Skip to main content
Top

2022 | OriginalPaper | Chapter

4. Authentication Scheme for Vehicle-to-Vehicle Communications using ECC

Authors : Ikram Ali, Yong Chen, Mohammad Faisal, Meng Li

Published in: Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Vehicles exchange traffic-related messages with neighboring vehicles to aid passengers and provide efficient traffic management. However, due to the open wireless access medium, the security and privacy of this information become quite critical in VANETs. The attackers could capture, intercept, alter, replay and delete the information and could compromise the security of VANETs. To address this, several PKI-based signature schemes have been proposed as mentioned in Chap. 1 to enable a receiver to authenticate the source of received messages as well as to check their integrity before accepting them.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference J. Cui, J. Zhang, H. Zhong, R. Shi, and Y. Xu. An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks. Information Sciences, 451:1–15, 2018.MathSciNetMATH J. Cui, J. Zhang, H. Zhong, R. Shi, and Y. Xu. An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks. Information Sciences, 451:1–15, 2018.MathSciNetMATH
2.
go back to reference D. Jiang, V. Taliwal, A. Meier, W. Holfelder, and R. Herrtwich. Design of 5.9 GHz DSRC-based vehicular safety communication. IEEE Wireless Communications, 13(5):36–43, 2006. D. Jiang, V. Taliwal, A. Meier, W. Holfelder, and R. Herrtwich. Design of 5.9 GHz DSRC-based vehicular safety communication. IEEE Wireless Communications, 13(5):36–43, 2006.
3.
go back to reference J. B. Kenney. Dedicated short-range communications (DSRC) standards in the united states. Proceedings of the IEEE, 99(7):1162–1182, 2011.CrossRef J. B. Kenney. Dedicated short-range communications (DSRC) standards in the united states. Proceedings of the IEEE, 99(7):1162–1182, 2011.CrossRef
4.
go back to reference T. W. Chim, S.-M. Yiu, L. C. Hui, and V. O. Li. SPECS: Secure and privacy enhancing communications schemes for VANETs. Ad Hoc Networks, 9(2):189–203, 2011.CrossRef T. W. Chim, S.-M. Yiu, L. C. Hui, and V. O. Li. SPECS: Secure and privacy enhancing communications schemes for VANETs. Ad Hoc Networks, 9(2):189–203, 2011.CrossRef
5.
go back to reference S.-J. Horng, S.-F. Tzeng, Y. Pan, P. Fan, X. Wang, T. Li, and M. K. Khan. B-SPECS+: Batch verification for secure pseudonymous authentication in VANET. IEEE Transactions on Information Forensics and Security, 8(11):1860–1875, 2013.CrossRef S.-J. Horng, S.-F. Tzeng, Y. Pan, P. Fan, X. Wang, T. Li, and M. K. Khan. B-SPECS+: Batch verification for secure pseudonymous authentication in VANET. IEEE Transactions on Information Forensics and Security, 8(11):1860–1875, 2013.CrossRef
6.
go back to reference Z. Jianhong, X. Min, and L. Liying. On the security of a secure batch verification with group testing for VANET. International Journal of Network Security, 16(5):351–358, 2014. Z. Jianhong, X. Min, and L. Liying. On the security of a secure batch verification with group testing for VANET. International Journal of Network Security, 16(5):351–358, 2014.
7.
go back to reference M. Bayat, M. Barmshoory, M. Rahimi, and M. R. Aref, A secure authentication scheme for VANETs with batch verification. Wireless Networks, 21(5):1733–1743, 2015.CrossRef M. Bayat, M. Barmshoory, M. Rahimi, and M. R. Aref, A secure authentication scheme for VANETs with batch verification. Wireless Networks, 21(5):1733–1743, 2015.CrossRef
8.
go back to reference S. Wang and N. Yao. LIAP: A local identity-based anonymous message authentication protocol in VANETs. Computer Communications, 112:154–164, 2017.CrossRef S. Wang and N. Yao. LIAP: A local identity-based anonymous message authentication protocol in VANETs. Computer Communications, 112:154–164, 2017.CrossRef
9.
go back to reference P. S. Barreto, H. Y. Kim, B. Lynn, and M. Scott. Efficient algorithms for pairing-based cryptosystems. Advances in Cryptology — CRYPTO 2002, Springer, Berlin, Heidelberg, vol. 2442, pages 354–369, 2002. P. S. Barreto, H. Y. Kim, B. Lynn, and M. Scott. Efficient algorithms for pairing-based cryptosystems. Advances in Cryptology — CRYPTO 2002, Springer, Berlin, Heidelberg, vol. 2442, pages 354–369, 2002.
10.
go back to reference J.-L. Tsai and N.-W. Lo, A privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Systems Journal, 9(3):805–815, 2015.CrossRef J.-L. Tsai and N.-W. Lo, A privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Systems Journal, 9(3):805–815, 2015.CrossRef
11.
go back to reference D. He, S. Zeadally, B. Xu, and X. Huang. An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Transactions on Information Forensics and Security, 10(12):2681–2691, 2015.CrossRef D. He, S. Zeadally, B. Xu, and X. Huang. An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Transactions on Information Forensics and Security, 10(12):2681–2691, 2015.CrossRef
12.
go back to reference N.-W. Lo and J.-L. Tsai. An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings. IEEE Transactions on Intelligent Transportation Systems, 17(5):1319–1328, 2016.CrossRef N.-W. Lo and J.-L. Tsai. An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings. IEEE Transactions on Intelligent Transportation Systems, 17(5):1319–1328, 2016.CrossRef
13.
go back to reference J. Cui, J. Zhang, H. Zhong and Y. Xu. SPACF: A secure privacy-preserving authentication scheme for VANET with cuckoo filter. IEEE Transactions on Vehicular Technology, 66(11):10283–10295, 2017.CrossRef J. Cui, J. Zhang, H. Zhong and Y. Xu. SPACF: A secure privacy-preserving authentication scheme for VANET with cuckoo filter. IEEE Transactions on Vehicular Technology, 66(11):10283–10295, 2017.CrossRef
14.
go back to reference Y. Xie, F. Xu, D. Li, and Y. Nie. Efficient message authentication scheme with conditional privacy-preserving and signature aggregation for vehicular cloud network. Wireless Communications and Mobile Computing, 1–13, 2018. Y. Xie, F. Xu, D. Li, and Y. Nie. Efficient message authentication scheme with conditional privacy-preserving and signature aggregation for vehicular cloud network. Wireless Communications and Mobile Computing, 1–13, 2018.
15.
go back to reference X. Zhang, L. Mu, J. Zhao, and C. Xu. An efficient anonymous authentication scheme with secure communication in intelligent vehicular ad-hoc networks. KSII Transactions on Internet and Information Systems (TIIS), 13(6):3280–3298, 2019. X. Zhang, L. Mu, J. Zhao, and C. Xu. An efficient anonymous authentication scheme with secure communication in intelligent vehicular ad-hoc networks. KSII Transactions on Internet and Information Systems (TIIS), 13(6):3280–3298, 2019.
16.
go back to reference I. Ali, T. Lawrence, and F. Li. An efficient identity-based signature scheme without bilinear pairing for vehicle-to-vehicle communication in VANETs. Journal of Systems Architecture, 103:101692, 2020.CrossRef I. Ali, T. Lawrence, and F. Li. An efficient identity-based signature scheme without bilinear pairing for vehicle-to-vehicle communication in VANETs. Journal of Systems Architecture, 103:101692, 2020.CrossRef
17.
go back to reference L. Zhang, Q. Wu, A. Solanas, and J. Domingo-Ferrer. A scalable robust authentication protocol for secure vehicular communications. IEEE Transactions on Vehicular Technology, 59(4):1606-1617, 2010.CrossRef L. Zhang, Q. Wu, A. Solanas, and J. Domingo-Ferrer. A scalable robust authentication protocol for secure vehicular communications. IEEE Transactions on Vehicular Technology, 59(4):1606-1617, 2010.CrossRef
18.
go back to reference B. Libert and J.-J. Quisquater. The exact security of an identity based signature and its application. IACR Cryptology ePrint Archive, 2004:1–19, 2004. B. Libert and J.-J. Quisquater. The exact security of an identity based signature and its application. IACR Cryptology ePrint Archive, 2004:1–19, 2004.
19.
go back to reference D. Pointcheval and J. Stern. Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13(3):361–396, 2000.CrossRef D. Pointcheval and J. Stern. Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13(3):361–396, 2000.CrossRef
Metadata
Title
Authentication Scheme for Vehicle-to-Vehicle Communications using ECC
Authors
Ikram Ali
Yong Chen
Mohammad Faisal
Meng Li
Copyright Year
2022
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-16-8586-6_4