Skip to main content
Top

2017 | OriginalPaper | Chapter

HEPPA: Highly Efficient Privacy Preserving Authentication for ITS

Authors : An Braeken, Sergey Bezzateev, Abdellah Touhafi, Natalia Voloshina

Published in: Computer Network Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Intelligent Transport Systems (ITS) play a very important role to increase the safety and to decrease road congestions. These systems require secure communication between both infrastructure and vehicles.
In this paper, we construct a three-factor highly efficient privacy preserving authentication (HEPPA) protocol between vehicles and road side units (RSUs) using a telematics device enabling biometric operations, bonded to the vehicle. Broadcast messages sent by the vehicles only contain symmetric key cryptographic operations. Elliptic curve cryptographic operations are used for the key establishment and renewal between the vehicles and RSUs. Due to the clever construction of the pseudonyms, the RSU listening the broadcast messages is able to directly detect malicious behaviour and to alert the neighbouring vehicles.
Moreover, no certificate revocation lists need to be stored at the vehicles and no list of key material is required at the RSUs. The real identity of malicious behaving vehicles and corresponding drivers can be revealed by a cooperation among RSU and certificate authority (CA). Consequently, attacking an RSU will not leak privacy related information. What is more, the tamper resistant hardware in the telematics device only stores user specific and temporary key related information, so no global system security parameters.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Armstrong, L.: Dedicated short range communications (DSRC) home (2002) Armstrong, L.: Dedicated short range communications (DSRC) home (2002)
2.
go back to reference Parno, B., Perrig, A.: Challenges in securing vehicular networks. Workshop on Hot Topics in Networks (HotNets-IV), pp. 1–6 (2005) Parno, B., Perrig, A.: Challenges in securing vehicular networks. Workshop on Hot Topics in Networks (HotNets-IV), pp. 1–6 (2005)
3.
go back to reference Raya, M., Hubaux, J.P.: Securing vehicular ad hoc networks. J. Comput. Secur. 15(1), 39–68 (2007)CrossRef Raya, M., Hubaux, J.P.: Securing vehicular ad hoc networks. J. Comput. Secur. 15(1), 39–68 (2007)CrossRef
4.
go back to reference Brown, L., Stallings, W.: User Authentication, Computer Security Principles and Practice, 2nd edn, pp. 71–105. Pearson, Upper Saddle River (2012) Brown, L., Stallings, W.: User Authentication, Computer Security Principles and Practice, 2nd edn, pp. 71–105. Pearson, Upper Saddle River (2012)
5.
go back to reference Wang, F., Xu, Y., Zhang, H., Zhang, Y., Zhu, L.: 2FLIP: a two-factor lightweight privacy preserving authentication scheme for VANET. IEEE Trans. Veh. Technol. 65(2), 896–911 (2015)CrossRef Wang, F., Xu, Y., Zhang, H., Zhang, Y., Zhu, L.: 2FLIP: a two-factor lightweight privacy preserving authentication scheme for VANET. IEEE Trans. Veh. Technol. 65(2), 896–911 (2015)CrossRef
6.
go back to reference Raya, M., Hubaux, J.: The security of vehicular ad hoc networks. In: 3rd ACM Workshop on Security of Ad hoc and Sensor Networks, pp. 11–21 (2005) Raya, M., Hubaux, J.: The security of vehicular ad hoc networks. In: 3rd ACM Workshop on Security of Ad hoc and Sensor Networks, pp. 11–21 (2005)
7.
go back to reference Braeken, A., Porambage, P.: Efficient anonym smart card based authentication scheme for multi-server. Architecture 9(9), 177–184 (2015) Braeken, A., Porambage, P.: Efficient anonym smart card based authentication scheme for multi-server. Architecture 9(9), 177–184 (2015)
8.
go back to reference Sun, Y., Lu, R., Lin, X., Shen, X.S.: An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. IEEE Trans. Veh. Technol. 59(1), 3589–3603 (2010)CrossRef Sun, Y., Lu, R., Lin, X., Shen, X.S.: An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. IEEE Trans. Veh. Technol. 59(1), 3589–3603 (2010)CrossRef
9.
go back to reference Zhang, C., Lu, R., Lin, X., Ho, P., Shen, X.S.: An efficient identity based batch verification scheme for vehicular sensor networks. In: IEEE INFOCOM, pp. 246–250 (2008) Zhang, C., Lu, R., Lin, X., Ho, P., Shen, X.S.: An efficient identity based batch verification scheme for vehicular sensor networks. In: IEEE INFOCOM, pp. 246–250 (2008)
10.
go back to reference Rajput, U., Abbas, F., Eun, H., Hussain, R., Oh, H.: Two level privacy preserving pseudonymous authentication protocol for VANET. In: IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 643–650 (2015) Rajput, U., Abbas, F., Eun, H., Hussain, R., Oh, H.: Two level privacy preserving pseudonymous authentication protocol for VANET. In: IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 643–650 (2015)
11.
go back to reference Lin, X., Sun, X., Ho, P.-H., Shen, X.: GSIS: a secure and privacy-preserving protocol for vehicular communications. IEEE Trans. Veh. Technol. 56(6), 3442–3456 (2007)CrossRef Lin, X., Sun, X., Ho, P.-H., Shen, X.: GSIS: a secure and privacy-preserving protocol for vehicular communications. IEEE Trans. Veh. Technol. 56(6), 3442–3456 (2007)CrossRef
12.
go back to reference Zhang, L., Wu, Q., Solanas, A., Domingo, F.J.: A scalable robust authentication protocol for secure vehicular communications. IEEE Trans. Veh. Technol. 59(1), 1606–1617 (2010)CrossRef Zhang, L., Wu, Q., Solanas, A., Domingo, F.J.: A scalable robust authentication protocol for secure vehicular communications. IEEE Trans. Veh. Technol. 59(1), 1606–1617 (2010)CrossRef
14.
go back to reference Wu, H.-T., Hsieh, W.-S.: RSU-based message authentication for vehicular ad-hoc networks. Springer- Multimed Tools Appl. 35, 1–13 (2011) Wu, H.-T., Hsieh, W.-S.: RSU-based message authentication for vehicular ad-hoc networks. Springer- Multimed Tools Appl. 35, 1–13 (2011)
15.
go back to reference IEEE Trial-Use Standard for Wireless Access in Vehicular Environments, IEEE Standard 1609.2 Std. (2006) IEEE Trial-Use Standard for Wireless Access in Vehicular Environments, IEEE Standard 1609.2 Std. (2006)
16.
go back to reference Xie, Y., Wu, L., Shen, J., Alelaiwi, A.: EIAS-CP: new efficient identity-based authentication scheme with conditional privacy-preserving for VANETs. Telecommun. Syst. pp. 1–12 (2016) Xie, Y., Wu, L., Shen, J., Alelaiwi, A.: EIAS-CP: new efficient identity-based authentication scheme with conditional privacy-preserving for VANETs. Telecommun. Syst. pp. 1–12 (2016)
17.
go back to reference Porambage, P., Braeken, A., Schmitt, C., Gurtov, A.V., Ylianttila, M., Stiller, B.: Group key establishment for enabling secure multicast communication in wireless sensor networks deployed for IoT applications. IEEE Access 3, 1503–1511 (2015)CrossRef Porambage, P., Braeken, A., Schmitt, C., Gurtov, A.V., Ylianttila, M., Stiller, B.: Group key establishment for enabling secure multicast communication in wireless sensor networks deployed for IoT applications. IEEE Access 3, 1503–1511 (2015)CrossRef
18.
go back to reference Studer, A., Bai, F., Bellur, B., Perrig, A.: Flexible, extensible, and efficient VANET authentication. J. Commun. Netw. 11, 589–598 (2009)CrossRef Studer, A., Bai, F., Bellur, B., Perrig, A.: Flexible, extensible, and efficient VANET authentication. J. Commun. Netw. 11, 589–598 (2009)CrossRef
Metadata
Title
HEPPA: Highly Efficient Privacy Preserving Authentication for ITS
Authors
An Braeken
Sergey Bezzateev
Abdellah Touhafi
Natalia Voloshina
Copyright Year
2017
DOI
https://doi.org/10.1007/978-3-319-65127-9_21

Premium Partner