Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 5/2020

10-05-2020

Hybrid conditional privacy-preserving authentication scheme for VANETs

Authors: Shibin Wang, Kele Mao, Furui Zhan, Dong Liu

Published in: Peer-to-Peer Networking and Applications | Issue 5/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In existing authentication schemes for vehicular ad hoc networks (VANETs), the public key infrastructure (PKI)-based pseudonym certificate, identity-based encryption and group signature technology are usually used to preserve the security and privacy. However, these schemes face some challenges, e.g., the time-consuming certificate revocation list (CRL) checking, identity revocation issue and the computation overhead of group signature, respectively. To cope with these challenges, we propose a hybrid conditional privacy-preserving authentication protocol based on the PKI certificate and identity-based signature. In our scheme, the trust authority (TA) assigns the unique long-term certificate for every registered node. Only the vehicle with valid certificate can apply the anonymous short term identity from the current RSU to sign safety-related message. The identity-based signature avoids the CRL checking and the complex bilinear paring operation. When vehicle is compromised, TA can easily revoke its identity by the only long-term certificate. To further enhance efficiency, vehicle can verify the received messages by the single or batch authentication manner. In addition, we optimize the authentication process to avoid vehicle verifying the repeated and unnecessary signatures. Compared with the current schemes, the simulation result shows that our authentication protocol can effectively reduce verified messages in the case of meeting the requirement of security and privacy.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Alazzawi MA, Lu H, Yassin AA, Chen K (2019) Robust conditional privacy-preserving authentication based on pseudonym root with cuckoo filter in vehicular ad hoc networks. KSII Transactions on Internet and Information Systems 13(12):6121–6144 Alazzawi MA, Lu H, Yassin AA, Chen K (2019) Robust conditional privacy-preserving authentication based on pseudonym root with cuckoo filter in vehicular ad hoc networks. KSII Transactions on Internet and Information Systems 13(12):6121–6144
2.
go back to reference Alfadhli SA, Alresheedi S, Lu S, Fatani A, Ince M (2019) Elcph: an efficient lightweight conditional privacy-preserving authentication scheme based on hash function and local group secrete key for vanet. pp 32–36 Alfadhli SA, Alresheedi S, Lu S, Fatani A, Ince M (2019) Elcph: an efficient lightweight conditional privacy-preserving authentication scheme based on hash function and local group secrete key for vanet. pp 32–36
3.
go back to reference Ali I, Lawrence T, Li F (2020) An efficient identity-based signature scheme without bilinear pairing for vehicle-to-vehicle communication in vanets Journal of Systems Architecture 103 Ali I, Lawrence T, Li F (2020) An efficient identity-based signature scheme without bilinear pairing for vehicle-to-vehicle communication in vanets Journal of Systems Architecture 103
4.
5.
go back to reference Bayat M, Barmshoory M, Rahimi M, Aref MR (2015) A secure authentication scheme for vanets with batch verification. Wireless Networks 21(5):1–11CrossRef Bayat M, Barmshoory M, Rahimi M, Aref MR (2015) A secure authentication scheme for vanets with batch verification. Wireless Networks 21(5):1–11CrossRef
6.
go back to reference Ben Jaballah W, Conti M, Mosbah M, Palazzi CE (2014) Fast and secure multihop broadcast solutions for intervehicular communication. Intelligent Transportation Systems IEEE Transactions on 15(1):433–450CrossRef Ben Jaballah W, Conti M, Mosbah M, Palazzi CE (2014) Fast and secure multihop broadcast solutions for intervehicular communication. Intelligent Transportation Systems IEEE Transactions on 15(1):433–450CrossRef
8.
go back to reference Buttyán L., Holczer T, Weimerskirch A, Whyte W (2010) SLOW: A Practical pseudonym changing scheme for location privacy in VANETs. In: IEEE Vehicular NETWORKING conference, pp. 1–8 Buttyán L., Holczer T, Weimerskirch A, Whyte W (2010) SLOW: A Practical pseudonym changing scheme for location privacy in VANETs. In: IEEE Vehicular NETWORKING conference, pp. 1–8
9.
go back to reference Chaum D, Heyst EV (1991) Group signatures springer berlin heidelberg Chaum D, Heyst EV (1991) Group signatures springer berlin heidelberg
10.
go back to reference Chen J, Mamun MSI, Miyaji A (2015) An efficient batch verification system and its effect in a real time vanet environment. Security & Communication Networks 8(2):298–310CrossRef Chen J, Mamun MSI, Miyaji A (2015) An efficient batch verification system and its effect in a real time vanet environment. Security & Communication Networks 8(2):298–310CrossRef
11.
go back to reference Doumiati S, Choikani TA, Artail H (2014) LPS For LBS: Location-privacy scheme for location-based services. In: Ieee/acs international conference on computer systems and applications, pp. 449–456 Doumiati S, Choikani TA, Artail H (2014) LPS For LBS: Location-privacy scheme for location-based services. In: Ieee/acs international conference on computer systems and applications, pp. 449–456
12.
go back to reference Emara K, Woerndl W, Schlichter J (2015) On evaluation of location privacy preserving schemes for vanet safety applications. Computer Communications 63(C):11–23CrossRef Emara K, Woerndl W, Schlichter J (2015) On evaluation of location privacy preserving schemes for vanet safety applications. Computer Communications 63(C):11–23CrossRef
13.
go back to reference Forster D, Kargl F, Lohr H (2014) PUCA: A pseudonym scheme with user-controlled anonymity for vehicular ad-hoc networks (vanet). In: Vehicular NETWORKING conference, pp. 25–32 Forster D, Kargl F, Lohr H (2014) PUCA: A pseudonym scheme with user-controlled anonymity for vehicular ad-hoc networks (vanet). In: Vehicular NETWORKING conference, pp. 25–32
14.
go back to reference Hao Y, Chengcheng Y, Zhou C, Song W (2011) A distributed key management framework with cooperative message authentication in vanets. IEEE Journal on Selected Areas in Communications 29(3):616–629CrossRef Hao Y, Chengcheng Y, Zhou C, Song W (2011) A distributed key management framework with cooperative message authentication in vanets. IEEE Journal on Selected Areas in Communications 29(3):616–629CrossRef
15.
go back to reference He D, Zeadally S, Xu B, Huang X (2015) An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Transactions on Information Forensics & Security 10 (12):1–1CrossRef He D, Zeadally S, Xu B, Huang X (2015) An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Transactions on Information Forensics & Security 10 (12):1–1CrossRef
16.
go back to reference Horng SJ, Tzeng SF, Huang PH, Wang X, Li T, Khan MK (2015) An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks. Information Sciences An International Journal, 317, pp 48–66 Horng SJ, Tzeng SF, Huang PH, Wang X, Li T, Khan MK (2015) An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks. Information Sciences An International Journal, 317, pp 48–66
17.
go back to reference Horng SJ, Tzeng SF, Pan Y, Fan P, Wang X, Li T, Khan MK (2013) b-SPECS+: Batch verification for secure pseudonymous authentication in VANET. IEEE Transactions on Information Forensics & Security 8(11):1860–1875CrossRef Horng SJ, Tzeng SF, Pan Y, Fan P, Wang X, Li T, Khan MK (2013) b-SPECS+: Batch verification for secure pseudonymous authentication in VANET. IEEE Transactions on Information Forensics & Security 8(11):1860–1875CrossRef
18.
go back to reference Huang D, Misra S, Verma M, Xue G (2011) PACP: An efficient pseudonymous authentication-based conditional privacy protocol for vanets. IEEE Transactions on Intelligent Transportation Systems 12(3):736–746CrossRef Huang D, Misra S, Verma M, Xue G (2011) PACP: An efficient pseudonymous authentication-based conditional privacy protocol for vanets. IEEE Transactions on Intelligent Transportation Systems 12(3):736–746CrossRef
19.
go back to reference Huang JL, Yeh LY, Chien HY (2011) ABAKA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology 60(1):248–262CrossRef Huang JL, Yeh LY, Chien HY (2011) ABAKA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology 60(1):248–262CrossRef
20.
go back to reference Islam SH, Obaidat MS, Vijayakumar P, Abdulhay E, Reddy MKC (2017) A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for vanets. Future Generation Computer Systems 84(JUL):216–227 Islam SH, Obaidat MS, Vijayakumar P, Abdulhay E, Reddy MKC (2017) A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for vanets. Future Generation Computer Systems 84(JUL):216–227
21.
go back to reference Jiang S, Zhu X, Wang L (2016) An efficient anonymous batch authentication scheme based on HMAC for VANETs. IEEE Transactions on Intelligent Transportation Systems 17(8):1CrossRef Jiang S, Zhu X, Wang L (2016) An efficient anonymous batch authentication scheme based on HMAC for VANETs. IEEE Transactions on Intelligent Transportation Systems 17(8):1CrossRef
22.
go back to reference Kanchan S, Singh G, Chaudhari NS (2020) Easpsc: Efficient authentication of signrecryption protocol using shareable clouds in vanet groups. Peer-to-Peer Networking and Applications 13(1):388–411CrossRef Kanchan S, Singh G, Chaudhari NS (2020) Easpsc: Efficient authentication of signrecryption protocol using shareable clouds in vanet groups. Peer-to-Peer Networking and Applications 13(1):388–411CrossRef
23.
go back to reference Liu X, Jia Z, Xu E, Gong B, Wang L (2019) A privacy protection scheme in vanets based on group signature. Communications in Computer and Information Science 960:286–300CrossRef Liu X, Jia Z, Xu E, Gong B, Wang L (2019) A privacy protection scheme in vanets based on group signature. Communications in Computer and Information Science 960:286–300CrossRef
24.
go back to reference Liu Y, Wang L, Chen H (2015) Message authentication using proxy vehicles in vehicular ad hoc networks. Vehicular Technology IEEE Transactions on 64(8):3697–3710CrossRef Liu Y, Wang L, Chen H (2015) Message authentication using proxy vehicles in vehicular ad hoc networks. Vehicular Technology IEEE Transactions on 64(8):3697–3710CrossRef
25.
go back to reference Lo NW, Tsai JL (2016) An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings. IEEE Transactions on Intelligent Transportation Systems 17(5):1319–1328CrossRef Lo NW, Tsai JL (2016) An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings. IEEE Transactions on Intelligent Transportation Systems 17(5):1319–1328CrossRef
26.
go back to reference Lu R, Li X, Luan TH, Liang X (2012) Pseudonym changing at social spots: an effective strategy for location privacy in vanets. Vehicular Technology IEEE Transactions on 61(1):86–96CrossRef Lu R, Li X, Luan TH, Liang X (2012) Pseudonym changing at social spots: an effective strategy for location privacy in vanets. Vehicular Technology IEEE Transactions on 61(1):86–96CrossRef
27.
go back to reference Pan Y, Li J (2013) Cooperative pseudonym change scheme based on the number of neighbors in vanets. Journal of Network & Computer Applications 36(6):1599–1609MathSciNetCrossRef Pan Y, Li J (2013) Cooperative pseudonym change scheme based on the number of neighbors in vanets. Journal of Network & Computer Applications 36(6):1599–1609MathSciNetCrossRef
28.
go back to reference Shen AN, Guo S, Zeng D, Guizani M (2012) A lightweight privacy-preserving protocol using chameleon hashing for secure vehicular communications, Vehicular Communication, pp 2543–2548 Shen AN, Guo S, Zeng D, Guizani M (2012) A lightweight privacy-preserving protocol using chameleon hashing for secure vehicular communications, Vehicular Communication, pp 2543–2548
29.
go back to reference Shim KA (2012) CPAS: An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Transactions on Vehicular Technology 61(4):1874–1883CrossRef Shim KA (2012) CPAS: An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Transactions on Vehicular Technology 61(4):1874–1883CrossRef
30.
go back to reference Shirase M, Miyazaki Y, Takagi T, Han DG, Choi D (2009) Efficient implementation of pairing-based cryptography on a sensor node. Ieice Transactions on Information & Systems 92-D(5):909–917CrossRef Shirase M, Miyazaki Y, Takagi T, Han DG, Choi D (2009) Efficient implementation of pairing-based cryptography on a sensor node. Ieice Transactions on Information & Systems 92-D(5):909–917CrossRef
31.
go back to reference Song C, Gu X, Wang L, Liu Z, Ping Y (2019) Research on identity-based batch anonymous authentication scheme for vanet. KSII Transactions on Internet and Information Systems 13(12):6175–6189 Song C, Gu X, Wang L, Liu Z, Ping Y (2019) Research on identity-based batch anonymous authentication scheme for vanet. KSII Transactions on Internet and Information Systems 13(12):6175–6189
32.
go back to reference Sun Y, Lu R, Lin X, Shen X (2010) An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. IEEE Transactions on Vehicular Technology 59(7):3589–3603CrossRef Sun Y, Lu R, Lin X, Shen X (2010) An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. IEEE Transactions on Vehicular Technology 59(7):3589–3603CrossRef
33.
go back to reference Sun Y, Zhang B, Zhao B, Su X, Su J (2015) Mix-zones optimal deployment for protecting location privacy in vanet. Peer-to-Peer Networking and Applications 8(6):1108–1121CrossRef Sun Y, Zhang B, Zhao B, Su X, Su J (2015) Mix-zones optimal deployment for protecting location privacy in vanet. Peer-to-Peer Networking and Applications 8(6):1108–1121CrossRef
34.
go back to reference Thenmozhi T, Somasundaram RM (2015) Pseudonyms based blind signature approach for an improved secured communication at social spots in vanets. Wireless Personal Communications 82(1):643–658CrossRef Thenmozhi T, Somasundaram RM (2015) Pseudonyms based blind signature approach for an improved secured communication at social spots in vanets. Wireless Personal Communications 82(1):643–658CrossRef
35.
go back to reference Vijayakumar P, Azees M, Chang V, Deborah J, Balusamy B Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks. Cluster Computing Vijayakumar P, Azees M, Chang V, Deborah J, Balusamy B Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks. Cluster Computing
36.
go back to reference Vijayakumar P, Azees M, Deborah LJ (2015) Cpav: Computationally efficient privacy preserving anonymous authentication scheme for vehicular ad hoc networks. In: 2015 IEEE 2Nd international conference on cyber security and cloud computing (CSCloud) Vijayakumar P, Azees M, Deborah LJ (2015) Cpav: Computationally efficient privacy preserving anonymous authentication scheme for vehicular ad hoc networks. In: 2015 IEEE 2Nd international conference on cyber security and cloud computing (CSCloud)
37.
go back to reference Wasef A, Shen X (2010) Efficient group signature scheme supporting batch verification for securing vehicular networks. In: IEEE International conference on communications, pp. 1–5 Wasef A, Shen X (2010) Efficient group signature scheme supporting batch verification for securing vehicular networks. In: IEEE International conference on communications, pp. 1–5
38.
go back to reference Wasef A, Shen X (2010) REP: Location Privacy for vanets using random encryption periods. Mobile Networks & Applications 15(1):172–185CrossRef Wasef A, Shen X (2010) REP: Location Privacy for vanets using random encryption periods. Mobile Networks & Applications 15(1):172–185CrossRef
39.
go back to reference Wasef A, Shen X (2013) EMAP: Expedite Message authentication protocol for vehicular ad hoc networks. Mobile Computing IEEE Transactions on 12(1):78–89CrossRef Wasef A, Shen X (2013) EMAP: Expedite Message authentication protocol for vehicular ad hoc networks. Mobile Computing IEEE Transactions on 12(1):78–89CrossRef
40.
go back to reference Wisitpongphan N, Bai F, Mudalige P, Sadekar V (2007) Routing in sparse vehicular ad hoc wireless networks. IEEE Journal on Selected Areas in Communications 25(8):1538–1556CrossRef Wisitpongphan N, Bai F, Mudalige P, Sadekar V (2007) Routing in sparse vehicular ad hoc wireless networks. IEEE Journal on Selected Areas in Communications 25(8):1538–1556CrossRef
41.
go back to reference Xiong H, Guan Z, Chen Z, Li F (2013) An efficient certificateless aggregate signature with constant pairing computations. Information Sciences, 219, pp 225–235 Xiong H, Guan Z, Chen Z, Li F (2013) An efficient certificateless aggregate signature with constant pairing computations. Information Sciences, 219, pp 225–235
42.
go back to reference Yang X, Liu R, Wang M, Chen G (2019) Identity-based aggregate signature scheme in vehicle ad-hoc network. pp 1046–1049 Yang X, Liu R, Wang M, Chen G (2019) Identity-based aggregate signature scheme in vehicle ad-hoc network. pp 1046–1049
43.
go back to reference Ying B, Makrakis D, Hou Z (2015) Motivation for protecting selfish vehicles’ location privacy in vehicular networks. IEEE Transactions on Vehicular Technology 64(12):5631–5641CrossRef Ying B, Makrakis D, Hou Z (2015) Motivation for protecting selfish vehicles’ location privacy in vehicular networks. IEEE Transactions on Vehicular Technology 64(12):5631–5641CrossRef
44.
go back to reference Zhang C, Ho PH, Tapolcai J (2011) On batch verification with group testing for vehicular communications. Wireless Networks 17(8):1851–1865CrossRef Zhang C, Ho PH, Tapolcai J (2011) On batch verification with group testing for vehicular communications. Wireless Networks 17(8):1851–1865CrossRef
45.
go back to reference Zhang L, Hu C, Wu Q, Domingo-Ferrer J (2016) Privacy-preserving vehicular communication authentication with hierarchical aggregation and fast response. IEEE Transactions on Computers 65(8):2562–2574MathSciNetMATHCrossRef Zhang L, Hu C, Wu Q, Domingo-Ferrer J (2016) Privacy-preserving vehicular communication authentication with hierarchical aggregation and fast response. IEEE Transactions on Computers 65(8):2562–2574MathSciNetMATHCrossRef
46.
go back to reference Zhu X, Jiang S, Wang L, Li H (2014) Efficient privacy-preserving authentication for vehicular ad hoc networks. IEEE Transactions on Vehicular Technology 63(2):907–919CrossRef Zhu X, Jiang S, Wang L, Li H (2014) Efficient privacy-preserving authentication for vehicular ad hoc networks. IEEE Transactions on Vehicular Technology 63(2):907–919CrossRef
Metadata
Title
Hybrid conditional privacy-preserving authentication scheme for VANETs
Authors
Shibin Wang
Kele Mao
Furui Zhan
Dong Liu
Publication date
10-05-2020
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 5/2020
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-020-00916-3

Other articles of this Issue 5/2020

Peer-to-Peer Networking and Applications 5/2020 Go to the issue

Premium Partner