Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 1/2020

20.08.2019

EASPSC: Efficient authentication of SignRecryption protocol using shareable clouds in VANET groups

verfasst von: Sneha Kanchan, Garima Singh, Narendra S. Chaudhari

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 1/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Vehicular ad hoc networks (VANET) is one of the most awaited and ambitious projects of Intelligent Transport System (ITS), where vehicles are permitted to talk with each other. The ultimate goal of the network is to develop a connected network of automobiles, and eventually to reduce traffic and accidents. However, VANET is an ad hoc network without any infrastructure. Apart from architectural issues, there are plenty of security and performance issues, which makes it difficult to be implemented. Therefore, we are using fully authenticated Signcryption technique along with re-cryptography and shareable cloud to make the network safe, reliable and robust. Signcryption combines signature and encryption in a single step, hence decreasing the number of computations. Re-cryptography allows alternative authorities to take charge of the primary authority while maintaining communication transparency. Group signature facilitates secure communication within the group. Security has been verified using Burrows-Abadi-Needham (BAN) logic and Automated Validation of Internet Security Protocols and Applications (AVISPA).

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
1.
Zurück zum Zitat Hanan AHA et al (2017) Real traffic data based evaluation of vehicular traffic environment and state-of-the-art with future issues in location-centric data dissemination for VANETs. Digit Commun Netw 3.3:195–210CrossRef Hanan AHA et al (2017) Real traffic data based evaluation of vehicular traffic environment and state-of-the-art with future issues in location-centric data dissemination for VANETs. Digit Commun Netw 3.3:195–210CrossRef
2.
Zurück zum Zitat Feng X et al (2017) A method for defensing against multi-source Sybil attacks in VANET. Peer-to-Peer Netw Appl 10.2:305–314CrossRef Feng X et al (2017) A method for defensing against multi-source Sybil attacks in VANET. Peer-to-Peer Netw Appl 10.2:305–314CrossRef
3.
Zurück zum Zitat Lin X et al (2007) GSIS: A secure and privacy-preserving protocol for vehicular communications. IEEE Trans Veh Technol 56.6:3442–3456 Lin X et al (2007) GSIS: A secure and privacy-preserving protocol for vehicular communications. IEEE Trans Veh Technol 56.6:3442–3456
4.
Zurück zum Zitat Guo L et al (2017) A secure mechanism for big data collection in large scale internet of vehicle. IEEE Internet J 4.2:601–610CrossRef Guo L et al (2017) A secure mechanism for big data collection in large scale internet of vehicle. IEEE Internet J 4.2:601–610CrossRef
5.
Zurück zum Zitat Singh G, Shrimankar DD (2018) Dynamic Group Based Efficient Access Authentication and Key Agreement Protocol for MTC in LTE-A Networks. Wirel Person Commun 101.2:829–856CrossRef Singh G, Shrimankar DD (2018) Dynamic Group Based Efficient Access Authentication and Key Agreement Protocol for MTC in LTE-A Networks. Wirel Person Commun 101.2:829–856CrossRef
6.
Zurück zum Zitat Zheng Y (1997) Digital signcryption or how to achieve cost (signature & encryption) cost (signature)+ cost (encryption), Annual International Cryptology Conference, Springer, Berlin Heidelberg Zheng Y (1997) Digital signcryption or how to achieve cost (signature & encryption) cost (signature)+ cost (encryption), Annual International Cryptology Conference, Springer, Berlin Heidelberg
7.
Zurück zum Zitat Zheng Y, Imai H (1998) How to construct efficient signcryption schemes on elliptic curves. Inf Process Lett 68.5:227–233MathSciNetCrossRef Zheng Y, Imai H (1998) How to construct efficient signcryption schemes on elliptic curves. Inf Process Lett 68.5:227–233MathSciNetCrossRef
8.
Zurück zum Zitat Malone-Lee J (2002) Identity-Based Signcryption, IACR Cryptology ePrint Archive, 98 Malone-Lee J (2002) Identity-Based Signcryption, IACR Cryptology ePrint Archive, 98
9.
Zurück zum Zitat Chen L, Malone-Lee J (2005) Improved identity-based signcryption, International Workshop on Public Key Cryptography. Springer, BerlinMATH Chen L, Malone-Lee J (2005) Improved identity-based signcryption, International Workshop on Public Key Cryptography. Springer, BerlinMATH
10.
Zurück zum Zitat Barreto PS, Libert B, McCullagh N, Quisquater JJ (2005) Efficient and provably-secure identity-based signatures and signcryption from bilinear maps, International conference on the theory and application of cryptology and information security. Springer, BerlinMATH Barreto PS, Libert B, McCullagh N, Quisquater JJ (2005) Efficient and provably-secure identity-based signatures and signcryption from bilinear maps, International conference on the theory and application of cryptology and information security. Springer, BerlinMATH
11.
Zurück zum Zitat Boyen X (2003) Multipurpose identity-based signcryption, Annual International Cryptology Conference. Springer, BerlinMATH Boyen X (2003) Multipurpose identity-based signcryption, Annual International Cryptology Conference. Springer, BerlinMATH
12.
Zurück zum Zitat Libert B, Quisquater J-J (2004) Efficient signcryption with key privacy from gap Diffie-Hellman groups, International Workshop on Public Key Cryptography. Springer, BerlinMATH Libert B, Quisquater J-J (2004) Efficient signcryption with key privacy from gap Diffie-Hellman groups, International Workshop on Public Key Cryptography. Springer, BerlinMATH
13.
Zurück zum Zitat Kanchan S, Chaudhari NS (2016) Integrating group signature scheme with Non-transitive Proxy Re-encryption in VANET, International Conference on Computing, Analytics and security trends (CAST), IEEE Kanchan S, Chaudhari NS (2016) Integrating group signature scheme with Non-transitive Proxy Re-encryption in VANET, International Conference on Computing, Analytics and security trends (CAST), IEEE
14.
Zurück zum Zitat Sneha K, Chaudhari NS (2018) SRCPR: SignReCrypting Proxy Re-signature in secure VANET Groups, IEEE Access Sneha K, Chaudhari NS (2018) SRCPR: SignReCrypting Proxy Re-signature in secure VANET Groups, IEEE Access
15.
Zurück zum Zitat Kuo T, Yen S, Han M (2017) Dynamic reversed accumulator. Int J Inf Secur 17:183–191CrossRef Kuo T, Yen S, Han M (2017) Dynamic reversed accumulator. Int J Inf Secur 17:183–191CrossRef
16.
Zurück zum Zitat Kai K, Cong W, Tao L (2016) Fog computing for vehicular ad-hoc networks: paradigms, scenarios, and issues, the journal of China Universities of Posts and Telecommunications 23.2:56–96CrossRef Kai K, Cong W, Tao L (2016) Fog computing for vehicular ad-hoc networks: paradigms, scenarios, and issues, the journal of China Universities of Posts and Telecommunications 23.2:56–96CrossRef
17.
Zurück zum Zitat Wu J, Dong M, Ota K, Li J, Guan Z (2017) FCSS: Fog Computing based content-aware filtering for security services in information centric social networks. IEEE Transactions on Emerging Topics in Computing Wu J, Dong M, Ota K, Li J, Guan Z (2017) FCSS: Fog Computing based content-aware filtering for security services in information centric social networks. IEEE Transactions on Emerging Topics in Computing
18.
Zurück zum Zitat Liu B et al (2017) Cloud-Assisted Safety Message Dissemination in VANET Cellular Heterogeneous Wireless Network. IEEE Syst J 11.1:128–139CrossRef Liu B et al (2017) Cloud-Assisted Safety Message Dissemination in VANET Cellular Heterogeneous Wireless Network. IEEE Syst J 11.1:128–139CrossRef
19.
20.
Zurück zum Zitat Chakrabarti C, Roy S, Basu S (2019) Intention aware misbehavior detection for post-disaster opportunistic communication over peer-to-peer DTN. Peer-to-Peer Networking and Applications 12.4:705–723CrossRef Chakrabarti C, Roy S, Basu S (2019) Intention aware misbehavior detection for post-disaster opportunistic communication over peer-to-peer DTN. Peer-to-Peer Networking and Applications 12.4:705–723CrossRef
21.
Zurück zum Zitat Burrows M, Abadi M, Needham RM (1871) A logic of authentication. Proc R Soc Lond A 426 (1989):233–271MathSciNetMATH Burrows M, Abadi M, Needham RM (1871) A logic of authentication. Proc R Soc Lond A 426 (1989):233–271MathSciNetMATH
22.
Zurück zum Zitat Armando A et al (2005) “The AVISPA tool for the automated validation of internet security protocols and applications.” International conference on computer aided verification, Springer, BerlinCrossRef Armando A et al (2005) “The AVISPA tool for the automated validation of internet security protocols and applications.” International conference on computer aided verification, Springer, BerlinCrossRef
23.
Zurück zum Zitat Blaze M, Bleumer G, Strauss M (1998) Divertible protocols and atomic proxy cryptography, International Conference on the Theory and Applications of Cryptographic Techniques. Springer, BerlinMATH Blaze M, Bleumer G, Strauss M (1998) Divertible protocols and atomic proxy cryptography, International Conference on the Theory and Applications of Cryptographic Techniques. Springer, BerlinMATH
24.
Zurück zum Zitat Canetti R, Hohenberger S (2007) Chosen-ciphertext secure proxy re-encryption, Proceedings of the 14th ACM conference on Computer and communications security. ACM Canetti R, Hohenberger S (2007) Chosen-ciphertext secure proxy re-encryption, Proceedings of the 14th ACM conference on Computer and communications security. ACM
25.
Zurück zum Zitat Ma C, Ao J (2009) Group-based Proxy Re-encryption Scheme Secure Against Chosen Ciphertext Attack. IJ Netw Secur 8.3:266–270 Ma C, Ao J (2009) Group-based Proxy Re-encryption Scheme Secure Against Chosen Ciphertext Attack. IJ Netw Secur 8.3:266–270
26.
Zurück zum Zitat Chen L et al (2016) Private reputation retrieval in public–a privacy-aware announcement scheme for VANETs. IET Inf Secur 11.4:204–210 Chen L et al (2016) Private reputation retrieval in public–a privacy-aware announcement scheme for VANETs. IET Inf Secur 11.4:204–210
27.
Zurück zum Zitat Kanchan S, Singh G, Chaudhari NS (2018) Re-encrypting secure and efficient routing in VANET groups using sharable clouds, 4th International Conference on Recent Advances in Information Technology (RAIT). IEEE Kanchan S, Singh G, Chaudhari NS (2018) Re-encrypting secure and efficient routing in VANET groups using sharable clouds, 4th International Conference on Recent Advances in Information Technology (RAIT). IEEE
28.
Zurück zum Zitat Bayat M et al (2015) A secure authentication scheme for VANETs with batch verification. Wirel Netw 21.5:1733–1743CrossRef Bayat M et al (2015) A secure authentication scheme for VANETs with batch verification. Wirel Netw 21.5:1733–1743CrossRef
29.
Zurück zum Zitat Sur C, Park Y, Rhee KH (2016) An efficient and secure navigation protocol based on vehicular cloud. Int J Comput Math 93.2:325–344MathSciNetCrossRef Sur C, Park Y, Rhee KH (2016) An efficient and secure navigation protocol based on vehicular cloud. Int J Comput Math 93.2:325–344MathSciNetCrossRef
30.
Zurück zum Zitat Kumari S, Khan MK (2014) More secure smart card-based remote user password authentication scheme with user anonymity. Secur Commun Netw 7.11:2039–2053CrossRef Kumari S, Khan MK (2014) More secure smart card-based remote user password authentication scheme with user anonymity. Secur Commun Netw 7.11:2039–2053CrossRef
31.
Zurück zum Zitat Jianhong Z, Xu M, Liying L (2014) On the security of a secure batch verification with group testing for VANET. Int J Netw Secur 16.5:351–358 Jianhong Z, Xu M, Liying L (2014) On the security of a secure batch verification with group testing for VANET. Int J Netw Secur 16.5:351–358
32.
Zurück zum Zitat Ateniese G, Fu K, Green M, Hohenberger S (2006) Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans Inf Syst Secur (TISSEC) 9:1–30CrossRef Ateniese G, Fu K, Green M, Hohenberger S (2006) Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans Inf Syst Secur (TISSEC) 9:1–30CrossRef
33.
Zurück zum Zitat Jinila Y, Komathy K (2013) Bevish a privacy preserving authentication framework for safety messages in VANET. IET, pp 456–461 Jinila Y, Komathy K (2013) Bevish a privacy preserving authentication framework for safety messages in VANET. IET, pp 456–461
34.
Zurück zum Zitat Parne BL, Gupta S, Chaudhari NS (2018) Segb: Security enhanced group based aka protocol for m2m communication in an iot enabled lte/lte-a network. IEEE Access 6:3668–3684CrossRef Parne BL, Gupta S, Chaudhari NS (2018) Segb: Security enhanced group based aka protocol for m2m communication in an iot enabled lte/lte-a network. IEEE Access 6:3668–3684CrossRef
Metadaten
Titel
EASPSC: Efficient authentication of SignRecryption protocol using shareable clouds in VANET groups
verfasst von
Sneha Kanchan
Garima Singh
Narendra S. Chaudhari
Publikationsdatum
20.08.2019
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 1/2020
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-019-00789-1

Weitere Artikel der Ausgabe 1/2020

Peer-to-Peer Networking and Applications 1/2020 Zur Ausgabe