Skip to main content
Top
Published in: Wireless Personal Communications 4/2021

09-06-2021

Efficient Privacy-Preserving Anonymous Authentication Protocol for Vehicular Ad-Hoc Networks

Authors: Xiaojun Zhang, Wenchen Wang, Liming Mu, Chao Huang, Hong Fu, Chunxiang Xu

Published in: Wireless Personal Communications | Issue 4/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Vehicular ad-hoc network (VANET) has been considered as one of the most promising wireless sensor technologies, which could enhance driving convenience and traffic efficiency through real-time information interaction. Nevertheless, emerging security issues (e.g., confidentiality, integrity, identity privacy, message authentication) will hinder the widespread deployment of VANETs. To address these issues, in this paper, we propose an efficient privacy-preserving anonymous authentication protocol for VANETs. We first design an identity-based signature algorithm, and exploit it with an account information of a vehicle to propose our anonymous authentication protocol. The protocol enables each vehicle to anonymously send an authenticated message to nearby roadside units (RSUs) in a confidential way, and efficiently check the feedback information from nearby RSUs. Simultaneously, the protocol achieves key-exchange functionality, which could produce a session key for later secure communication between vehicles and RSUs. Finally, we give the security analysis of the proposed protocol and conduct a comprehensive performance evaluation, the results demonstrate its feasibility in the secure deployment of VANETs.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Din, S., Paul, A., & Rehman, A. (2019). 5G-enabled hierarchical architecture for software-defined intelligent transportation system. Computer Networks, 150, 81–89.CrossRef Din, S., Paul, A., & Rehman, A. (2019). 5G-enabled hierarchical architecture for software-defined intelligent transportation system. Computer Networks, 150, 81–89.CrossRef
3.
go back to reference Khelifi, H., Luo, S., Nour, B., Moungla, H., Faheem, Y., Hussain, R., & Ksentini, A. (2020). Named data networking in vehicular ad hoc networks: State-of-the-art and challenges. IEEE Communications Surveys & Tutorials, 22(1), 320–351.CrossRef Khelifi, H., Luo, S., Nour, B., Moungla, H., Faheem, Y., Hussain, R., & Ksentini, A. (2020). Named data networking in vehicular ad hoc networks: State-of-the-art and challenges. IEEE Communications Surveys & Tutorials, 22(1), 320–351.CrossRef
4.
go back to reference He, D., Zeadally, S., Xu, B., & Huang, X. (2015). An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Transactions on Information Forensics & Security, 10(12), 2681–2691.CrossRef He, D., Zeadally, S., Xu, B., & Huang, X. (2015). An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Transactions on Information Forensics & Security, 10(12), 2681–2691.CrossRef
5.
go back to reference Chim, T., Yiu, S., Hui, L., & Li, V. (2011). SPECS: Secure and privacy enhancing communications schemes for VANETs. Ad Hoc Networks, 9(2), 189–203.CrossRef Chim, T., Yiu, S., Hui, L., & Li, V. (2011). SPECS: Secure and privacy enhancing communications schemes for VANETs. Ad Hoc Networks, 9(2), 189–203.CrossRef
6.
go back to reference Wang, F., Xu, Y., Zhang, H., Zhang, Y., & Zhu, L. (2016). 2FLIP: A two-factor lightweight privacy-preserving authentication scheme for VANET. IEEE Transactions on Vehicular Technology, 65(2), 896–911.CrossRef Wang, F., Xu, Y., Zhang, H., Zhang, Y., & Zhu, L. (2016). 2FLIP: A two-factor lightweight privacy-preserving authentication scheme for VANET. IEEE Transactions on Vehicular Technology, 65(2), 896–911.CrossRef
7.
go back to reference Wang, S., & Yao, N. (2019). A RSU-aided distributed trust framework for pseudonym-enabled privacy preservation in VANETs. Wireless Networks, 25(3), 1099–1115.CrossRef Wang, S., & Yao, N. (2019). A RSU-aided distributed trust framework for pseudonym-enabled privacy preservation in VANETs. Wireless Networks, 25(3), 1099–1115.CrossRef
8.
go back to reference Zhang, L., Hu, C., Wu, Q., Domingo-Ferrer, J., & Qin, B. (2016). Privacy-preserving vehicular communication authentication with hierarchical aggregation and fast response. IEEE Transactions on Computers, 65(8), 2562–2574.MathSciNetCrossRef Zhang, L., Hu, C., Wu, Q., Domingo-Ferrer, J., & Qin, B. (2016). Privacy-preserving vehicular communication authentication with hierarchical aggregation and fast response. IEEE Transactions on Computers, 65(8), 2562–2574.MathSciNetCrossRef
9.
go back to reference Asaar, M., Salmasizadeh, M., Susilo, W., & Majidi, A. (2018). A secure and efficient authentication technique for vehicular ad-hoc networks. IEEE Transactions on Vehicular Technology, 67(6), 5409–5423.CrossRef Asaar, M., Salmasizadeh, M., Susilo, W., & Majidi, A. (2018). A secure and efficient authentication technique for vehicular ad-hoc networks. IEEE Transactions on Vehicular Technology, 67(6), 5409–5423.CrossRef
10.
go back to reference Dimitrakopoulos, G., & Demestichas, P. (2010). Intelligent transportation systems. IEEE Vehicular Technology Magazine, 5(1), 77–84.CrossRef Dimitrakopoulos, G., & Demestichas, P. (2010). Intelligent transportation systems. IEEE Vehicular Technology Magazine, 5(1), 77–84.CrossRef
11.
go back to reference Jaballah, W. B., Conti, M., Mosbah, M., & Palazzi, C. E. (2014). Fast and secure multihop broadcast solutions for intervehicular communication. IEEE Transactions on Intelligent Transportation Systems, 15(1), 433–450.CrossRef Jaballah, W. B., Conti, M., Mosbah, M., & Palazzi, C. E. (2014). Fast and secure multihop broadcast solutions for intervehicular communication. IEEE Transactions on Intelligent Transportation Systems, 15(1), 433–450.CrossRef
12.
go back to reference Manivannan, D., Moni, S. S., & Zeadally, S. (2020). Secure authentication and privacy-preserving techniques in vehicular ad-hoc networks (VANETs). Vehicular Communications, 25, 100247.CrossRef Manivannan, D., Moni, S. S., & Zeadally, S. (2020). Secure authentication and privacy-preserving techniques in vehicular ad-hoc networks (VANETs). Vehicular Communications, 25, 100247.CrossRef
13.
go back to reference Azees, M., Vijayakumar, P., & Deborah, L. (2016). Comprehensive survey on security services in vehicular ad-hoc networks. Iet Intelligent Transport Systems, 10(6), 379–388.CrossRef Azees, M., Vijayakumar, P., & Deborah, L. (2016). Comprehensive survey on security services in vehicular ad-hoc networks. Iet Intelligent Transport Systems, 10(6), 379–388.CrossRef
14.
go back to reference Zhang, X., Wang, H., & Xu, C. (2019). Identity-based key-exposure resilient cloud storage public auditing scheme from lattices. Information Sciences, 472, 223–234.CrossRef Zhang, X., Wang, H., & Xu, C. (2019). Identity-based key-exposure resilient cloud storage public auditing scheme from lattices. Information Sciences, 472, 223–234.CrossRef
16.
go back to reference Karuppiah, M., Das, A., Li, X., Kumari, S., & Niranchana, R. (2018). Secure remote user mutual authentication scheme with key agreement for cloud environment. Mobile Networks & Applications, 11, 1–17. Karuppiah, M., Das, A., Li, X., Kumari, S., & Niranchana, R. (2018). Secure remote user mutual authentication scheme with key agreement for cloud environment. Mobile Networks & Applications, 11, 1–17.
17.
go back to reference He, D., Kumar, N., & Chilamkurti, N. (2015). “A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Information Sciences, 321(1), 263–277.CrossRef He, D., Kumar, N., & Chilamkurti, N. (2015). “A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Information Sciences, 321(1), 263–277.CrossRef
18.
go back to reference Cui, J., Zhang, J., Zhong, H., & Xu, Y. (2017). SPACF: A secure privacy-preserving authentication scheme for VANET with cuckoo filter. IEEE Transactions on Vehicular Technology, 66(11), 10283–10295.CrossRef Cui, J., Zhang, J., Zhong, H., & Xu, Y. (2017). SPACF: A secure privacy-preserving authentication scheme for VANET with cuckoo filter. IEEE Transactions on Vehicular Technology, 66(11), 10283–10295.CrossRef
19.
go back to reference Ali, I., Hassan, A., & Li, F. (2019). Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A survey. Vehicular Communications, 16, 45–61.CrossRef Ali, I., Hassan, A., & Li, F. (2019). Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A survey. Vehicular Communications, 16, 45–61.CrossRef
20.
go back to reference Liu, Y., He, Z., Zhao, S., & Wang, L. (2016). An efficient anonymous authentication protocol using batch operations for VANETs. Multimedia Tools Applications, 75(24), 17689–17709.CrossRef Liu, Y., He, Z., Zhao, S., & Wang, L. (2016). An efficient anonymous authentication protocol using batch operations for VANETs. Multimedia Tools Applications, 75(24), 17689–17709.CrossRef
21.
go back to reference Raya, M., & Hubaux, J. P. (2007). Securing vehicular ad hoc networks. IEEE International Conference on Pervasive Computing and Applications, 15, 39–68. Raya, M., & Hubaux, J. P. (2007). Securing vehicular ad hoc networks. IEEE International Conference on Pervasive Computing and Applications, 15, 39–68.
23.
go back to reference Shao, J., Lin, X., Lu, R., & Zuo, C. (2016). A threshold anonymous authentication protocol for VANETs. IEEE Transactions on Vehicular Technology, 65(3), 1711–1720.CrossRef Shao, J., Lin, X., Lu, R., & Zuo, C. (2016). A threshold anonymous authentication protocol for VANETs. IEEE Transactions on Vehicular Technology, 65(3), 1711–1720.CrossRef
24.
go back to reference Xie, Y., Wu, L., Shen, J., & Alelaiwi, A. (2017). EIAS-CP: New efficient identity-based authentication scheme with conditional privacy-preserving for VANETs. Telecommunication Systems, 65(2), 229–240.CrossRef Xie, Y., Wu, L., Shen, J., & Alelaiwi, A. (2017). EIAS-CP: New efficient identity-based authentication scheme with conditional privacy-preserving for VANETs. Telecommunication Systems, 65(2), 229–240.CrossRef
25.
go back to reference Li, J., Choo, K. R., Zhang, W., Kumari, S., Rodrigues, J. J. P. C., Khan, M. K., & Hogrefe, D. (2018). EPA-CPPA: An efficient, provably-secure and anonymous conditional privacy-preserving authentication scheme for vehicular ad hoc networks. Vehicular Communications, 13, 104–113.CrossRef Li, J., Choo, K. R., Zhang, W., Kumari, S., Rodrigues, J. J. P. C., Khan, M. K., & Hogrefe, D. (2018). EPA-CPPA: An efficient, provably-secure and anonymous conditional privacy-preserving authentication scheme for vehicular ad hoc networks. Vehicular Communications, 13, 104–113.CrossRef
27.
go back to reference Lo, N., & Tsai, J. (2016). An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings. IEEE Transactions on Intelligent Transportation Systems, 17(5), 1319–1328.CrossRef Lo, N., & Tsai, J. (2016). An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings. IEEE Transactions on Intelligent Transportation Systems, 17(5), 1319–1328.CrossRef
28.
go back to reference Mandal, S., Mohanty, S., & Majhi, B. (2018). Cryptanalysis and enhancement of an anonymous self-certified key exchange protocol. Wireless Personal Communications, 99(2), 863–891.CrossRef Mandal, S., Mohanty, S., & Majhi, B. (2018). Cryptanalysis and enhancement of an anonymous self-certified key exchange protocol. Wireless Personal Communications, 99(2), 863–891.CrossRef
29.
go back to reference Chatterjee, U., Govindan, V., Sadhukhan, R., Mukhopadhyay, D., Chakraborty, R. S., Mahata, D., & Prabhu, M. M. (2018). Building PUF based authentication and key exchange protocol for IoT without explicit CRPs in verifier database. IEEE Transactions on Dependable & Secure Computing, 16, 424–437.CrossRef Chatterjee, U., Govindan, V., Sadhukhan, R., Mukhopadhyay, D., Chakraborty, R. S., Mahata, D., & Prabhu, M. M. (2018). Building PUF based authentication and key exchange protocol for IoT without explicit CRPs in verifier database. IEEE Transactions on Dependable & Secure Computing, 16, 424–437.CrossRef
30.
go back to reference Chen, Y., Yuan, J., & Zhang, Y. (2020). An improved password-authenticated key exchange protocol for VANET. Vehicular Communications, 27(7), 100286. Chen, Y., Yuan, J., & Zhang, Y. (2020). An improved password-authenticated key exchange protocol for VANET. Vehicular Communications, 27(7), 100286.
31.
go back to reference Azees, M., Vijayakumar, P., & Deboarh, L. J. (2017). EAAP: Efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad-hoc networks. IEEE Transactions on Intelligent Transportation Systems, 18(9), 2467–2476.CrossRef Azees, M., Vijayakumar, P., & Deboarh, L. J. (2017). EAAP: Efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad-hoc networks. IEEE Transactions on Intelligent Transportation Systems, 18(9), 2467–2476.CrossRef
Metadata
Title
Efficient Privacy-Preserving Anonymous Authentication Protocol for Vehicular Ad-Hoc Networks
Authors
Xiaojun Zhang
Wenchen Wang
Liming Mu
Chao Huang
Hong Fu
Chunxiang Xu
Publication date
09-06-2021
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 4/2021
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-021-08605-x

Other articles of this Issue 4/2021

Wireless Personal Communications 4/2021 Go to the issue