Skip to main content
Top
Published in:
Cover of the book

2022 | OriginalPaper | Chapter

1. Introduction

Authors : Ikram Ali, Yong Chen, Mohammad Faisal, Meng Li

Published in: Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The rapid and massive growth in the development of computer systems and wireless network communication technologies increases the range of applications of intelligent transportation systems (ITS) such as vehicular ad hoc networks (VANETs) in smart cities. In recent times, VANETs have received significant attention from academia, industries, and governments due to their importance in traffic management. According to an estimate, the market for vehicular communications in the coming years will reach several billion euros [2, 8]. VANETs can also be considered to be mobile ad hoc networks (MANETs) because they form a dynamic infrastructure in which fast moving vehicles communicate with each other in a secure and efficient way. They can also be considered to be vehicular sensor networks (VSNs) because they allow traffic-related information to be collected by road sensors [9]. In urban areas, the number of vehicles (cars, buses, trucks, etc.) is increasing on a daily bases. This results in an increase in traffic jams and accidents.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference I. Ali, A. Hassan, and F. Li. Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A survey, Vehicular Communications, 16:45–61, 20019. I. Ali, A. Hassan, and F. Li. Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A survey, Vehicular Communications, 16:45–61, 20019.
2.
go back to reference L. Zhang, C. Hu, Q. Wu, J. Domingo-Ferrer, and B. Qin. Privacy-preserving vehicular communication authentication with hierarchical aggregation and fast response. IEEE Transactions on Computers, 65(8):2562–2574, 2016. L. Zhang, C. Hu, Q. Wu, J. Domingo-Ferrer, and B. Qin. Privacy-preserving vehicular communication authentication with hierarchical aggregation and fast response. IEEE Transactions on Computers, 65(8):2562–2574, 2016.
3.
go back to reference Z. Lu, G. Qu, and Z. Liu. A survey on recent advances in vehicular network security, trust, and privacy. IEEE Transactions on Intelligent Transportation Systems, 20(2):760–776, 2018.CrossRef Z. Lu, G. Qu, and Z. Liu. A survey on recent advances in vehicular network security, trust, and privacy. IEEE Transactions on Intelligent Transportation Systems, 20(2):760–776, 2018.CrossRef
4.
go back to reference J. Cui, J. Zhang, H. Zhong, R. Shi, and Y. Xu. An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks, Information Sciences, 451:1–15, 2018.MathSciNetMATH J. Cui, J. Zhang, H. Zhong, R. Shi, and Y. Xu. An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks, Information Sciences, 451:1–15, 2018.MathSciNetMATH
5.
go back to reference H. Hasrouny, A. E. Samhat, C. Bassil, A. Laouiti. VANET security challenges and solutions: A survey. Vehicular Communications, 7:7–20, 2017.CrossRef H. Hasrouny, A. E. Samhat, C. Bassil, A. Laouiti. VANET security challenges and solutions: A survey. Vehicular Communications, 7:7–20, 2017.CrossRef
6.
go back to reference R. A. Uzcategui, A. J. De Sucre, and G. A. Marum. WAVE: A tutorial. IEEE Communications Magazine, 47(5):126–133, 2009.CrossRef R. A. Uzcategui, A. J. De Sucre, and G. A. Marum. WAVE: A tutorial. IEEE Communications Magazine, 47(5):126–133, 2009.CrossRef
7.
go back to reference Y. L. Morgan. Managing DSRC and WAVE standards operations in a V2V scenario. International Journal of Vehicular Technology, 2010:1–18, 2010. Y. L. Morgan. Managing DSRC and WAVE standards operations in a V2V scenario. International Journal of Vehicular Technology, 2010:1–18, 2010.
8.
go back to reference I. Yaqoob, I. Ahmad, E. Ahmed, A. Gani, M. Imran, and N. Guizani. Overcoming the key challenges to establishing vehicular communication: Is SDN the answer?. IEEE Communications Magazine, 55(7):128–134, 2017.CrossRef I. Yaqoob, I. Ahmad, E. Ahmed, A. Gani, M. Imran, and N. Guizani. Overcoming the key challenges to establishing vehicular communication: Is SDN the answer?. IEEE Communications Magazine, 55(7):128–134, 2017.CrossRef
9.
go back to reference U. Lee, B. Zhou, M. Gerla, E. Magistretti, P. Bellavista, and A. Corradi. Mobeyes: Smart mobs for urban monitoring with a vehicular sensor network. IEEE Wireless Communications, 13(5):52–57, 2006.CrossRef U. Lee, B. Zhou, M. Gerla, E. Magistretti, P. Bellavista, and A. Corradi. Mobeyes: Smart mobs for urban monitoring with a vehicular sensor network. IEEE Wireless Communications, 13(5):52–57, 2006.CrossRef
10.
go back to reference M. Obaidat, M. Khodjaeva, J. Holst, and M. B. Zid. Security and privacy challenges in vehicular ad hoc networks. Connected Vehicles in the Internet of Things, Springer, Cham, pages 223–251, 2020, M. Obaidat, M. Khodjaeva, J. Holst, and M. B. Zid. Security and privacy challenges in vehicular ad hoc networks. Connected Vehicles in the Internet of Things, Springer, Cham, pages 223–251, 2020,
11.
go back to reference M. Wazid, A. K. Das, R. Hussain, G. Succic, and J.J.P.C.Rodrigues. Authentication in cloud-driven IoT-based big data environment: Survey and outlook. Journal of Systems Architecture, 97:185–196, 2019.CrossRef M. Wazid, A. K. Das, R. Hussain, G. Succic, and J.J.P.C.Rodrigues. Authentication in cloud-driven IoT-based big data environment: Survey and outlook. Journal of Systems Architecture, 97:185–196, 2019.CrossRef
12.
go back to reference I. Ali, T. Lawrence, A. A. Omala, and F. Li. An efficient hybrid signcryption scheme with conditional privacy-preservation for heterogeneous vehicular communication in VANETs. IEEE Transactions on Vehicular Technology, 69(10):11266–11280, 2020.CrossRef I. Ali, T. Lawrence, A. A. Omala, and F. Li. An efficient hybrid signcryption scheme with conditional privacy-preservation for heterogeneous vehicular communication in VANETs. IEEE Transactions on Vehicular Technology, 69(10):11266–11280, 2020.CrossRef
13.
go back to reference I. Ali, Y. Chen, N. Ullah, M. Afzal, and Wen HE. Bilinear pairing-based hybrid signcryption for secure heterogeneous vehicular communications. IEEE Transactions on Vehicular Technology, 70(6):5974–5989, 2021. I. Ali, Y. Chen, N. Ullah, M. Afzal, and Wen HE. Bilinear pairing-based hybrid signcryption for secure heterogeneous vehicular communications. IEEE Transactions on Vehicular Technology, 70(6):5974–5989, 2021.
14.
go back to reference S. S. Manvi and S. Tangade. A survey on authentication schemes in VANETs for secured communication. Vehicular Communications, 9:19–30, 2017.CrossRef S. S. Manvi and S. Tangade. A survey on authentication schemes in VANETs for secured communication. Vehicular Communications, 9:19–30, 2017.CrossRef
15.
go back to reference F. Qu, Z. Wu, F. Wang, and W. Cho. A security and privacy review of VANETs. IEEE Transactions on Intelligent Transportation Systems, 16(6):2985–2996, 2015.CrossRef F. Qu, Z. Wu, F. Wang, and W. Cho. A security and privacy review of VANETs. IEEE Transactions on Intelligent Transportation Systems, 16(6):2985–2996, 2015.CrossRef
16.
go back to reference R. Lu, X. Lin, T. H. Luan, X. Liang, and X. Shen. Pseudonym changing at social spots: An effective strategy for location privacy in VANETs. IEEE Transactions on Vehicular Technology, 61(1):86–96, 2012.CrossRef R. Lu, X. Lin, T. H. Luan, X. Liang, and X. Shen. Pseudonym changing at social spots: An effective strategy for location privacy in VANETs. IEEE Transactions on Vehicular Technology, 61(1):86–96, 2012.CrossRef
17.
go back to reference A. khan, M. Ishtiaq, S. Anwar, and M. A. Shah. A survey on secure routing strategies in VANETs. 25th International Conference on Automation and Computing (ICAC), Lancaster, UK, pages 1–6, 2019. A. khan, M. Ishtiaq, S. Anwar, and M. A. Shah. A survey on secure routing strategies in VANETs. 25th International Conference on Automation and Computing (ICAC), Lancaster, UK, pages 1–6, 2019.
18.
go back to reference J. Freudiger, M. Raya, M. Felegyhazi, and P. Papadimitratos. Mix-zones for location privacy in vehicular networks. ACM Workshop on Wireless Networking for Intelligent Transportation Systems (WiNITS), Vancouver, Canada, 2007. J. Freudiger, M. Raya, M. Felegyhazi, and P. Papadimitratos. Mix-zones for location privacy in vehicular networks. ACM Workshop on Wireless Networking for Intelligent Transportation Systems (WiNITS), Vancouver, Canada, 2007.
19.
go back to reference J. Camenisch, S. Hohenberger, and M. Ø. Pedersen. Batch verification of short signatures. Journal of Cryptology, 25(4):723–747, 2012.MathSciNetMATHCrossRef J. Camenisch, S. Hohenberger, and M. Ø. Pedersen. Batch verification of short signatures. Journal of Cryptology, 25(4):723–747, 2012.MathSciNetMATHCrossRef
20.
go back to reference X. Wang, T. Wei, L. Kong, L. He, F. Wu, and G. Chen. ECASS: Edge computing based auxiliary sensing system for self-driving vehicles, Journal of Systems Architecture, 97:258–268, 2019.CrossRef X. Wang, T. Wei, L. Kong, L. He, F. Wu, and G. Chen. ECASS: Edge computing based auxiliary sensing system for self-driving vehicles, Journal of Systems Architecture, 97:258–268, 2019.CrossRef
21.
go back to reference Y. Liu, C. Wang, J. Huang, J. Sun, and W. Zhang. Novel 3-D nonstationary mmwave massive MIMO channel models for 5G high-speed train wireless communications. IEEE Transactions on Vehicular Technology, 68(3):2077–2086, 2019.CrossRef Y. Liu, C. Wang, J. Huang, J. Sun, and W. Zhang. Novel 3-D nonstationary mmwave massive MIMO channel models for 5G high-speed train wireless communications. IEEE Transactions on Vehicular Technology, 68(3):2077–2086, 2019.CrossRef
22.
go back to reference I. Ali, M. Faisal, and S. Abbas. A survey on lightweight authentication schemes in vertical handoff. International Journal of Cooperative Information Systems, 26(01):1630001, 2017.CrossRef I. Ali, M. Faisal, and S. Abbas. A survey on lightweight authentication schemes in vertical handoff. International Journal of Cooperative Information Systems, 26(01):1630001, 2017.CrossRef
23.
go back to reference D. Jiang, V. Taliwal, A. Meier, W. Holfelder, and R. Herrtwich. Design of 5.9 GHz DSRC-based vehicular safety communication. IEEE Wireless Communications, 13(5):36–43, 2006. D. Jiang, V. Taliwal, A. Meier, W. Holfelder, and R. Herrtwich. Design of 5.9 GHz DSRC-based vehicular safety communication. IEEE Wireless Communications, 13(5):36–43, 2006.
24.
go back to reference J. B. Kenney. Dedicated short-range communications (DSRC) standards in the united states. Proceedings of the IEEE, 99(7) 1162–1182, 2011.CrossRef J. B. Kenney. Dedicated short-range communications (DSRC) standards in the united states. Proceedings of the IEEE, 99(7) 1162–1182, 2011.CrossRef
25.
go back to reference S. Biddlestone, K. Redmill, R. Miucic, and Ü. Ozguner. An integrated 802.11p WAVE DSRC and vehicle traffic simulator with experimentally validated urban (los and nlos) propagation models. IEEE transactions on intelligent transportation systems, 13(4):1792–1802, 2012. S. Biddlestone, K. Redmill, R. Miucic, and Ü. Ozguner. An integrated 802.11p WAVE DSRC and vehicle traffic simulator with experimentally validated urban (los and nlos) propagation models. IEEE transactions on intelligent transportation systems, 13(4):1792–1802, 2012.
26.
go back to reference IEEE draft guide for wireless access in vehicular environments (WAVE) - architecture, IEEE P1609.0/D5 2012, 1–74, Sept. 2012. IEEE draft guide for wireless access in vehicular environments (WAVE) - architecture, IEEE P1609.0/D5 2012, 1–74, Sept. 2012.
27.
go back to reference IEEE approved draft standard for wireless access in vehicular environments (WAVE) - networking services, IEEE P1609.3v3/D6 2016, 1–162, 2015. IEEE approved draft standard for wireless access in vehicular environments (WAVE) - networking services, IEEE P1609.3v3/D6 2016, 1–162, 2015.
28.
go back to reference IEEE standard for wireless access in vehicular environments (WAVE) - networking services - redline, IEEE Std 1609.3-2016 (Revision of IEEE Std 1609.3-2010) - Redline 2016, 1–366, 2016. IEEE standard for wireless access in vehicular environments (WAVE) - networking services - redline, IEEE Std 1609.3-2016 (Revision of IEEE Std 1609.3-2010) - Redline 2016, 1–366, 2016.
29.
go back to reference R. Molina-Masegosa and J. Gozalvez. LTE-V for sidelink 5G V2X vehicular communications: A new 5G technology for short-range vehicle-to-everything communications. IEEE Vehicular Technology Magazine, 12(4):30–39, 2017.CrossRef R. Molina-Masegosa and J. Gozalvez. LTE-V for sidelink 5G V2X vehicular communications: A new 5G technology for short-range vehicle-to-everything communications. IEEE Vehicular Technology Magazine, 12(4):30–39, 2017.CrossRef
30.
go back to reference M. Gonzalez-Martín, M. Sepulcre, R. Molina-Masegosa, and J. Gozalvez. Analytical models of the performance of C-V2X mode 4 vehicular communications. IEEE Transactions on Vehicular Technology, 68(2):1155–1166, 2018.CrossRef M. Gonzalez-Martín, M. Sepulcre, R. Molina-Masegosa, and J. Gozalvez. Analytical models of the performance of C-V2X mode 4 vehicular communications. IEEE Transactions on Vehicular Technology, 68(2):1155–1166, 2018.CrossRef
31.
go back to reference L. Tellis, F. Ahmed-Zaid, J. E. Stinnett, C. Nave, T. E. Pilutti, T. D. Zwicky, J. A. Martell, and J. C. Ivan, Vehicle-to-infrastructure communication. US Patent App. 14/048,003 (Apr. 9 2015). L. Tellis, F. Ahmed-Zaid, J. E. Stinnett, C. Nave, T. E. Pilutti, T. D. Zwicky, J. A. Martell, and J. C. Ivan, Vehicle-to-infrastructure communication. US Patent App. 14/048,003 (Apr. 9 2015).
32.
go back to reference National Highway Traffic Safety Administration. Federal motor vehicle safety standards; V2V communications, PUB. L 82, 3854–4019, 2017. National Highway Traffic Safety Administration. Federal motor vehicle safety standards; V2V communications, PUB. L 82, 3854–4019, 2017.
33.
go back to reference G. Karagiannis, O. Altintas, E. Ekici, G. Heijenk, B. Jarupan, K. Lin, and T. Weil. Vehicular networking: A survey and tutorial on requirements, architectures, challenges, standards and solutions. IEEE Communications Surveys & Tutorials 13(4):584–616, 2011.CrossRef G. Karagiannis, O. Altintas, E. Ekici, G. Heijenk, B. Jarupan, K. Lin, and T. Weil. Vehicular networking: A survey and tutorial on requirements, architectures, challenges, standards and solutions. IEEE Communications Surveys & Tutorials 13(4):584–616, 2011.CrossRef
34.
go back to reference G. Singh. Video streaming communication over VANET. Recent Advances in Computational Intelligence, Springer, Cham, pages. 189–197, 2019. G. Singh. Video streaming communication over VANET. Recent Advances in Computational Intelligence, Springer, Cham, pages. 189–197, 2019.
35.
go back to reference Y. Lai, Y. Xu, F. Yang, W. Lu, and Q. Yu. Privacy-aware query processing in vehicular ad-hoc networks. Ad Hoc Networks, 91:101876, 2019.CrossRef Y. Lai, Y. Xu, F. Yang, W. Lu, and Q. Yu. Privacy-aware query processing in vehicular ad-hoc networks. Ad Hoc Networks, 91:101876, 2019.CrossRef
36.
go back to reference K. Li, M. H. Au, W. H. Ho, and Y. L. Wang. An efficient conditional privacy-preserving authentication scheme for vehicular ad hoc networks using online/offline certificateless aggregate signature. International Conference on Provable Security, Springer, Cham, pages 59–76, 2019. K. Li, M. H. Au, W. H. Ho, and Y. L. Wang. An efficient conditional privacy-preserving authentication scheme for vehicular ad hoc networks using online/offline certificateless aggregate signature. International Conference on Provable Security, Springer, Cham, pages 59–76, 2019.
37.
go back to reference I. Ali and F. Li. An efficient conditional privacy-preserving authentication scheme for vehicle-to-infrastructure communication in VANETs. Vehicular Communications, 22:100228, 2020.CrossRef I. Ali and F. Li. An efficient conditional privacy-preserving authentication scheme for vehicle-to-infrastructure communication in VANETs. Vehicular Communications, 22:100228, 2020.CrossRef
38.
go back to reference X. Yang, X. Yi, I. Khalil, Y. Zeng, X. Huang, S. Nepal, X. Yang, and H. Cui. A lightweight authentication scheme for vehicular ad hoc networks based on MSR. Vehicular Communications, 15:16–27, 2019.CrossRef X. Yang, X. Yi, I. Khalil, Y. Zeng, X. Huang, S. Nepal, X. Yang, and H. Cui. A lightweight authentication scheme for vehicular ad hoc networks based on MSR. Vehicular Communications, 15:16–27, 2019.CrossRef
39.
go back to reference C. Zhang, R. Lu, X. Lin, P.-H. Ho, and X. Shen. An efficient identity-based batch verification scheme for vehicular sensor networks. IEEE INFOCOM 2008-The 27th Conference on Computer Communications, IEEE, Phoenix, AZ, USA, pages 246–250, 2008. C. Zhang, R. Lu, X. Lin, P.-H. Ho, and X. Shen. An efficient identity-based batch verification scheme for vehicular sensor networks. IEEE INFOCOM 2008-The 27th Conference on Computer Communications, IEEE, Phoenix, AZ, USA, pages 246–250, 2008.
40.
go back to reference M. Raya and J.-P. Hubaux. Securing vehicular ad hoc networks. Journal of Computer Security, 15(1):39–68, 2007.CrossRef M. Raya and J.-P. Hubaux. Securing vehicular ad hoc networks. Journal of Computer Security, 15(1):39–68, 2007.CrossRef
41.
go back to reference S.-J. Horng, S.-F. Tzeng, P.-H. Huang, X. Wang, T. Li, and M. K. Khan. An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks. Information Sciences, 317:48–66, 2015.MathSciNetMATHCrossRef S.-J. Horng, S.-F. Tzeng, P.-H. Huang, X. Wang, T. Li, and M. K. Khan. An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks. Information Sciences, 317:48–66, 2015.MathSciNetMATHCrossRef
42.
43.
go back to reference R. Lu, X. Lin, H. Zhu, P.-H. Ho, and X. Shen. ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications. IEEE INFOCOM 2008-The 27th Conference on Computer Communications, Phoenix, AZ, USA, pages 1229–1237, 2008. R. Lu, X. Lin, H. Zhu, P.-H. Ho, and X. Shen. ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications. IEEE INFOCOM 2008-The 27th Conference on Computer Communications, Phoenix, AZ, USA, pages 1229–1237, 2008.
44.
go back to reference C. Zhang, X. Lin, R. Lu, and P.-H. Ho. RAISE: An efficient RSU-aided message authentication scheme in vehicular communication networks. IEEE international conference on communications, Beijing, China, pages 1451–1457, 2008. C. Zhang, X. Lin, R. Lu, and P.-H. Ho. RAISE: An efficient RSU-aided message authentication scheme in vehicular communication networks. IEEE international conference on communications, Beijing, China, pages 1451–1457, 2008.
45.
go back to reference A. Wasef and X. Shen. EMAP: Expedite message authentication protocol for vehicular ad hoc networks. IEEE Transactions on Mobile Computing, 12(1):78–89, 2013.CrossRef A. Wasef and X. Shen. EMAP: Expedite message authentication protocol for vehicular ad hoc networks. IEEE Transactions on Mobile Computing, 12(1):78–89, 2013.CrossRef
46.
go back to reference P. Cincilla, O. Hicham, and B. Charles. Vehicular PKI scalability-consistency trade-offs in large scale distributed scenarios. IEEE Vehicular Networking Conference (VNC), Columbus, OH, USA, pages. 1–8, 2016. P. Cincilla, O. Hicham, and B. Charles. Vehicular PKI scalability-consistency trade-offs in large scale distributed scenarios. IEEE Vehicular Networking Conference (VNC), Columbus, OH, USA, pages. 1–8, 2016.
47.
go back to reference A. Joshi, P. Gaonkar, and J. Bapat. A reliable and secure approach for efficient car-to-car communication in intelligent transportation systems. International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), IEEE, Chennai, India, pages 1617–1620, 2017. A. Joshi, P. Gaonkar, and J. Bapat. A reliable and secure approach for efficient car-to-car communication in intelligent transportation systems. International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), IEEE, Chennai, India, pages 1617–1620, 2017.
48.
go back to reference M. Azees, P. Vijayakumar, and L. J. Deboarh. EAAP: Efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems, 18(9):2467–2476, 2017.CrossRef M. Azees, P. Vijayakumar, and L. J. Deboarh. EAAP: Efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems, 18(9):2467–2476, 2017.CrossRef
49.
go back to reference M. Asghar, R. R. M. Doss, and L. Pan. A scalable and efficient PKI based authentication protocol for VANETs. 28th International Telecommunication Networks and Applications Conference (ITNAC), IEEE, Sydney, NSW, Australia, pages 1–3, 2018. M. Asghar, R. R. M. Doss, and L. Pan. A scalable and efficient PKI based authentication protocol for VANETs. 28th International Telecommunication Networks and Applications Conference (ITNAC), IEEE, Sydney, NSW, Australia, pages 1–3, 2018.
50.
go back to reference P. Gutmann. PKI: It’s not dead, just resting. Computer, 35(8):41–49, 2002.CrossRef P. Gutmann. PKI: It’s not dead, just resting. Computer, 35(8):41–49, 2002.CrossRef
51.
go back to reference A. J. Slagell and R. Bonilla. PKI scalability issues. arXiv preprint cs/0409018, 2004. A. J. Slagell and R. Bonilla. PKI scalability issues. arXiv preprint cs/0409018, 2004.
52.
go back to reference N. Islam. Certificate revocation in vehicular ad hoc networks: a novel approach. International Conference on Networking Systems and Security (NSysS), IEEE, Dhaka, Bangladesh, pages 1–5, 2016. N. Islam. Certificate revocation in vehicular ad hoc networks: a novel approach. International Conference on Networking Systems and Security (NSysS), IEEE, Dhaka, Bangladesh, pages 1–5, 2016.
53.
go back to reference A. Shamir. Identity-based cryptosystems and signature schemes. Workshop on the theory and application of cryptographic techniques, Springer, Berlin, Heidelberg, pages 47–53, 1984.MATH A. Shamir. Identity-based cryptosystems and signature schemes. Workshop on the theory and application of cryptographic techniques, Springer, Berlin, Heidelberg, pages 47–53, 1984.MATH
54.
go back to reference C. Zhang, P.-H. Ho, and J. Tapolcai. On batch verification with group testing for vehicular communications. Wireless Networks, 17(8):1851–1865, 2011.CrossRef C. Zhang, P.-H. Ho, and J. Tapolcai. On batch verification with group testing for vehicular communications. Wireless Networks, 17(8):1851–1865, 2011.CrossRef
55.
go back to reference J. Sun, C. Zhang, Y. Zhang, and Y. Fang. An identity-based security system for user privacy in vehicular ad hoc networks. IEEE Transactions on Parallel and Distributed Systems, 21(9):1227–1239, 2010.CrossRef J. Sun, C. Zhang, Y. Zhang, and Y. Fang. An identity-based security system for user privacy in vehicular ad hoc networks. IEEE Transactions on Parallel and Distributed Systems, 21(9):1227–1239, 2010.CrossRef
56.
go back to reference T. W. Chim, S.-M. Yiu, L. C. Hui, and V. O. Li. SPECS: Secure and privacy enhancing communications schemes for VANETs. Ad Hoc Networks, 9(2):189–203, 2011.CrossRef T. W. Chim, S.-M. Yiu, L. C. Hui, and V. O. Li. SPECS: Secure and privacy enhancing communications schemes for VANETs. Ad Hoc Networks, 9(2):189–203, 2011.CrossRef
57.
go back to reference K.-A. Shim. CPAS: An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Transactions on Vehicular Technology, 61(4):1874–1883, 2012.CrossRef K.-A. Shim. CPAS: An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Transactions on Vehicular Technology, 61(4):1874–1883, 2012.CrossRef
58.
go back to reference K.-A. Shim. Reconstruction of a secure authentication scheme for vehicular ad hoc networks using a binary authentication tree. IEEE Transactions on Wireless Communications, 12(11):5386–5393, 2013.CrossRef K.-A. Shim. Reconstruction of a secure authentication scheme for vehicular ad hoc networks using a binary authentication tree. IEEE Transactions on Wireless Communications, 12(11):5386–5393, 2013.CrossRef
59.
go back to reference C.-C. Lee and Y.-M. Lai. Toward a secure batch verification with group testing for VANET. Wireless Networks, 19(6):1441–1449, 2013.CrossRef C.-C. Lee and Y.-M. Lai. Toward a secure batch verification with group testing for VANET. Wireless Networks, 19(6):1441–1449, 2013.CrossRef
60.
go back to reference S.-J. Horng, S.-F. Tzeng, Y. Pan, P. Fan, X. Wang, T. Li, and M. K. Khan. b-SPECS+: Batch verification for secure pseudonymous authentication in VANET. IEEE Transactions on Information Forensics and Security, 8(11):1860–1875, 2013.CrossRef S.-J. Horng, S.-F. Tzeng, Y. Pan, P. Fan, X. Wang, T. Li, and M. K. Khan. b-SPECS+: Batch verification for secure pseudonymous authentication in VANET. IEEE Transactions on Information Forensics and Security, 8(11):1860–1875, 2013.CrossRef
61.
go back to reference J. K. Liu, T. H. Yuen, M. H. Au, and W. Susilo. Improvements on an authentication scheme for vehicular sensor networks. Expert Systems with Applications, 41(5):2559–2564, 2014.CrossRef J. K. Liu, T. H. Yuen, M. H. Au, and W. Susilo. Improvements on an authentication scheme for vehicular sensor networks. Expert Systems with Applications, 41(5):2559–2564, 2014.CrossRef
62.
go back to reference Z. Jianhong, X. Min, and L. Liying. On the security of a secure batch verification with group testing for VANET. International Journal of Network Security, 16(5):351–358, 2014. Z. Jianhong, X. Min, and L. Liying. On the security of a secure batch verification with group testing for VANET. International Journal of Network Security, 16(5):351–358, 2014.
63.
go back to reference M. Bayat, M. Barmshoory, M. Rahimi, and M. R. Aref. A secure authentication scheme for VANETs with batch verification. Wireless Networks, 21(5):1733–1743, 2015.CrossRef M. Bayat, M. Barmshoory, M. Rahimi, and M. R. Aref. A secure authentication scheme for VANETs with batch verification. Wireless Networks, 21(5):1733–1743, 2015.CrossRef
64.
go back to reference Y. Zhang, L. Yang, and S. Wang. An efficient identity-based signature scheme for vehicular communications. 11th International Conference on Computational Intelligence and Security (CIS), IEEE, Shenzhen, China, pages 326–330, 2015. Y. Zhang, L. Yang, and S. Wang. An efficient identity-based signature scheme for vehicular communications. 11th International Conference on Computational Intelligence and Security (CIS), IEEE, Shenzhen, China, pages 326–330, 2015.
65.
go back to reference S. Wang and N. Yao. LIAP: A local identity-based anonymous message authentication protocol in VANETs, Computer Communications, 112:154–164, 2017.CrossRef S. Wang and N. Yao. LIAP: A local identity-based anonymous message authentication protocol in VANETs, Computer Communications, 112:154–164, 2017.CrossRef
66.
go back to reference J. Liu, Y. Yu, Y. Zhao, J. Jia, and S. Wang. An efficient privacy preserving batch authentication scheme with deterable function for VANETs. International Conference on Network and System Security, Springer, Cham, pages 288–303, 2018. J. Liu, Y. Yu, Y. Zhao, J. Jia, and S. Wang. An efficient privacy preserving batch authentication scheme with deterable function for VANETs. International Conference on Network and System Security, Springer, Cham, pages 288–303, 2018.
67.
go back to reference J. Li, Y. Liu, Z. Zhang, B. Li, H. Liu, and J. Cheng. Efficient ID-based message authentication with enhanced privacy in wireless ad-hoc networks. International Conference on Computing, Networking and Communications (ICNC), IEEE, Maui, HI, USA, pages 322–326, 2018. J. Li, Y. Liu, Z. Zhang, B. Li, H. Liu, and J. Cheng. Efficient ID-based message authentication with enhanced privacy in wireless ad-hoc networks. International Conference on Computing, Networking and Communications (ICNC), IEEE, Maui, HI, USA, pages 322–326, 2018.
68.
go back to reference P. S. Barreto, H. Y. Kim, B. Lynn, and M. Scott. Efficient algorithms for pairing-based cryptosystems. Annual International Cryptology Conference, Springer, Berlin, Heidelberg, pages 354–369, 2002. P. S. Barreto, H. Y. Kim, B. Lynn, and M. Scott. Efficient algorithms for pairing-based cryptosystems. Annual International Cryptology Conference, Springer, Berlin, Heidelberg, pages 354–369, 2002.
69.
go back to reference J.-L. Tsai, and N.-W. Lo. A privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Systems Journal, 9(3):805–815, 2015.CrossRef J.-L. Tsai, and N.-W. Lo. A privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Systems Journal, 9(3):805–815, 2015.CrossRef
70.
go back to reference D. He, S. Zeadally, B. Xu, and X. Huang. An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Transactions on Information Forensics and Security, 10(12):2681–2691, 2015.CrossRef D. He, S. Zeadally, B. Xu, and X. Huang. An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Transactions on Information Forensics and Security, 10(12):2681–2691, 2015.CrossRef
71.
go back to reference N.-W. Lo and J.-L. Tsai. An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings. IEEE Transactions on Intelligent Transportation Systems, 17(5):1319–1328, 2016.CrossRef N.-W. Lo and J.-L. Tsai. An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings. IEEE Transactions on Intelligent Transportation Systems, 17(5):1319–1328, 2016.CrossRef
72.
go back to reference J. Cui, J. Zhang, H. Zhong, and Y. Xu. SPACF: A secure privacy-preserving authentication scheme for VANET with cuckoo filter. IEEE Transactions on Vehicular Technology, 66(11):10283–10295, 2017.CrossRef J. Cui, J. Zhang, H. Zhong, and Y. Xu. SPACF: A secure privacy-preserving authentication scheme for VANET with cuckoo filter. IEEE Transactions on Vehicular Technology, 66(11):10283–10295, 2017.CrossRef
73.
go back to reference Y. Xie, F. Xu, D. Li, and Y. Nie. Efficient message authentication scheme with conditional privacy-preserving and signature aggregation for vehicular cloud network. Wireless Communications and Mobile Computing, 2018:1–13, 2018. Y. Xie, F. Xu, D. Li, and Y. Nie. Efficient message authentication scheme with conditional privacy-preserving and signature aggregation for vehicular cloud network. Wireless Communications and Mobile Computing, 2018:1–13, 2018.
74.
go back to reference X. Zhang, L. Mu, J. Zhao, and C. Xu. An efficient anonymous authentication scheme with secure communication in intelligent vehicular ad-hoc networks. KSII Transactions on Internet and Information Systems (TIIS), 13 (6) (2019) 3280–3298. X. Zhang, L. Mu, J. Zhao, and C. Xu. An efficient anonymous authentication scheme with secure communication in intelligent vehicular ad-hoc networks. KSII Transactions on Internet and Information Systems (TIIS), 13 (6) (2019) 3280–3298.
75.
go back to reference I. Ali, T. Lawrence, and F. Li. An efficient identity-based signature scheme without bilinear pairing for vehicle-to-vehicle communication in VANETs. Journal of Systems Architecture, 103:101692, 2020.CrossRef I. Ali, T. Lawrence, and F. Li. An efficient identity-based signature scheme without bilinear pairing for vehicle-to-vehicle communication in VANETs. Journal of Systems Architecture, 103:101692, 2020.CrossRef
76.
go back to reference S. S. Al-Riyami and K. G. Paterson. Certificateless public key cryptography. International Conference on the Theory and Application of Cryptology and Information Security, Springer, Berlin, Heidelberg, pages 452–473, 2003. S. S. Al-Riyami and K. G. Paterson. Certificateless public key cryptography. International Conference on the Theory and Application of Cryptology and Information Security, Springer, Berlin, Heidelberg, pages 452–473, 2003.
77.
go back to reference L. Zhang, and F. Zhang. A new certificateless aggregate signature scheme. Computer Communications, 32(6):1079–1085, 2009.MathSciNetCrossRef L. Zhang, and F. Zhang. A new certificateless aggregate signature scheme. Computer Communications, 32(6):1079–1085, 2009.MathSciNetCrossRef
78.
go back to reference L. Zhang, B. Qin, Q. Wu, and F. Zhang. Efficient many-to-one authentication with certificateless aggregate signatures. Computer Networks, 54(14):2482–2491, 2010.MATHCrossRef L. Zhang, B. Qin, Q. Wu, and F. Zhang. Efficient many-to-one authentication with certificateless aggregate signatures. Computer Networks, 54(14):2482–2491, 2010.MATHCrossRef
79.
go back to reference H. Xiong, Q. Wu, and Z. Chen. An efficient provably secure certificateless aggregate signature applicable to mobile computation. Control and Cybernetics, 41(2):373–391, 2012.MathSciNetMATH H. Xiong, Q. Wu, and Z. Chen. An efficient provably secure certificateless aggregate signature applicable to mobile computation. Control and Cybernetics, 41(2):373–391, 2012.MathSciNetMATH
80.
go back to reference H. Xiong, Z. Guan, Z. Chen, and F. Li. An efficient certificateless aggregate signature with constant pairing computations. Information Sciences, 219:225–235, 2013.MathSciNetMATHCrossRef H. Xiong, Z. Guan, Z. Chen, and F. Li. An efficient certificateless aggregate signature with constant pairing computations. Information Sciences, 219:225–235, 2013.MathSciNetMATHCrossRef
81.
go back to reference L. Zhang, F. Zhang, and Q. Wu. Delegation of signing rights using certificateless proxy signatures. Information Sciences, 184(1):298–309, 2012.MathSciNetMATHCrossRef L. Zhang, F. Zhang, and Q. Wu. Delegation of signing rights using certificateless proxy signatures. Information Sciences, 184(1):298–309, 2012.MathSciNetMATHCrossRef
82.
go back to reference D. He, M. Tian, and J. Chen. Insecurity of an efficient certificateless aggregate signature with constant pairing computations. Information Sciences, 268:458–462, 2014.MathSciNetMATHCrossRef D. He, M. Tian, and J. Chen. Insecurity of an efficient certificateless aggregate signature with constant pairing computations. Information Sciences, 268:458–462, 2014.MathSciNetMATHCrossRef
83.
go back to reference L. Cheng, Q. Wen, Z. Jin, H. Zhang, and L. Zhou. Cryptanalysis and improvement of a certificateless aggregate signature scheme. Information Sciences, 295:337–346, 2015.MathSciNetMATHCrossRef L. Cheng, Q. Wen, Z. Jin, H. Zhang, and L. Zhou. Cryptanalysis and improvement of a certificateless aggregate signature scheme. Information Sciences, 295:337–346, 2015.MathSciNetMATHCrossRef
84.
go back to reference A. Malip, S.-L. Ng, and Q. Li. A certificateless anonymous authenticated announcement scheme in vehicular ad hoc networks. Security and Communication Networks, 7(3):588–601, 2014.CrossRef A. Malip, S.-L. Ng, and Q. Li. A certificateless anonymous authenticated announcement scheme in vehicular ad hoc networks. Security and Communication Networks, 7(3):588–601, 2014.CrossRef
85.
go back to reference A. K. Malhi and S. Batra. An efficient certificateless aggregate signature scheme for vehicular ad-hoc networks. Discrete Mathematics and Theoretical Computer Science, 17(1):317–338, 2015.MathSciNetMATH A. K. Malhi and S. Batra. An efficient certificateless aggregate signature scheme for vehicular ad-hoc networks. Discrete Mathematics and Theoretical Computer Science, 17(1):317–338, 2015.MathSciNetMATH
86.
go back to reference J. Li, H. Yuan, and Y. Zhang. Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks. Networks, 317:48–66, 2015. J. Li, H. Yuan, and Y. Zhang. Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks. Networks, 317:48–66, 2015.
87.
go back to reference J.-L. Tsai. A new efficient certificateless short signature scheme using bilinear pairings. IEEE Systems Journal, 11(4):2395–2402, 2015.CrossRef J.-L. Tsai. A new efficient certificateless short signature scheme using bilinear pairings. IEEE Systems Journal, 11(4):2395–2402, 2015.CrossRef
88.
go back to reference P. Kumar and V. Sharma. On the security of certificateless aggregate signature scheme in vehicular ad hoc networks. Soft Computing: Theories and Applications, Springer, Singapore, pages 715–722, 2018. P. Kumar and V. Sharma. On the security of certificateless aggregate signature scheme in vehicular ad hoc networks. Soft Computing: Theories and Applications, Springer, Singapore, pages 715–722, 2018.
89.
go back to reference X. Yang, C. Chen, T. Ma, Y. Li, and C. Wang. An improved certificateless aggregate signature scheme for vehicular ad-hoc networks. IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), Chongqing, China, pages. 2334–2338, 2018. X. Yang, C. Chen, T. Ma, Y. Li, and C. Wang. An improved certificateless aggregate signature scheme for vehicular ad-hoc networks. IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), Chongqing, China, pages. 2334–2338, 2018.
90.
go back to reference P. Kumar, S. Kumari, V. Sharma, X. Li, A. K. Sangaiah, and S. H. Islam. Secure CLS and CL-AS schemes designed for VANETs. The Journal of Supercomputing, 75(6):3076–3098, 2019.CrossRef P. Kumar, S. Kumari, V. Sharma, X. Li, A. K. Sangaiah, and S. H. Islam. Secure CLS and CL-AS schemes designed for VANETs. The Journal of Supercomputing, 75(6):3076–3098, 2019.CrossRef
91.
go back to reference I. Ali, M. Gervais, E. Ahene, and F. Li. A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs. Journal of Systems Architecture, 99:101636, 2019.CrossRef I. Ali, M. Gervais, E. Ahene, and F. Li. A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs. Journal of Systems Architecture, 99:101636, 2019.CrossRef
92.
go back to reference L. Chen, Z. Cheng, and N. P. Smart. Identity-based key agreement protocols from pairings. International Journal of Information Security, 6(4):213–241, 2007.CrossRef L. Chen, Z. Cheng, and N. P. Smart. Identity-based key agreement protocols from pairings. International Journal of Information Security, 6(4):213–241, 2007.CrossRef
93.
go back to reference H. Debiao, C. Jianhua, and Z. Rui. Efficient and provably-secure certificateless signature scheme without bilinear pairings. Cryptology ePrint Archive: Report 2010/632, 2010. H. Debiao, C. Jianhua, and Z. Rui. Efficient and provably-secure certificateless signature scheme without bilinear pairings. Cryptology ePrint Archive: Report 2010/632, 2010.
94.
go back to reference D. He, J. Chen, and R. Zhang. An efficient and provably-secure certificateless signature scheme without bilinear pairings. International Journal of Communication Systems, 25(11):1432–1442, 2012.CrossRef D. He, J. Chen, and R. Zhang. An efficient and provably-secure certificateless signature scheme without bilinear pairings. International Journal of Communication Systems, 25(11):1432–1442, 2012.CrossRef
95.
go back to reference S. H. Islam, and G. Biswas. Provably secure and pairing-free certificateless digital signature scheme using elliptic curve cryptography. International Journal of Computer Mathematics, 90(11):2244–2258, 2013.MATHCrossRef S. H. Islam, and G. Biswas. Provably secure and pairing-free certificateless digital signature scheme using elliptic curve cryptography. International Journal of Computer Mathematics, 90(11):2244–2258, 2013.MATHCrossRef
96.
go back to reference N. Tiwari. On the security of pairing-free certificateless digital signature schemes using ECC. ICT Express, 1(2):94–95, 2015.MathSciNetCrossRef N. Tiwari. On the security of pairing-free certificateless digital signature schemes using ECC. ICT Express, 1(2):94–95, 2015.MathSciNetCrossRef
97.
go back to reference Y. Zhou, S. Liu, M. Xiao, S. Deng, and X. Wang. An efficient V2I authentication scheme for VANETs. Mobile Information Systems 2018, 2018. Y. Zhou, S. Liu, M. Xiao, S. Deng, and X. Wang. An efficient V2I authentication scheme for VANETs. Mobile Information Systems 2018, 2018.
98.
go back to reference J. Cui, J. Zhang, H. Zhong, R. Shi, and Y. Xu. An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks. Information Sciences, 451:1–15, 2018.MathSciNetMATH J. Cui, J. Zhang, H. Zhong, R. Shi, and Y. Xu. An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks. Information Sciences, 451:1–15, 2018.MathSciNetMATH
99.
go back to reference I. A. Kamil and S. O. Ogundoyin. An improved certificateless aggregate signature scheme without bilinear pairings for vehicular ad hoc networks. Journal of Information Security and Applications, 44:184–200, 2019.CrossRef I. A. Kamil and S. O. Ogundoyin. An improved certificateless aggregate signature scheme without bilinear pairings for vehicular ad hoc networks. Journal of Information Security and Applications, 44:184–200, 2019.CrossRef
100.
go back to reference A. K. Sutrala, P. Bagga, A. K. Das, N. Kumar, J. J. Rodrigues, and P. Lorenz. On the design of conditional privacy preserving batch verification-based authentication scheme for Internet of vehicles deployment. IEEE Transactions on Vehicular Technology, 6(5):5535–5548, 2020.CrossRef A. K. Sutrala, P. Bagga, A. K. Das, N. Kumar, J. J. Rodrigues, and P. Lorenz. On the design of conditional privacy preserving batch verification-based authentication scheme for Internet of vehicles deployment. IEEE Transactions on Vehicular Technology, 6(5):5535–5548, 2020.CrossRef
101.
go back to reference I. Ali, Y. Chen, N. Ullah, R. Kumar, and W. He. An efficient and provably secure ECC-based conditional privacy-preserving authentication for vehicle-to-vehicle communication in VANETs. IEEE Transactions on Vehicular Technology, 70(2):1278–1291, 2021.CrossRef I. Ali, Y. Chen, N. Ullah, R. Kumar, and W. He. An efficient and provably secure ECC-based conditional privacy-preserving authentication for vehicle-to-vehicle communication in VANETs. IEEE Transactions on Vehicular Technology, 70(2):1278–1291, 2021.CrossRef
102.
go back to reference P. Bagga, A. K. Das, M. Wazid, J. Rodrigues, K.-K. R. Choo, and Y. Park. On the design of mutual authentication and key agreement protocol in Internet of vehicles-enabled intelligent transportation system. IEEE Transactions on Vehicular Technology, 70(2):1736–1751, 2021.CrossRef P. Bagga, A. K. Das, M. Wazid, J. Rodrigues, K.-K. R. Choo, and Y. Park. On the design of mutual authentication and key agreement protocol in Internet of vehicles-enabled intelligent transportation system. IEEE Transactions on Vehicular Technology, 70(2):1736–1751, 2021.CrossRef
103.
go back to reference Y. Zheng, Digital signcryption or how to achieve cost (signature & encryption) cost (signature)+ cost (encryption), in: Annual International Cryptology Conference, Springer, 1997, pp. 165–179. Y. Zheng, Digital signcryption or how to achieve cost (signature & encryption) cost (signature)+ cost (encryption), in: Annual International Cryptology Conference, Springer, 1997, pp. 165–179.
Metadata
Title
Introduction
Authors
Ikram Ali
Yong Chen
Mohammad Faisal
Meng Li
Copyright Year
2022
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-16-8586-6_1