Skip to main content
Top
Published in: Wireless Networks 5/2020

05-06-2019

NERA: A new and efficient RSU based authentication scheme for VANETs

Authors: Majid Bayat, Morteza Pournaghi, Majid Rahimi, Mostafa Barmshoory

Published in: Wireless Networks | Issue 5/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In vehicular ad-hoc networks (VANETs), the correctness of a message requires authentication of the origin vehicle. In this paper, we introduce a novel authentication scheme for VANETs which suggests a new solution for secure vehicle communications. The proposed scheme is an road side unit (RSU) based scheme in which the master key of the Trusted Authority (TA) is embedded in a tamper-proof device provided at the RSUs. Compared with the schemes that store the master key in the on-board units, our scheme is more practical because of a secure and high speed communication link between TA and RSUs. To the best of our knowledge, this solution has not yet been devised for secure authentication in VANETs and the same objective has been fulfilled in this paper. Moreover, we introduce a formal proof to prove the security of the proposed scheme. Finally, we present a simulation and comparison indicating the performance and efficiency of our scheme.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Arain, Q. A., Memon, I., Deng, Z., Memon, M. H., Mangi, F., & Zubedi, A. A. (2017). Location monitoring approach: Multiple mix-zones with location privacy protection based on traffic flow over road networks. Multimedia Tools and Applications, 77, 5563–5607. Arain, Q. A., Memon, I., Deng, Z., Memon, M. H., Mangi, F., & Zubedi, A. A. (2017). Location monitoring approach: Multiple mix-zones with location privacy protection based on traffic flow over road networks. Multimedia Tools and Applications, 77, 5563–5607.
2.
go back to reference Arain, Q. A., Zhongliang, D., Memon, I., Arain, S., Shaikh, F. K., Zubedi, A., et al. (2016). Privacy preserving dynamic pseudonym-based multiple mix-zones authentication protocol over road networks. Wireless Personal Communications, 95, 1–17. Arain, Q. A., Zhongliang, D., Memon, I., Arain, S., Shaikh, F. K., Zubedi, A., et al. (2016). Privacy preserving dynamic pseudonym-based multiple mix-zones authentication protocol over road networks. Wireless Personal Communications, 95, 1–17.
3.
go back to reference Barr, R., & Haas, Z. J. (2005). JiST/SWANS, wireless networks laboratory. Ithaca: Cornell University. Barr, R., & Haas, Z. J. (2005). JiST/SWANS, wireless networks laboratory. Ithaca: Cornell University.
4.
go back to reference Bayat, M., Barmshoory, M., Rahimi, M., & Aref, M. R. (2015). A secure authentication scheme for VANETs with batch verification. Wireless Networks, 21(Num 5), 1733–1743. Bayat, M., Barmshoory, M., Rahimi, M., & Aref, M. R. (2015). A secure authentication scheme for VANETs with batch verification. Wireless Networks, 21(Num 5), 1733–1743.
5.
go back to reference Bazzi, A., Masini, B. M., Zanella, A., & Thibault, I. (2017). On the performance of IEEE 802.11 p and LTE-V2V for the cooperative awareness of connected vehicles. IEEE Transactions on Vehicular Technology, 66(11), 10419–10432. Bazzi, A., Masini, B. M., Zanella, A., & Thibault, I. (2017). On the performance of IEEE 802.11 p and LTE-V2V for the cooperative awareness of connected vehicles. IEEE Transactions on Vehicular Technology, 66(11), 10419–10432.
6.
go back to reference Bellare, M., & Rogaway, P. (1993). Random oracles are practical: A paradigm for designing efficient protocols. Proceedings of the CCS, 93, 67–73. Bellare, M., & Rogaway, P. (1993). Random oracles are practical: A paradigm for designing efficient protocols. Proceedings of the CCS, 93, 67–73.
7.
go back to reference Biswas, S. M., Haque, M., & Misic, J. V. (2010). Privacy and anonymity in VANETs: A contemporary study. Ad Hoc Sensor Wireless Networks, 10(Num 2–3), 177–192. Biswas, S. M., Haque, M., & Misic, J. V. (2010). Privacy and anonymity in VANETs: A contemporary study. Ad Hoc Sensor Wireless Networks, 10(Num 2–3), 177–192.
8.
go back to reference Blau, J. (2008). Car talk-[update], spectrum. IEEE, 45(Num 10), 16-16. Blau, J. (2008). Car talk-[update], spectrum. IEEE, 45(Num 10), 16-16.
9.
go back to reference Boneh, D., Lynn, B., & Shacham, H. (2001). Short signatures from the weil pairing. Proceedings of Asiacrypt, 2248, 514–532.MathSciNetMATH Boneh, D., Lynn, B., & Shacham, H. (2001). Short signatures from the weil pairing. Proceedings of Asiacrypt, 2248, 514–532.MathSciNetMATH
10.
go back to reference Boyen, X., & Waters, B. (2006). Compact group signatures without random oracles. In Advances in cryptology-EUROCRYPT 2006 (pp. 427-444). Boyen, X., & Waters, B. (2006). Compact group signatures without random oracles. In Advances in cryptology-EUROCRYPT 2006 (pp. 427-444).
11.
go back to reference CAMP Vehicle Safety Communications Consortium. (2005). Vehicle safety communications project: Task 3 final report: identify intelligent vehicle safety applications enabled by DSRC. National Highway Traffic Safety Administration, US Department of Transportation, Washington DC CAMP Vehicle Safety Communications Consortium. (2005). Vehicle safety communications project: Task 3 final report: identify intelligent vehicle safety applications enabled by DSRC. National Highway Traffic Safety Administration, US Department of Transportation, Washington DC
12.
go back to reference Chim, T. W., Yiu, S. M., Hui, L. C., & Li, V. O. K. (2012). MLAS: Multiple level authentication scheme for VANETs. Ad Hoc Networks, 10(Num 7), 1445–1456. Chim, T. W., Yiu, S. M., Hui, L. C., & Li, V. O. K. (2012). MLAS: Multiple level authentication scheme for VANETs. Ad Hoc Networks, 10(Num 7), 1445–1456.
14.
go back to reference Dror, E. (2011). Vehicular ad-hoc networks VANETs simulator and hierarchical clustering algorithm. Beersheba: Ben-Gurion University of the Negev. Dror, E. (2011). Vehicular ad-hoc networks VANETs simulator and hierarchical clustering algorithm. Beersheba: Ben-Gurion University of the Negev.
16.
go back to reference Gennaro, R., Lysyanskaya, A., Malkin, T., Micali, S., & Rabin, T. (2000). Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13(Num 3), 361–396. Gennaro, R., Lysyanskaya, A., Malkin, T., Micali, S., & Rabin, T. (2000). Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13(Num 3), 361–396.
17.
go back to reference Guo, J., Baugh, J. P., & Wang, S. (2007). A group signature based secure and privacy-preserving vehicular communication framework. In Proceedings of the mobile networking for vehicular environments (pp. 103–108). Guo, J., Baugh, J. P., & Wang, S. (2007). A group signature based secure and privacy-preserving vehicular communication framework. In Proceedings of the mobile networking for vehicular environments (pp. 103–108).
18.
go back to reference Horng, S.J., Tzeng, S. F., Pan, Y., Fan, P., Wang, X., Li, T., & Khan, M. K., (2013). b-SPECS+: Batch verification for secure pseudonymous authentication in VANET. In IEEE transactions on information forensics and security (pp. 1860–1875). Horng, S.J., Tzeng, S. F., Pan, Y., Fan, P., Wang, X., Li, T., & Khan, M. K., (2013). b-SPECS+: Batch verification for secure pseudonymous authentication in VANET. In IEEE transactions on information forensics and security (pp. 1860–1875).
19.
go back to reference Horng, S. J., Tzeng, S. F., Li, T., Wang, X., Huang, P. H., & Khan, M. K. (2017). Enhancing security and privacy for identity-based batch verification scheme in VANET. IEEE Transactions on Vehicular Technology, 66(Num 4), 3235–3248. Horng, S. J., Tzeng, S. F., Li, T., Wang, X., Huang, P. H., & Khan, M. K. (2017). Enhancing security and privacy for identity-based batch verification scheme in VANET. IEEE Transactions on Vehicular Technology, 66(Num 4), 3235–3248.
20.
go back to reference Hsin-Te, W., Li, W.-S. , Tung-Shih, S., & Hsiehz, W.-S. (2010). A novel RSU-based message authentication scheme for VANET. In Fifth international conference on systems and networks communications, IEEE (pp. 111–116). Hsin-Te, W., Li, W.-S. , Tung-Shih, S., & Hsiehz, W.-S. (2010). A novel RSU-based message authentication scheme for VANET. In Fifth international conference on systems and networks communications, IEEE (pp. 111–116).
21.
go back to reference Huang, D., Misra, S., Verma, M., & Xue, G. (2011). PACP: An efficient pseudonymous authentication-based conditional privacy protocol for VANETs. IEEE Transactions on Intelligent Transportation Systems, 12(3), 736–746. Huang, D., Misra, S., Verma, M., & Xue, G. (2011). PACP: An efficient pseudonymous authentication-based conditional privacy protocol for VANETs. IEEE Transactions on Intelligent Transportation Systems, 12(3), 736–746.
22.
go back to reference Hu, C., Chim, T. W., Yiu, S.-M., Hui, L. C. K., & Li, V. O. K. (2012). Efficient HMAC-based secure communication for VANETs. Computer Networks, 56(9), 2292–2303. Hu, C., Chim, T. W., Yiu, S.-M., Hui, L. C. K., & Li, V. O. K. (2012). Efficient HMAC-based secure communication for VANETs. Computer Networks, 56(9), 2292–2303.
23.
go back to reference Hu, H., Lu, R., Huang, C., & Zhang, Z. (2016). PTRS: A privacy-preserving trust-based relay selection scheme in VANETs. Peer-to-Peer Networking and Applications, 10, 1204–1218. Hu, H., Lu, R., Huang, C., & Zhang, Z. (2016). PTRS: A privacy-preserving trust-based relay selection scheme in VANETs. Peer-to-Peer Networking and Applications, 10, 1204–1218.
25.
go back to reference Lee, C. C., & Lai, Y. Y. (2013). Toward a secure batch verification with group testing for VANET. Wireless Networks, 1–9, 1441–1449. Lee, C. C., & Lai, Y. Y. (2013). Toward a secure batch verification with group testing for VANET. Wireless Networks, 1–9, 1441–1449.
26.
go back to reference Li, J., Lu, H., & Guizani, M. (2015). ACPN: A novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs. IEEE Transactions on Parallel and Distributed Systems, 26(Num 4), 938–948. Li, J., Lu, H., & Guizani, M. (2015). ACPN: A novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs. IEEE Transactions on Parallel and Distributed Systems, 26(Num 4), 938–948.
27.
go back to reference Lin, X., Sun, X., Ho, P. H., & Shen, X. (2007). GSIS: A secure and privacy-preserving protocol for vehicular communications, IEEE Transactions on Vehicular Technology, 56(Num 6), 3442–3456. Lin, X., Sun, X., Ho, P. H., & Shen, X. (2007). GSIS: A secure and privacy-preserving protocol for vehicular communications, IEEE Transactions on Vehicular Technology, 56(Num 6), 3442–3456.
28.
go back to reference Liu, Y., Guo, W., Zhong, Q., & Yao, G. (2017). LVAP: Lightweight V2I authentication protocol using group communication in VANETs. International Journal of Communication Systems, 30, e3317. Liu, Y., Guo, W., Zhong, Q., & Yao, G. (2017). LVAP: Lightweight V2I authentication protocol using group communication in VANETs. International Journal of Communication Systems, 30, e3317.
29.
go back to reference Liu, Y., Wang, L., & Chen, H. H. (2015). Message authentication using proxy vehicles in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology, 64(Num 8), 3697–3710. Liu, Y., Wang, L., & Chen, H. H. (2015). Message authentication using proxy vehicles in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology, 64(Num 8), 3697–3710.
30.
go back to reference Lu, R., Lin, X., Liang, X., & Shen, X. (2012). A dynamic privacy-preserving key management scheme for location based services in VANETs. IEEE Transactions on Intelligent Transportation Systems, 13(1), 127–139. Lu, R., Lin, X., Liang, X., & Shen, X. (2012). A dynamic privacy-preserving key management scheme for location based services in VANETs. IEEE Transactions on Intelligent Transportation Systems, 13(1), 127–139.
31.
go back to reference Lu, R., Lin, X., Zhu, H., Ho, P. H., & Shen, X. (2008). ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications. Proceedings INFOCOM, 2008, 1229–1237. Lu, R., Lin, X., Zhu, H., Ho, P. H., & Shen, X. (2008). ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications. Proceedings INFOCOM, 2008, 1229–1237.
32.
go back to reference Mao, W. (2003). Modern cryptography: Theory and practice. Bengaluru: Pearson Education India.MATH Mao, W. (2003). Modern cryptography: Theory and practice. Bengaluru: Pearson Education India.MATH
33.
go back to reference Masini, B., Bazzi, A., & Zanella, A. A. (2018). Survey on the roadmap to mandate on board connectivity and enable V2V-based vehicular sensor networks. Sensors, 18(7), 2207. Masini, B., Bazzi, A., & Zanella, A. A. (2018). Survey on the roadmap to mandate on board connectivity and enable V2V-based vehicular sensor networks. Sensors, 18(7), 2207.
34.
go back to reference Memon, I. (2015). A secure and efficient communication scheme with authenticated key establishment protocol for road networks. Wireless Personal Communications, 85(3), 1167–1191. Memon, I. (2015). A secure and efficient communication scheme with authenticated key establishment protocol for road networks. Wireless Personal Communications, 85(3), 1167–1191.
35.
go back to reference Memon, I., Ali, Q., Zubedi, A., & Mangi, F. A. (2016). DPMM: Dynamic pseudonym-based multiple mix-zones generation for mobile traveler. Multimedia Tools and Applications, 76, 24359–24388. Memon, I., Ali, Q., Zubedi, A., & Mangi, F. A. (2016). DPMM: Dynamic pseudonym-based multiple mix-zones generation for mobile traveler. Multimedia Tools and Applications, 76, 24359–24388.
36.
go back to reference Memon, I., Arain, Q. A., Memon, H., & Mangi, F. A. (2017). Efficient user based authentication protocol for location based services discovery over road networks. Wireless Personal Communications, 95, 1–20. Memon, I., Arain, Q. A., Memon, H., & Mangi, F. A. (2017). Efficient user based authentication protocol for location based services discovery over road networks. Wireless Personal Communications, 95, 1–20.
37.
go back to reference Memon, I., Arain, Q. A., Memon, M. H., Mangi, F. A., & Akhtar, R. (2017). Search me if you can: Multiple mix zones with location privacy protection for mapping services. International Journal of Communication Systems, 30, e3312. Memon, I., Arain, Q. A., Memon, M. H., Mangi, F. A., & Akhtar, R. (2017). Search me if you can: Multiple mix zones with location privacy protection for mapping services. International Journal of Communication Systems, 30, e3312.
38.
go back to reference Memon, I., Hussain, I., Akhtar, R., & Chen, G. (2015). Enhanced privacy and authentication: An efficient and secure anonymous communication for location based service using asymmetric cryptography scheme, Wireless Personal Communications, 84(Num 2), 1487–1508. Memon, I., Hussain, I., Akhtar, R., & Chen, G. (2015). Enhanced privacy and authentication: An efficient and secure anonymous communication for location based service using asymmetric cryptography scheme, Wireless Personal Communications, 84(Num 2), 1487–1508.
39.
go back to reference Memon, I., Mohammed, M. R., Akhtar, R., Memon, H., Memon, M. H., & Shaikh, R. A. (2014). Design and implementation to authentication over a GSM system using certificate-less public key cryptography (CL-PKC). Wireless Personal Communications, 79(Num 1), 661–686. Memon, I., Mohammed, M. R., Akhtar, R., Memon, H., Memon, M. H., & Shaikh, R. A. (2014). Design and implementation to authentication over a GSM system using certificate-less public key cryptography (CL-PKC). Wireless Personal Communications, 79(Num 1), 661–686.
41.
go back to reference Pointcheval, D., & Stern, J. (2000). Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13(Num 3), 361–396.MATH Pointcheval, D., & Stern, J. (2000). Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13(Num 3), 361–396.MATH
42.
go back to reference Pournaghi, S. M., Zahednejad, B., Bayat, M., & Farjami, Y. (2018). NECPPA: A novel and efficient conditional privacy-preserving authentication scheme for VANET. Computer Networks, 134, 78–92. Pournaghi, S. M., Zahednejad, B., Bayat, M., & Farjami, Y. (2018). NECPPA: A novel and efficient conditional privacy-preserving authentication scheme for VANET. Computer Networks, 134, 78–92.
43.
go back to reference Qu, F., Wu, Z., Wang, F., & Cho, W. (2015). A security and privacy review of VANETs. IEEE Transactions on Intelligent Transportation Systems, 16(Num 6), 2985–2996. Qu, F., Wu, Z., Wang, F., & Cho, W. (2015). A security and privacy review of VANETs. IEEE Transactions on Intelligent Transportation Systems, 16(Num 6), 2985–2996.
44.
go back to reference Raya, M , & Hubaux, J. P. (2005). The security of vehicular ad hoc networks. In 3rd ACM workshop on Security of ad hoc and sensor networks (pp. 11–21). Raya, M , & Hubaux, J. P. (2005). The security of vehicular ad hoc networks. In 3rd ACM workshop on Security of ad hoc and sensor networks (pp. 11–21).
45.
go back to reference Raya, M., & Hubaux, J. P. (2007). Securing vehicular ad hoc networks. Journal of Computer Security, 15(Num 1,), 39–68. Raya, M., & Hubaux, J. P. (2007). Securing vehicular ad hoc networks. Journal of Computer Security, 15(Num 1,), 39–68.
46.
go back to reference Seo, H., Lee, K.-D., Yasukawa, S., Peng, Y., & Sartori, P. (2016). LTE evolution for vehicle-to-everything services. IEEE communications magazine, 54(6), 22–28. Seo, H., Lee, K.-D., Yasukawa, S., Peng, Y., & Sartori, P. (2016). LTE evolution for vehicle-to-everything services. IEEE communications magazine, 54(6), 22–28.
47.
go back to reference Shacham, H., & Waters, B., (2007). Efficient ring signatures without random oracles. In PKC. Shacham, H., & Waters, B., (2007). Efficient ring signatures without random oracles. In PKC.
48.
go back to reference Shao, J., Lin, X., Lu, R., & Zuo, C. (2016). A threshold anonymous authentication protocol for VANETs, IEEE Transactions on Vehicular Technology, 65(Num 3), 1711–1720. Shao, J., Lin, X., Lu, R., & Zuo, C. (2016). A threshold anonymous authentication protocol for VANETs, IEEE Transactions on Vehicular Technology, 65(Num 3), 1711–1720.
49.
go back to reference Sun, X., Lin, X., & Ho, P. H. (2007) Secure vehicular communications based on group signature and ID-based signature scheme. In ICC 2007, Moscow, Russia (pp. 1539–1545). Sun, X., Lin, X., & Ho, P. H. (2007) Secure vehicular communications based on group signature and ID-based signature scheme. In ICC 2007, Moscow, Russia (pp. 1539–1545).
50.
go back to reference Toghi, B., Saifuddin, M.D., Mahjoub, H. N., Mughal, M. O., Fallah, Y. P., Rao, J., Das, S. (2018). Multiple access in cellular V2X: Performance analysis in highly congested vehicular networks. In IEEE vehicular networking conference (VNC) (pp. 1–8). Toghi, B., Saifuddin, M.D., Mahjoub, H. N., Mughal, M. O., Fallah, Y. P., Rao, J., Das, S. (2018). Multiple access in cellular V2X: Performance analysis in highly congested vehicular networks. In IEEE vehicular networking conference (VNC) (pp. 1–8).
51.
go back to reference Vahedi, E., Bayat, M., Pakravan, M. R., & Aref, M. R. (2017). A secure ECC-based privacy preserving data aggregation scheme for smart grids. Computer Networks, 129, 28–36. Vahedi, E., Bayat, M., Pakravan, M. R., & Aref, M. R. (2017). A secure ECC-based privacy preserving data aggregation scheme for smart grids. Computer Networks, 129, 28–36.
52.
go back to reference Walsh, K., & Sirer, E. (2003). A staged network simulator (SNS). Ithaca: Computer Science Department, Cornell University. Walsh, K., & Sirer, E. (2003). A staged network simulator (SNS). Ithaca: Computer Science Department, Cornell University.
53.
go back to reference Wang, F., Xu, Y., Zhang, H., Zhang, Y., & Zhu, L. (2016). 2FLIP: A two-factor lightweight privacy-preserving authentication scheme for VANET. IEEE Transactions on Vehicular Technology, 65(Num 2), 896–911. Wang, F., Xu, Y., Zhang, H., Zhang, Y., & Zhu, L. (2016). 2FLIP: A two-factor lightweight privacy-preserving authentication scheme for VANET. IEEE Transactions on Vehicular Technology, 65(Num 2), 896–911.
54.
go back to reference Wang, Y., Zhong, H., Xu, Y., & Cui, J. (2016). ECPB: Efficient conditional privacy-preserving authentication scheme supporting batch verification for VANETs, International Journal of Network Security, 18(Num 2), 374–382. Wang, Y., Zhong, H., Xu, Y., & Cui, J. (2016). ECPB: Efficient conditional privacy-preserving authentication scheme supporting batch verification for VANETs, International Journal of Network Security, 18(Num 2), 374–382.
55.
go back to reference Wang, Y., Zhong, H., Xu, Y., Cui, J., & Guo, F. (2017). Efficient extensible conditional privacypreserving authentication scheme supporting batch verification for VANETs. Security and Communication Networks, 9, 5460–5471. Wang, Y., Zhong, H., Xu, Y., Cui, J., & Guo, F. (2017). Efficient extensible conditional privacypreserving authentication scheme supporting batch verification for VANETs. Security and Communication Networks, 9, 5460–5471.
56.
go back to reference Wasef, A., Jiang, Y., & Shen, X. (2010). An efficient distributed certificate service scheme for vehicular networks. IEEE Transactions on Vehicular Technology, 59(Num 2), 553. Wasef, A., Jiang, Y., & Shen, X. (2010). An efficient distributed certificate service scheme for vehicular networks. IEEE Transactions on Vehicular Technology, 59(Num 2), 553.
57.
go back to reference Wu, H.-T., & Hsieh, W.-S. (2013). RSU-based message authentication for vehicular ad-hoc networks. Multimedia Tools and Applications, 66(2), 215–227. Wu, H.-T., & Hsieh, W.-S. (2013). RSU-based message authentication for vehicular ad-hoc networks. Multimedia Tools and Applications, 66(2), 215–227.
58.
go back to reference Xiong, H., Beznosov, K., Qin, Z., & Ripeanu, M. (2010). Efficient and spontaneous privacy-preserving protocol for secure vehicular communication. In IEEE-ICC, Cape Town, South Africa (pp. 1–6). Xiong, H., Beznosov, K., Qin, Z., & Ripeanu, M. (2010). Efficient and spontaneous privacy-preserving protocol for secure vehicular communication. In IEEE-ICC, Cape Town, South Africa (pp. 1–6).
59.
go back to reference Xiong, H., Chen, Z., & Li, F. (2012). Efficient and multi-level privacy-preserving communication protocol for VANET. Computers and Electrical Engineering, Num 3(38), 573–581. Xiong, H., Chen, Z., & Li, F. (2012). Efficient and multi-level privacy-preserving communication protocol for VANET. Computers and Electrical Engineering, Num 3(38), 573–581.
60.
go back to reference Xue, X., & Ding, J. (2012). LPA: A new location-based privacy-preserving authentication protocol in VANET. Security and Communication Networks, 5, 69–78. Xue, X., & Ding, J. (2012). LPA: A new location-based privacy-preserving authentication protocol in VANET. Security and Communication Networks, 5, 69–78.
61.
go back to reference Zeng, X., Bagrodia, R., & Gerla, M., (1998). GloMoSim: A library for parallel simulation of large-scale wireless networks. In: Twelfth workshop on parallel and distributed simulation, 1998. PADS 98. Proceedings. IEEE (pp. 154–161). Zeng, X., Bagrodia, R., & Gerla, M., (1998). GloMoSim: A library for parallel simulation of large-scale wireless networks. In: Twelfth workshop on parallel and distributed simulation, 1998. PADS 98. Proceedings. IEEE (pp. 154–161).
62.
go back to reference Zhang, C., Lin, X., Lu, R. , & Ho, P.-H. (2008). RAISE: An efficient RSU-aided message authentication scheme in vehicular communication networks. In IEEE international conference on communications (pp. 1451–1457). Zhang, C., Lin, X., Lu, R. , & Ho, P.-H. (2008). RAISE: An efficient RSU-aided message authentication scheme in vehicular communication networks. In IEEE international conference on communications (pp. 1451–1457).
63.
go back to reference Zhang, J., Ma, L., Su, W., & Wang, Y., (2007). Privacy-preserving authentication based on short group signature in vehicular networks. In The first international Symposium on , data, privacy, and E-commerce, ISDPE 2007. Zhang, J., Ma, L., Su, W., & Wang, Y., (2007). Privacy-preserving authentication based on short group signature in vehicular networks. In The first international Symposium on , data, privacy, and E-commerce, ISDPE 2007.
64.
go back to reference Zhang, C., Ho Tapolcai J, P. H., & Tapolcai, J. (2011). On batch verification with group testing for vehicular communications. Wireless Networks, 17(num 8), 1851–1865. Zhang, C., Ho Tapolcai J, P. H., & Tapolcai, J. (2011). On batch verification with group testing for vehicular communications. Wireless Networks, 17(num 8), 1851–1865.
Metadata
Title
NERA: A new and efficient RSU based authentication scheme for VANETs
Authors
Majid Bayat
Morteza Pournaghi
Majid Rahimi
Mostafa Barmshoory
Publication date
05-06-2019
Publisher
Springer US
Published in
Wireless Networks / Issue 5/2020
Print ISSN: 1022-0038
Electronic ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-019-02039-x

Other articles of this Issue 5/2020

Wireless Networks 5/2020 Go to the issue