Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 1/2020

20-08-2019

EASPSC: Efficient authentication of SignRecryption protocol using shareable clouds in VANET groups

Authors: Sneha Kanchan, Garima Singh, Narendra S. Chaudhari

Published in: Peer-to-Peer Networking and Applications | Issue 1/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Vehicular ad hoc networks (VANET) is one of the most awaited and ambitious projects of Intelligent Transport System (ITS), where vehicles are permitted to talk with each other. The ultimate goal of the network is to develop a connected network of automobiles, and eventually to reduce traffic and accidents. However, VANET is an ad hoc network without any infrastructure. Apart from architectural issues, there are plenty of security and performance issues, which makes it difficult to be implemented. Therefore, we are using fully authenticated Signcryption technique along with re-cryptography and shareable cloud to make the network safe, reliable and robust. Signcryption combines signature and encryption in a single step, hence decreasing the number of computations. Re-cryptography allows alternative authorities to take charge of the primary authority while maintaining communication transparency. Group signature facilitates secure communication within the group. Security has been verified using Burrows-Abadi-Needham (BAN) logic and Automated Validation of Internet Security Protocols and Applications (AVISPA).

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Literature
1.
go back to reference Hanan AHA et al (2017) Real traffic data based evaluation of vehicular traffic environment and state-of-the-art with future issues in location-centric data dissemination for VANETs. Digit Commun Netw 3.3:195–210CrossRef Hanan AHA et al (2017) Real traffic data based evaluation of vehicular traffic environment and state-of-the-art with future issues in location-centric data dissemination for VANETs. Digit Commun Netw 3.3:195–210CrossRef
2.
go back to reference Feng X et al (2017) A method for defensing against multi-source Sybil attacks in VANET. Peer-to-Peer Netw Appl 10.2:305–314CrossRef Feng X et al (2017) A method for defensing against multi-source Sybil attacks in VANET. Peer-to-Peer Netw Appl 10.2:305–314CrossRef
3.
go back to reference Lin X et al (2007) GSIS: A secure and privacy-preserving protocol for vehicular communications. IEEE Trans Veh Technol 56.6:3442–3456 Lin X et al (2007) GSIS: A secure and privacy-preserving protocol for vehicular communications. IEEE Trans Veh Technol 56.6:3442–3456
4.
go back to reference Guo L et al (2017) A secure mechanism for big data collection in large scale internet of vehicle. IEEE Internet J 4.2:601–610CrossRef Guo L et al (2017) A secure mechanism for big data collection in large scale internet of vehicle. IEEE Internet J 4.2:601–610CrossRef
5.
go back to reference Singh G, Shrimankar DD (2018) Dynamic Group Based Efficient Access Authentication and Key Agreement Protocol for MTC in LTE-A Networks. Wirel Person Commun 101.2:829–856CrossRef Singh G, Shrimankar DD (2018) Dynamic Group Based Efficient Access Authentication and Key Agreement Protocol for MTC in LTE-A Networks. Wirel Person Commun 101.2:829–856CrossRef
6.
go back to reference Zheng Y (1997) Digital signcryption or how to achieve cost (signature & encryption) cost (signature)+ cost (encryption), Annual International Cryptology Conference, Springer, Berlin Heidelberg Zheng Y (1997) Digital signcryption or how to achieve cost (signature & encryption) cost (signature)+ cost (encryption), Annual International Cryptology Conference, Springer, Berlin Heidelberg
7.
go back to reference Zheng Y, Imai H (1998) How to construct efficient signcryption schemes on elliptic curves. Inf Process Lett 68.5:227–233MathSciNetCrossRef Zheng Y, Imai H (1998) How to construct efficient signcryption schemes on elliptic curves. Inf Process Lett 68.5:227–233MathSciNetCrossRef
8.
go back to reference Malone-Lee J (2002) Identity-Based Signcryption, IACR Cryptology ePrint Archive, 98 Malone-Lee J (2002) Identity-Based Signcryption, IACR Cryptology ePrint Archive, 98
9.
go back to reference Chen L, Malone-Lee J (2005) Improved identity-based signcryption, International Workshop on Public Key Cryptography. Springer, BerlinMATH Chen L, Malone-Lee J (2005) Improved identity-based signcryption, International Workshop on Public Key Cryptography. Springer, BerlinMATH
10.
go back to reference Barreto PS, Libert B, McCullagh N, Quisquater JJ (2005) Efficient and provably-secure identity-based signatures and signcryption from bilinear maps, International conference on the theory and application of cryptology and information security. Springer, BerlinMATH Barreto PS, Libert B, McCullagh N, Quisquater JJ (2005) Efficient and provably-secure identity-based signatures and signcryption from bilinear maps, International conference on the theory and application of cryptology and information security. Springer, BerlinMATH
11.
go back to reference Boyen X (2003) Multipurpose identity-based signcryption, Annual International Cryptology Conference. Springer, BerlinMATH Boyen X (2003) Multipurpose identity-based signcryption, Annual International Cryptology Conference. Springer, BerlinMATH
12.
go back to reference Libert B, Quisquater J-J (2004) Efficient signcryption with key privacy from gap Diffie-Hellman groups, International Workshop on Public Key Cryptography. Springer, BerlinMATH Libert B, Quisquater J-J (2004) Efficient signcryption with key privacy from gap Diffie-Hellman groups, International Workshop on Public Key Cryptography. Springer, BerlinMATH
13.
go back to reference Kanchan S, Chaudhari NS (2016) Integrating group signature scheme with Non-transitive Proxy Re-encryption in VANET, International Conference on Computing, Analytics and security trends (CAST), IEEE Kanchan S, Chaudhari NS (2016) Integrating group signature scheme with Non-transitive Proxy Re-encryption in VANET, International Conference on Computing, Analytics and security trends (CAST), IEEE
14.
go back to reference Sneha K, Chaudhari NS (2018) SRCPR: SignReCrypting Proxy Re-signature in secure VANET Groups, IEEE Access Sneha K, Chaudhari NS (2018) SRCPR: SignReCrypting Proxy Re-signature in secure VANET Groups, IEEE Access
15.
go back to reference Kuo T, Yen S, Han M (2017) Dynamic reversed accumulator. Int J Inf Secur 17:183–191CrossRef Kuo T, Yen S, Han M (2017) Dynamic reversed accumulator. Int J Inf Secur 17:183–191CrossRef
16.
go back to reference Kai K, Cong W, Tao L (2016) Fog computing for vehicular ad-hoc networks: paradigms, scenarios, and issues, the journal of China Universities of Posts and Telecommunications 23.2:56–96CrossRef Kai K, Cong W, Tao L (2016) Fog computing for vehicular ad-hoc networks: paradigms, scenarios, and issues, the journal of China Universities of Posts and Telecommunications 23.2:56–96CrossRef
17.
go back to reference Wu J, Dong M, Ota K, Li J, Guan Z (2017) FCSS: Fog Computing based content-aware filtering for security services in information centric social networks. IEEE Transactions on Emerging Topics in Computing Wu J, Dong M, Ota K, Li J, Guan Z (2017) FCSS: Fog Computing based content-aware filtering for security services in information centric social networks. IEEE Transactions on Emerging Topics in Computing
18.
go back to reference Liu B et al (2017) Cloud-Assisted Safety Message Dissemination in VANET Cellular Heterogeneous Wireless Network. IEEE Syst J 11.1:128–139CrossRef Liu B et al (2017) Cloud-Assisted Safety Message Dissemination in VANET Cellular Heterogeneous Wireless Network. IEEE Syst J 11.1:128–139CrossRef
19.
20.
go back to reference Chakrabarti C, Roy S, Basu S (2019) Intention aware misbehavior detection for post-disaster opportunistic communication over peer-to-peer DTN. Peer-to-Peer Networking and Applications 12.4:705–723CrossRef Chakrabarti C, Roy S, Basu S (2019) Intention aware misbehavior detection for post-disaster opportunistic communication over peer-to-peer DTN. Peer-to-Peer Networking and Applications 12.4:705–723CrossRef
21.
go back to reference Burrows M, Abadi M, Needham RM (1871) A logic of authentication. Proc R Soc Lond A 426 (1989):233–271MathSciNetMATH Burrows M, Abadi M, Needham RM (1871) A logic of authentication. Proc R Soc Lond A 426 (1989):233–271MathSciNetMATH
22.
go back to reference Armando A et al (2005) “The AVISPA tool for the automated validation of internet security protocols and applications.” International conference on computer aided verification, Springer, BerlinCrossRef Armando A et al (2005) “The AVISPA tool for the automated validation of internet security protocols and applications.” International conference on computer aided verification, Springer, BerlinCrossRef
23.
go back to reference Blaze M, Bleumer G, Strauss M (1998) Divertible protocols and atomic proxy cryptography, International Conference on the Theory and Applications of Cryptographic Techniques. Springer, BerlinMATH Blaze M, Bleumer G, Strauss M (1998) Divertible protocols and atomic proxy cryptography, International Conference on the Theory and Applications of Cryptographic Techniques. Springer, BerlinMATH
24.
go back to reference Canetti R, Hohenberger S (2007) Chosen-ciphertext secure proxy re-encryption, Proceedings of the 14th ACM conference on Computer and communications security. ACM Canetti R, Hohenberger S (2007) Chosen-ciphertext secure proxy re-encryption, Proceedings of the 14th ACM conference on Computer and communications security. ACM
25.
go back to reference Ma C, Ao J (2009) Group-based Proxy Re-encryption Scheme Secure Against Chosen Ciphertext Attack. IJ Netw Secur 8.3:266–270 Ma C, Ao J (2009) Group-based Proxy Re-encryption Scheme Secure Against Chosen Ciphertext Attack. IJ Netw Secur 8.3:266–270
26.
go back to reference Chen L et al (2016) Private reputation retrieval in public–a privacy-aware announcement scheme for VANETs. IET Inf Secur 11.4:204–210 Chen L et al (2016) Private reputation retrieval in public–a privacy-aware announcement scheme for VANETs. IET Inf Secur 11.4:204–210
27.
go back to reference Kanchan S, Singh G, Chaudhari NS (2018) Re-encrypting secure and efficient routing in VANET groups using sharable clouds, 4th International Conference on Recent Advances in Information Technology (RAIT). IEEE Kanchan S, Singh G, Chaudhari NS (2018) Re-encrypting secure and efficient routing in VANET groups using sharable clouds, 4th International Conference on Recent Advances in Information Technology (RAIT). IEEE
28.
go back to reference Bayat M et al (2015) A secure authentication scheme for VANETs with batch verification. Wirel Netw 21.5:1733–1743CrossRef Bayat M et al (2015) A secure authentication scheme for VANETs with batch verification. Wirel Netw 21.5:1733–1743CrossRef
29.
go back to reference Sur C, Park Y, Rhee KH (2016) An efficient and secure navigation protocol based on vehicular cloud. Int J Comput Math 93.2:325–344MathSciNetCrossRef Sur C, Park Y, Rhee KH (2016) An efficient and secure navigation protocol based on vehicular cloud. Int J Comput Math 93.2:325–344MathSciNetCrossRef
30.
go back to reference Kumari S, Khan MK (2014) More secure smart card-based remote user password authentication scheme with user anonymity. Secur Commun Netw 7.11:2039–2053CrossRef Kumari S, Khan MK (2014) More secure smart card-based remote user password authentication scheme with user anonymity. Secur Commun Netw 7.11:2039–2053CrossRef
31.
go back to reference Jianhong Z, Xu M, Liying L (2014) On the security of a secure batch verification with group testing for VANET. Int J Netw Secur 16.5:351–358 Jianhong Z, Xu M, Liying L (2014) On the security of a secure batch verification with group testing for VANET. Int J Netw Secur 16.5:351–358
32.
go back to reference Ateniese G, Fu K, Green M, Hohenberger S (2006) Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans Inf Syst Secur (TISSEC) 9:1–30CrossRef Ateniese G, Fu K, Green M, Hohenberger S (2006) Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans Inf Syst Secur (TISSEC) 9:1–30CrossRef
33.
go back to reference Jinila Y, Komathy K (2013) Bevish a privacy preserving authentication framework for safety messages in VANET. IET, pp 456–461 Jinila Y, Komathy K (2013) Bevish a privacy preserving authentication framework for safety messages in VANET. IET, pp 456–461
34.
go back to reference Parne BL, Gupta S, Chaudhari NS (2018) Segb: Security enhanced group based aka protocol for m2m communication in an iot enabled lte/lte-a network. IEEE Access 6:3668–3684CrossRef Parne BL, Gupta S, Chaudhari NS (2018) Segb: Security enhanced group based aka protocol for m2m communication in an iot enabled lte/lte-a network. IEEE Access 6:3668–3684CrossRef
Metadata
Title
EASPSC: Efficient authentication of SignRecryption protocol using shareable clouds in VANET groups
Authors
Sneha Kanchan
Garima Singh
Narendra S. Chaudhari
Publication date
20-08-2019
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 1/2020
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-019-00789-1

Other articles of this Issue 1/2020

Peer-to-Peer Networking and Applications 1/2020 Go to the issue

Premium Partner