Skip to main content
Erschienen in: Cluster Computing 3/2017

08.04.2017

Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks

Erschienen in: Cluster Computing | Ausgabe 3/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The incorporation of electronics by embedding the relevant sensors in the physical devices in home and office, vehicles of all types, buildings in the smart cities and in all possible spheres of life form a network of devices termed as internet of things (IoT). It is being realized that vehicular ad-hoc networks (VANETs) which are responsible for the reliable and secure communication among vehicles is a primary area of research in IoT and hence ensuring security in this area is essential. Thus, this work introduces a novel approach to improve the existing authentication support to VANETs. In this proposed framework, first an anonymous authentication approach for preserving the privacy is proposed which not only performs the vehicle user’s anonymous authentication but preserves the message integrity of the transmitting messages as well. Although many anonymous authentication schemes have been proposed in VANETs until now, the existing schemes suffer from a high computation cost during the signature and certificate verification process which leads to delayed authentication. Consequently, the vehicles and roadside units (RSUs) cannot authenticate more number of vehicles per second in VANETs. Second, an efficient anonymous group key distribution protocol is proposed in this paper for securely distributing the group key to the group of vehicles in the communication range of an RSU. The RSUs can send location based information to the group of vehicles in a secure manner using this group key. Experimental analysis portrays that the results of this new privacy preserving anonymous authentication and key management schemes are promising and efficient with regard to signature verification cost and computational cost in comparison with the existing schemes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Sun, X., Lin, X., Ho, P.H.: Secure vehicular communications based on group signature and ID-based signature scheme. In: Proceedings of IEEE International Conference on Communications, pp. 1539–1545 (2007) Sun, X., Lin, X., Ho, P.H.: Secure vehicular communications based on group signature and ID-based signature scheme. In: Proceedings of IEEE International Conference on Communications, pp. 1539–1545 (2007)
2.
Zurück zum Zitat Zhu, H., Lu, R., Lin, X., Shen, X.: Security in service-oriented vehicular networks service-oriented broadband wireless network architecture. IEEE Wirel. Commun. 16, 16–22 (2009) Zhu, H., Lu, R., Lin, X., Shen, X.: Security in service-oriented vehicular networks service-oriented broadband wireless network architecture. IEEE Wirel. Commun. 16, 16–22 (2009)
3.
Zurück zum Zitat He, D., Zeadally, S., Xu, B., Huang, X.: An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad-hoc networks. IEEE Trans. Inf. Forensics Secur. 10(12), 1681–2691 (2015)CrossRef He, D., Zeadally, S., Xu, B., Huang, X.: An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad-hoc networks. IEEE Trans. Inf. Forensics Secur. 10(12), 1681–2691 (2015)CrossRef
4.
Zurück zum Zitat He, D., Wang, D.: Robust biometrics-based authentication scheme for multi-server environment. IEEE Syst. J. 9(3), 816–823 (2015)CrossRef He, D., Wang, D.: Robust biometrics-based authentication scheme for multi-server environment. IEEE Syst. J. 9(3), 816–823 (2015)CrossRef
5.
Zurück zum Zitat Gupta, B.B., Agrawal, D.P., Yamaguchi, S.: Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global Publisher, Hershey (2016)CrossRef Gupta, B.B., Agrawal, D.P., Yamaguchi, S.: Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global Publisher, Hershey (2016)CrossRef
6.
Zurück zum Zitat Tewari, A., Gupta, B.B.: Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags. J. Supercomput (2016). doi:10.1007/s11227-016-1849-x Tewari, A., Gupta, B.B.: Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags. J. Supercomput (2016). doi:10.​1007/​s11227-016-1849-x
7.
Zurück zum Zitat Guo, P., Wang, J., Li, B., Lee, S.: A variable threshold-value authentication architecture for wireless mesh networks. J. Internet Technol. 15(6), 929–936 (2014) Guo, P., Wang, J., Li, B., Lee, S.: A variable threshold-value authentication architecture for wireless mesh networks. J. Internet Technol. 15(6), 929–936 (2014)
8.
Zurück zum Zitat Chhabra, M., Gupta, B.B.: An efficient scheme to prevent DDoS flooding attacks in mobile ad-hoc network (MANET). Res. J. Appl. Sci. Eng. Technol. 7(10), 2033–2039 (2014) Chhabra, M., Gupta, B.B.: An efficient scheme to prevent DDoS flooding attacks in mobile ad-hoc network (MANET). Res. J. Appl. Sci. Eng. Technol. 7(10), 2033–2039 (2014)
9.
Zurück zum Zitat Chhabra, M., Gupta, B.B.: A novel solution to handle DDOS attack in MANET. J. Inf Secur 4(3), 165–179 (2013) Chhabra, M., Gupta, B.B.: A novel solution to handle DDOS attack in MANET. J. Inf Secur 4(3), 165–179 (2013)
10.
Zurück zum Zitat Raya, M., Hubaux, J.P.: Securing vehicular ad hoc networks. J. Comput. Secur. 15, 39–68 (2007)CrossRef Raya, M., Hubaux, J.P.: Securing vehicular ad hoc networks. J. Comput. Secur. 15, 39–68 (2007)CrossRef
11.
Zurück zum Zitat Ye, F., Roy, S., Wang, H.: Efficient data dissemination in vehicular ad hoc networks. IEEE J. Sel. Areas Commun. 30(4), 769–779 (2012)CrossRef Ye, F., Roy, S., Wang, H.: Efficient data dissemination in vehicular ad hoc networks. IEEE J. Sel. Areas Commun. 30(4), 769–779 (2012)CrossRef
12.
Zurück zum Zitat Zhang, C., Lu, R., Lin, X., Ho, P.H., Shen, X.: An efficient identity-based batch verification scheme for vehicular sensor networks. In: Proceedings of IEEE INFOCOM, pp. 816–824 (2008) Zhang, C., Lu, R., Lin, X., Ho, P.H., Shen, X.: An efficient identity-based batch verification scheme for vehicular sensor networks. In: Proceedings of IEEE INFOCOM, pp. 816–824 (2008)
13.
Zurück zum Zitat Shim, K.: CPAS: an efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Trans. Veh. Technol. 61, 1874–1883 (2012)CrossRef Shim, K.: CPAS: an efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Trans. Veh. Technol. 61, 1874–1883 (2012)CrossRef
14.
Zurück zum Zitat Horng, S., Tzeng, S., Pan, Y., Fan, P.: b-SPECS+: batch verification for secure pseudonymous authentication in VANET. IEEE Trans. Inf. Forensics Secur. 8, 1860–1875 (2013)CrossRef Horng, S., Tzeng, S., Pan, Y., Fan, P.: b-SPECS+: batch verification for secure pseudonymous authentication in VANET. IEEE Trans. Inf. Forensics Secur. 8, 1860–1875 (2013)CrossRef
15.
Zurück zum Zitat Liu, J., Yuen, T., Au, M., Susilo, W.: Improvements on an authentication scheme for vehicular sensor networks. Expert Syst. Appl. 41, 2559–2564 (2014)CrossRef Liu, J., Yuen, T., Au, M., Susilo, W.: Improvements on an authentication scheme for vehicular sensor networks. Expert Syst. Appl. 41, 2559–2564 (2014)CrossRef
16.
Zurück zum Zitat Bayat, M., Barmshoory, M., Rahimi, M., Aref, M.: A secure authentication scheme for VANETs with batch verification. Wirel. Netw. 21, 1733–1743 (2015)CrossRef Bayat, M., Barmshoory, M., Rahimi, M., Aref, M.: A secure authentication scheme for VANETs with batch verification. Wirel. Netw. 21, 1733–1743 (2015)CrossRef
17.
Zurück zum Zitat Mao, Y., Sun, Y., Wu, M., Liu, K.J.R.: JET: dynamic join-exit tree amortization and scheduling for contributory key management. IEEE/ACM Trans. Netw. 14, 1128–1140 (2006)CrossRef Mao, Y., Sun, Y., Wu, M., Liu, K.J.R.: JET: dynamic join-exit tree amortization and scheduling for contributory key management. IEEE/ACM Trans. Netw. 14, 1128–1140 (2006)CrossRef
18.
Zurück zum Zitat Steiner, M., Tsudik, G., Waidner, M.: CLIQUES: a new approach to group key agreement. In: Proceedings of 18th International Conference on Distributed Computing Systems, pp. 380–387 (1998) Steiner, M., Tsudik, G., Waidner, M.: CLIQUES: a new approach to group key agreement. In: Proceedings of 18th International Conference on Distributed Computing Systems, pp. 380–387 (1998)
19.
Zurück zum Zitat Lu, R., Lin, X., Liang, X., Shen, X.: A dynamic privacy-preserving key management scheme for location-based services in VANET. IEEE Trans. Intell. Transp. Syst. 13, 127–139 (2012)CrossRef Lu, R., Lin, X., Liang, X., Shen, X.: A dynamic privacy-preserving key management scheme for location-based services in VANET. IEEE Trans. Intell. Transp. Syst. 13, 127–139 (2012)CrossRef
20.
Zurück zum Zitat Du, X., Wang, Y., Ge, J., Wang, Y.: ID-based authenticated two round multi-party key agreement. Cryptology ePrint Archive: Report 2003/247 Du, X., Wang, Y., Ge, J., Wang, Y.: ID-based authenticated two round multi-party key agreement. Cryptology ePrint Archive: Report 2003/247
21.
Zurück zum Zitat Xiaozhuo, G., Zhenhuan, C., Yongming, W.: How to get group key efficiently in mobile ad hoc networks? In: Proceedings of IEEE Military Communications Conference, pp. 1009–1014 (2015) Xiaozhuo, G., Zhenhuan, C., Yongming, W.: How to get group key efficiently in mobile ad hoc networks? In: Proceedings of IEEE Military Communications Conference, pp. 1009–1014 (2015)
22.
Zurück zum Zitat Teng, J.K., Wu, C.K.: A provable authenticated certificateless group key agreement with constant rounds. J. Commun. Netw. 14, 104–110 (2012)CrossRef Teng, J.K., Wu, C.K.: A provable authenticated certificateless group key agreement with constant rounds. J. Commun. Netw. 14, 104–110 (2012)CrossRef
23.
Zurück zum Zitat Lin, X., Sun, X., Ho, P.-H., Shen, X.: GSIS: a secure and privacy preserving protocol for vehicular communications. IEEE Trans. Veh. Technol. 56, 3442–3456 (2007)CrossRef Lin, X., Sun, X., Ho, P.-H., Shen, X.: GSIS: a secure and privacy preserving protocol for vehicular communications. IEEE Trans. Veh. Technol. 56, 3442–3456 (2007)CrossRef
24.
Zurück zum Zitat Sampigethava, K., Li, M., Huang, L., Poovendran, R.: AMOEBA: robust location privacy scheme for VANET. IEEE J. Sel. Areas Commun. 25(8), 1569–1589 (2007)CrossRef Sampigethava, K., Li, M., Huang, L., Poovendran, R.: AMOEBA: robust location privacy scheme for VANET. IEEE J. Sel. Areas Commun. 25(8), 1569–1589 (2007)CrossRef
25.
Zurück zum Zitat Mao, Y., Sun, Y., Wu, M., Liu, K.J.R.: JET: dynamic join-exit tree amortization and scheduling for contributory key management. IEEE/ACM Trans. Netw. 14(5), 1128–1140 (2006)CrossRef Mao, Y., Sun, Y., Wu, M., Liu, K.J.R.: JET: dynamic join-exit tree amortization and scheduling for contributory key management. IEEE/ACM Trans. Netw. 14(5), 1128–1140 (2006)CrossRef
26.
Zurück zum Zitat Vijayakumar, P., Azees, M., Kannan, A., Jegatha Deborah, L.: Dual authentication and key management techniques for secure data transmission in vehicular ad-hoc networks. IEEE Trans. Intell. Transp. Syst. 17(4), 1015–1028 (2016)CrossRef Vijayakumar, P., Azees, M., Kannan, A., Jegatha Deborah, L.: Dual authentication and key management techniques for secure data transmission in vehicular ad-hoc networks. IEEE Trans. Intell. Transp. Syst. 17(4), 1015–1028 (2016)CrossRef
27.
Zurück zum Zitat Vijayakumar, P., Bose, S., Kannan, A., Deborah, L.J.: Computation and communication efficient key distribution protocol for secure multicast communication. In: KSII Transactions on Internet and Information Systems, vol. 7, no. 4, pp. 878-894 (2013) Vijayakumar, P., Bose, S., Kannan, A., Deborah, L.J.: Computation and communication efficient key distribution protocol for secure multicast communication. In: KSII Transactions on Internet and Information Systems, vol. 7, no. 4, pp. 878-894 (2013)
28.
Zurück zum Zitat Vijayakumar, P., Bose, S., Kannan, A.: Rotation based secure multicast key management for batch rekeying operations. Netw. Sci. 1(1), 39–47 (2012)CrossRef Vijayakumar, P., Bose, S., Kannan, A.: Rotation based secure multicast key management for batch rekeying operations. Netw. Sci. 1(1), 39–47 (2012)CrossRef
29.
Zurück zum Zitat Vijayakumar, P., Naresh, R., Deborah, J.L., Islam, S.K.H.: An efficient group key agreement protocol for secure P2P communication. J. Secur. Commun. Netw. doi:10.1002/sec.1578 Vijayakumar, P., Naresh, R., Deborah, J.L., Islam, S.K.H.: An efficient group key agreement protocol for secure P2P communication. J. Secur. Commun. Netw. doi:10.​1002/​sec.​1578
30.
Zurück zum Zitat Vijayakumar, P., Naresh, R., Islam, S.K. Deborah, L.J.: An effective key distribution for secure internet pay-TV using access key hierarchies. J. Secur. Commun. Netw. doi:10.1002/sec.1680 Vijayakumar, P., Naresh, R., Islam, S.K. Deborah, L.J.: An effective key distribution for secure internet pay-TV using access key hierarchies. J. Secur. Commun. Netw. doi:10.​1002/​sec.​1680
31.
Zurück zum Zitat Mortazavi, K.: An efficient distributed group key management using hierarchical approach with Diffie-Hellman and symmetric algorithm: DHSA. IEEE Int. Symp. Comput. Netw. Distrib. Syst. Febr. 23–24, 49–54 (2011) Mortazavi, K.: An efficient distributed group key management using hierarchical approach with Diffie-Hellman and symmetric algorithm: DHSA. IEEE Int. Symp. Comput. Netw. Distrib. Syst. Febr. 23–24, 49–54 (2011)
32.
Zurück zum Zitat Zhang, Y., Liu, W., Lou, W., Fang, Y.: Securing mobile ad hoc networks with certificateless public keys. In: IEEE Transactions on Dependable and Secure Computing, vol. 3, no. 4, pp. 386–399 (2006) Zhang, Y., Liu, W., Lou, W., Fang, Y.: Securing mobile ad hoc networks with certificateless public keys. In: IEEE Transactions on Dependable and Secure Computing, vol. 3, no. 4, pp. 386–399 (2006)
33.
Zurück zum Zitat Wu, D., Zhou, C.: Fault-tolerant and scalable key management for smart grid. IEEE Trans. Smart Grid 2(2), 371–378 (2011)CrossRef Wu, D., Zhou, C.: Fault-tolerant and scalable key management for smart grid. IEEE Trans. Smart Grid 2(2), 371–378 (2011)CrossRef
34.
Zurück zum Zitat Xia, J., Wang, Y.: Secure key distribution for the smart grid. IEEE Trans. Smart Grid 3(3), 1437–1443 (2012)CrossRef Xia, J., Wang, Y.: Secure key distribution for the smart grid. IEEE Trans. Smart Grid 3(3), 1437–1443 (2012)CrossRef
35.
Zurück zum Zitat Park, J.H., Kim, M., Kwon, D.: Security weakness in the smart grid key distribution proposed by Xia and Wang. IEEE Trans. Smart Grid 4(3), 1613–1614 (2013)CrossRef Park, J.H., Kim, M., Kwon, D.: Security weakness in the smart grid key distribution proposed by Xia and Wang. IEEE Trans. Smart Grid 4(3), 1613–1614 (2013)CrossRef
36.
Zurück zum Zitat Zhou, J., Ou, Y.H.: Key tree and Chinese remainder theorem based group key distribution scheme. J. Chin. Inst. Eng. 32(7), 967–974 (2009)CrossRef Zhou, J., Ou, Y.H.: Key tree and Chinese remainder theorem based group key distribution scheme. J. Chin. Inst. Eng. 32(7), 967–974 (2009)CrossRef
37.
Zurück zum Zitat Vijayakumar, P., Bose, S., Kannan, A.: Centralized key distribution protocol using the greatest common divisor method. Comput. Math. Appl. 65(9), 1360–1368 (2013)MathSciNetCrossRefMATH Vijayakumar, P., Bose, S., Kannan, A.: Centralized key distribution protocol using the greatest common divisor method. Comput. Math. Appl. 65(9), 1360–1368 (2013)MathSciNetCrossRefMATH
38.
Zurück zum Zitat Chang, V.: Towards achieving data security with the cloud computing adoption framework. Ad Hoc Netw. 35, 65–82 (2015)CrossRef Chang, V.: Towards achieving data security with the cloud computing adoption framework. Ad Hoc Netw. 35, 65–82 (2015)CrossRef
39.
Zurück zum Zitat Chang, V., Kuo, Y.-H., Ramachandran, M.: Cloud computing adoption framework: a security framework for business clouds. Future Gener. Comput. Syst. 57, 24–41 (2016)CrossRef Chang, V., Kuo, Y.-H., Ramachandran, M.: Cloud computing adoption framework: a security framework for business clouds. Future Gener. Comput. Syst. 57, 24–41 (2016)CrossRef
40.
Zurück zum Zitat Chang, V., Wills, G.: A model to compare cloud and non-cloud storage of Big Data. Future Gener. Comput. Syst. 57, 56–76 (2016)CrossRef Chang, V., Wills, G.: A model to compare cloud and non-cloud storage of Big Data. Future Gener. Comput. Syst. 57, 56–76 (2016)CrossRef
41.
Zurück zum Zitat Boneh, D. Franklin, M.: Identity-based encryption from the Weil pairing. In: Proceedings of Crypto 2001, Vol. 2139. Lecture Notes in Computer Science, pp. 213–229 (2001) Boneh, D. Franklin, M.: Identity-based encryption from the Weil pairing. In: Proceedings of Crypto 2001, Vol. 2139. Lecture Notes in Computer Science, pp. 213–229 (2001)
42.
Zurück zum Zitat Lu, R., Lin, X., Luan, T.-H.: Pseudonym changing at social spots: an effective strategy for location privacy in VANET. IEEE Trans. Veh. Technol. 61, 86–96 (2011) Lu, R., Lin, X., Luan, T.-H.: Pseudonym changing at social spots: an effective strategy for location privacy in VANET. IEEE Trans. Veh. Technol. 61, 86–96 (2011)
45.
Zurück zum Zitat Wang, Y.: Password protected smart card and memory stick authentication against off-line dictionary attacks. In: Security, I., Research, P. (eds.) Berlin, pp. 489–500. Springer, Germany (2012) Wang, Y.: Password protected smart card and memory stick authentication against off-line dictionary attacks. In: Security, I., Research, P. (eds.) Berlin, pp. 489–500. Springer, Germany (2012)
46.
Zurück zum Zitat Tsai, J.-L., Lo, N.-W.: Secure anonymous key distribution scheme for smart grid. IEEE Trans. Smart Grid 7(2), 906–914 (2016) Tsai, J.-L., Lo, N.-W.: Secure anonymous key distribution scheme for smart grid. IEEE Trans. Smart Grid 7(2), 906–914 (2016)
Metadaten
Titel
Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks
Publikationsdatum
08.04.2017
Erschienen in
Cluster Computing / Ausgabe 3/2017
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-017-0848-x

Weitere Artikel der Ausgabe 3/2017

Cluster Computing 3/2017 Zur Ausgabe