batch verifications with ID-based signatures. In Proceedings of ICISC (pp. 233–248).
8.
Zurück zum Zitat Zhang, C., Lu, R., Lin, X., Ho, P. -H., & Shen, X. (2008). An efficient identity based batch verification scheme for vehicular sensor networks. In Proceedings of IEEE INFOCOM (pp. 246–250). Zhang, C., Lu, R., Lin, X., Ho, P. -H., & Shen, X. (2008). An efficient identity based batch verification scheme for vehicular sensor networks. In Proceedings of IEEE INFOCOM (pp. 246–250).
9.
Zurück zum Zitat Shim, K. A. (2010). An ID-based aggregate signature scheme with constant pairing computations. Journal of Systems and Software, 83(10), 1873–1880.CrossRef Shim, K. A. (2010). An ID-based aggregate signature scheme with constant pairing computations. Journal of Systems and Software, 83(10), 1873–1880.CrossRef
10.
Zurück zum Zitat Shim, K. A. (2013). Reconstruction of a secure authentication scheme for vehicular ad hoc networks using a binary authentication tree. IEEE Transactions on Wireless Communications, 12(11), 5386–5393.CrossRef Shim, K. A. (2013). Reconstruction of a secure authentication scheme for vehicular ad hoc networks using a binary authentication tree. IEEE Transactions on Wireless Communications, 12(11), 5386–5393.CrossRef
11.
Zurück zum Zitat Barreto, P. S. L. M., Kim, H. Y., Lynn, B., & Scott, M. (2002). Efficient algorithms for pairing-based cryptosystems. In Proceedings of cryptology (pp. 354–368). Barreto, P. S. L. M., Kim, H. Y., Lynn, B., & Scott, M. (2002). Efficient algorithms for pairing-based cryptosystems. In Proceedings of cryptology (pp. 354–368).
12.
Zurück zum Zitat Tsai, J. L., & Lo, N. W. (2015). A privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Systems Journal, 9(3), 805–815.CrossRef Tsai, J. L., & Lo, N. W. (2015). A privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Systems Journal, 9(3), 805–815.CrossRef
13.
Zurück zum Zitat Lo, N.-W., & Tsai, J.-L. (2016). An efficient conditional privacy-preservation scheme for vehicular sensor networks without pairings. IEEE Transactions on Intelligent Transportation Systems, 17(5), 1319–1328.CrossRef Lo, N.-W., & Tsai, J.-L. (2016). An efficient conditional privacy-preservation scheme for vehicular sensor networks without pairings. IEEE Transactions on Intelligent Transportation Systems, 17(5), 1319–1328.CrossRef
14.
Zurück zum Zitat Hunag, J. L., Yeh, L. Y., & Chien, H. Y. (2011). ABAKA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology, 60(1), 248–262.CrossRef Hunag, J. L., Yeh, L. Y., & Chien, H. Y. (2011). ABAKA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology, 60(1), 248–262.CrossRef
15.
Zurück zum Zitat Raya, M., et al. (2007). Securing vehicular ad hoc networks. Journal of Computer Security, 15(1), 39–68.CrossRef Raya, M., et al. (2007). Securing vehicular ad hoc networks. Journal of Computer Security, 15(1), 39–68.CrossRef
16.
Zurück zum Zitat Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In Advances in cryptology (pp. 47–53). New York, NY: Springer. Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In Advances in cryptology (pp. 47–53). New York, NY: Springer.
17.
Zurück zum Zitat Yeh, L. Y., & Lin, Y. C. (2014). A proxy-based authentication and billing scheme with incentive-aware multihop forwarding for vehicular networks. IEEE Transactions on Intelligent Transportation Systems, 15(4), 1607–1621.CrossRef Yeh, L. Y., & Lin, Y. C. (2014). A proxy-based authentication and billing scheme with incentive-aware multihop forwarding for vehicular networks. IEEE Transactions on Intelligent Transportation Systems, 15(4), 1607–1621.CrossRef
18.
Zurück zum Zitat Intelligent Transportation Systems Committee. (2006). IEEE Trial-Use standard for wireless access in vehicular environments (WAVE)—Security services for applications and management messages, IEEE Std. 1609.2, July 2006. Intelligent Transportation Systems Committee. (2006). IEEE Trial-Use standard for wireless access in vehicular environments (WAVE)Security services for applications and management messages, IEEE Std. 1609.2, July 2006.
19.
Zurück zum Zitat Liu, J. K., Yuen, T. H., Au, M. H., & Susilo, W. (2014). Improvements on an authentication scheme for vehicular sensor networks. Expert Systems with Applications, 41(5), 2559–2564.CrossRef Liu, J. K., Yuen, T. H., Au, M. H., & Susilo, W. (2014). Improvements on an authentication scheme for vehicular sensor networks. Expert Systems with Applications, 41(5), 2559–2564.CrossRef
20.
Zurück zum Zitat Pointcheval, D., & Stern, J. (2000). Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13(3), 361–396.CrossRefMATH Pointcheval, D., & Stern, J. (2000). Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13(3), 361–396.CrossRefMATH
21.
Zurück zum Zitat Pointcheval, D., & Stern, J. (1996). Security arguments for digital signatures and blind signatures. In Proceedings of Eueocrypt (Vol. 1070, pp. 387–398). Pointcheval, D., & Stern, J. (1996). Security arguments for digital signatures and blind signatures. In Proceedings of Eueocrypt (Vol. 1070, pp. 387–398).
22.
Zurück zum Zitat Hubaux, J. P., Capkun, S., & Luo, J. (2004). The security and privacy of smart vehicles. IEEE Security Privacy Magazine, 2(3), 49–55.CrossRef Hubaux, J. P., Capkun, S., & Luo, J. (2004). The security and privacy of smart vehicles. IEEE Security Privacy Magazine, 2(3), 49–55.CrossRef
23.
Zurück zum Zitat Tsai, J. L., Lo, N. W., & Wu, T. C. (2013). Novel anonymous authentication scheme using smart cards. IEEE Transactions on Industrial Informatics, 9(4), 2004–2013.CrossRef Tsai, J. L., Lo, N. W., & Wu, T. C. (2013). Novel anonymous authentication scheme using smart cards. IEEE Transactions on Industrial Informatics, 9(4), 2004–2013.CrossRef
24.
Zurück zum Zitat Yan, G., Wen, D., Olariu, S., & Weigle, M. C. (2013). Security challenges in vehicular cloud computing. IEEE Transactions on Intelligent Transportation Systems, 14(1), 284–294.CrossRef Yan, G., Wen, D., Olariu, S., & Weigle, M. C. (2013). Security challenges in vehicular cloud computing. IEEE Transactions on Intelligent Transportation Systems, 14(1), 284–294.CrossRef
25.
Zurück zum Zitat Shim, K. A. (2012). CPAS: An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Transactions on Intelligent Transportation Systems, 61(4), 1874–1883. Shim, K. A. (2012). CPAS: An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Transactions on Intelligent Transportation Systems, 61(4), 1874–1883.
26.
Zurück zum Zitat Boneh, D., Gentry, C., Lynn, B., & Shacham, H. (2003). Aggregate and verifiably encrypted signatures from bilinear maps. Lecture Notes in Computer Science, 2656, 416–432.MathSciNetCrossRefMATH Boneh, D., Gentry, C., Lynn, B., & Shacham, H. (2003). Aggregate and verifiably encrypted signatures from bilinear maps. Lecture Notes in Computer Science, 2656, 416–432.MathSciNetCrossRefMATH
27.
Zurück zum Zitat Wasef, A., & Shen, X. (2013). Expedite message authentication protocol for vehicular ad hoc networks. IEEE Transactions on Mobile Computing, 12(1), 78–89.CrossRef Wasef, A., & Shen, X. (2013). Expedite message authentication protocol for vehicular ad hoc networks. IEEE Transactions on Mobile Computing, 12(1), 78–89.CrossRef
Metadaten
Titel
An Enhanced Secure Authentication Scheme for Vehicular Ad Hoc Networks Without Pairings
verfasst von
J. Jenefa
E. A. Mary Anita
Publikationsdatum
14.02.2019
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2019
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-019-06178-4

Weitere Artikel der Ausgabe 2/2019

Wireless Personal Communications 2/2019 Zur Ausgabe

Neuer Inhalt