Skip to main content
Top
Published in: International Journal of Information Security 4/2016

01-08-2016 | Regular Contribution

Privacy-preserving authentication framework using bloom filter for secure vehicular communications

Authors: Avleen Malhi, Shalini Batra

Published in: International Journal of Information Security | Issue 4/2016

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Vehicular ad hoc networks (VANETs) are the future of the intelligent transportation systems (ITS), which aim to improve traffic safety. The received message in VANETs can contain the malicious content that may affect the entire network; hence, these networks are more prone to such attacks. Thus, security is a major consideration before the deployment of such network. In this paper, a secure privacy-preserving authentication framework is proposed, which employs the use of pseudonyms for anonymous communication. A new digital signature scheme and aggregate verification scheme are designed for vehicular communications, and the ID-based signature scheme is used for vehicle-to-RSU communication. The multiple authorities are involved in revealing the identity of the vehicle in case of revocation. The signature verification scheme is improved by the use of bloom filters, and the results achieved by the proposed scheme have been implemented on a simulated environment.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Biswas, S., Misic, J.: A cross-layer approach to privacy-preserving authentication in WAVE-enabled VANETs. IEEE Trans. Veh. Technol. 62(5), 2182–2192 (2013)CrossRef Biswas, S., Misic, J.: A cross-layer approach to privacy-preserving authentication in WAVE-enabled VANETs. IEEE Trans. Veh. Technol. 62(5), 2182–2192 (2013)CrossRef
3.
go back to reference Bloom, B.H.: Space/time tradeoffs in hash coding with allowable errors. Commun. ACM 13(7), 422–426 (1970)CrossRefMATH Bloom, B.H.: Space/time tradeoffs in hash coding with allowable errors. Commun. ACM 13(7), 422–426 (1970)CrossRefMATH
4.
go back to reference Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Proceedings of CRYPTO, LNCS 2139, Springer-Verlag, pp. 213–229 (2001) Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Proceedings of CRYPTO, LNCS 2139, Springer-Verlag, pp. 213–229 (2001)
5.
go back to reference Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Advances incryptology EUROCRYPT,Springer Berlin Heidelberg, pp. 416-432 (2003) Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Advances incryptology EUROCRYPT,Springer Berlin Heidelberg, pp. 416-432 (2003)
6.
go back to reference Cheon, J.H., Yi, J.H.: Fast batch verification of multiple signatures. In: 10th International Conference on Practice and Theory in Public-Key Cryptography—PKC, Lecture Notes in Computer Science 4450, 442–457 (2007) Cheon, J.H., Yi, J.H.: Fast batch verification of multiple signatures. In: 10th International Conference on Practice and Theory in Public-Key Cryptography—PKC, Lecture Notes in Computer Science 4450, 442–457 (2007)
7.
go back to reference Choi, M.J., Hong, J.W.K.: Towards management of next generation networks. IEICE Trans. Commun. E90–B(1), 3004–3014 (2007)CrossRef Choi, M.J., Hong, J.W.K.: Towards management of next generation networks. IEICE Trans. Commun. E90–B(1), 3004–3014 (2007)CrossRef
8.
go back to reference Chuang, M.C., Lee, J.F.: TEAM: trust-extended authentication mechanism for vehicular ad hoc networks. IEEE Syst. J. 8(3), 749–758 (2014)CrossRef Chuang, M.C., Lee, J.F.: TEAM: trust-extended authentication mechanism for vehicular ad hoc networks. IEEE Syst. J. 8(3), 749–758 (2014)CrossRef
9.
go back to reference Gamage, C., Gras, B., Crispo, B., Tanenbaum, A.S.: An identity-based ring signature scheme with enhanced privacy. In: Second International Conference on Security and Privacy in Communication Networks (SecureComm 06) (2006) Gamage, C., Gras, B., Crispo, B., Tanenbaum, A.S.: An identity-based ring signature scheme with enhanced privacy. In: Second International Conference on Security and Privacy in Communication Networks (SecureComm 06) (2006)
10.
go back to reference Gamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Proceedings of CRYPTO 84 on Advances in Cryptology, pp. 10–18. Springer-Verlag New York, Inc., Santa Barbara, California, United States (1985) Gamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Proceedings of CRYPTO 84 on Advances in Cryptology, pp. 10–18. Springer-Verlag New York, Inc., Santa Barbara, California, United States (1985)
11.
go back to reference Ganan, C., Munoz, J.L., Esparza, O., Mata-Diaz, J., Alins, J.: EPA: an efficient and privacy-aware revocation mechanism for vehicular ad-hoc networks. Pervasive Mob. Comput. 21, 75–91 (2015)CrossRef Ganan, C., Munoz, J.L., Esparza, O., Mata-Diaz, J., Alins, J.: EPA: an efficient and privacy-aware revocation mechanism for vehicular ad-hoc networks. Pervasive Mob. Comput. 21, 75–91 (2015)CrossRef
12.
go back to reference Gan, C., Muoz, J.L., Esparza, O., Mata-Daz, J., Alins, J.: PPREM: privacy preserving REvocation mechanism for vehicular ad hoc networks. Comput. Stand. Interfaces 36(3), 513–523 (2014)CrossRef Gan, C., Muoz, J.L., Esparza, O., Mata-Daz, J., Alins, J.: PPREM: privacy preserving REvocation mechanism for vehicular ad hoc networks. Comput. Stand. Interfaces 36(3), 513–523 (2014)CrossRef
13.
go back to reference Gavril, O.: Security in VANET, Graduation project, PolytehnicaUniversity of Bucharest(2009) Gavril, O.: Security in VANET, Graduation project, PolytehnicaUniversity of Bucharest(2009)
14.
go back to reference Hartenstein, H., Laberteaux, K.P.: VANET: Vehicular Applications and Inter-Networking Technologies, vol. 1. Wiley, UK (2010)CrossRef Hartenstein, H., Laberteaux, K.P.: VANET: Vehicular Applications and Inter-Networking Technologies, vol. 1. Wiley, UK (2010)CrossRef
15.
go back to reference IEEE 1609.2: IEEE Trial-Use Standard for Wireless Access in Vehicular Environments (WAVE). Security Services for Applications and Management Messages. IEEE Std. IEEE 1609.2, version 2006 (2006) IEEE 1609.2: IEEE Trial-Use Standard for Wireless Access in Vehicular Environments (WAVE). Security Services for Applications and Management Messages. IEEE Std. IEEE 1609.2, version 2006 (2006)
16.
go back to reference Isern-Dey, A.P., Huguet-Rotger, L., Magdalena Payeras-Capell, M., Mut-Puigserver, M.: On the practicability of using group signatures on mobile devices: implementation and performance analysis on the android platform. Int. J. Inform. Secur. 14, 335345 (2015) Isern-Dey, A.P., Huguet-Rotger, L., Magdalena Payeras-Capell, M., Mut-Puigserver, M.: On the practicability of using group signatures on mobile devices: implementation and performance analysis on the android platform. Int. J. Inform. Secur. 14, 335345 (2015)
17.
go back to reference Jiang, Y., Shi, M., Shen, X., Lin, C.: BAT: a robust signature scheme for vehicular networks using binary authentication tree. IEEE Trans. Wirel. Commun. 8(4), 1974–1983 (2009)CrossRef Jiang, Y., Shi, M., Shen, X., Lin, C.: BAT: a robust signature scheme for vehicular networks using binary authentication tree. IEEE Trans. Wirel. Commun. 8(4), 1974–1983 (2009)CrossRef
18.
go back to reference Johnson, D., Menezes, A.: The Elliptic Curve Digital Signature Algorithm (ECDSA), Certicom Research, Canada; and Department of Combinatorics and Optimization, University of Waterloo, Canada,Technical Report, August (1999) Johnson, D., Menezes, A.: The Elliptic Curve Digital Signature Algorithm (ECDSA), Certicom Research, Canada; and Department of Combinatorics and Optimization, University of Waterloo, Canada,Technical Report, August (1999)
19.
go back to reference Kim, S.S., Choi, M.J., Ju, H.T., Ejiri, M., Hong, J.W.K.: Towards management requirements of future internet. In: Challenges for Next Generation Network Operations and Service Management, Lecture Notes in Computer Science 5297, 156–166 (2008). doi:10.1007/978-3-540-88623-5_16 Kim, S.S., Choi, M.J., Ju, H.T., Ejiri, M., Hong, J.W.K.: Towards management requirements of future internet. In: Challenges for Next Generation Network Operations and Service Management, Lecture Notes in Computer Science 5297, 156–166 (2008). doi:10.​1007/​978-3-540-88623-5_​16
20.
go back to reference Kim, S.H., Lee, I.Y.: A secure and efficient vehicle-to-vehicle communication scheme using bloom filter in VANETs. Int. J. Secur. Appl. 8(2), 9–24 (2014) Kim, S.H., Lee, I.Y.: A secure and efficient vehicle-to-vehicle communication scheme using bloom filter in VANETs. Int. J. Secur. Appl. 8(2), 9–24 (2014)
21.
go back to reference Li, Z., Chigan, C.: On resource-aware message verification in VANETs. In: Proceedings of IEEE International Conference on Communications, Cape Town, South Africa, pp. 23–27. 1–6 May (2010) Li, Z., Chigan, C.: On resource-aware message verification in VANETs. In: Proceedings of IEEE International Conference on Communications, Cape Town, South Africa, pp. 23–27. 1–6 May (2010)
22.
go back to reference Li, J., Lu, H., Guizani, M.: ACPN: a novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs. IEEE Trans. Parallel Distrib. Syst. 26(4), 938–948 (2015)CrossRef Li, J., Lu, H., Guizani, M.: ACPN: a novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs. IEEE Trans. Parallel Distrib. Syst. 26(4), 938–948 (2015)CrossRef
23.
go back to reference Lin, X., Sun, X., Ho, P.H., Shen, X.: GSIS: a secure and privacy-preserving protocol for vehicular communications. IEEE Trans. Veh. Technol. 56(6), 3442–3456 (2007)CrossRef Lin, X., Sun, X., Ho, P.H., Shen, X.: GSIS: a secure and privacy-preserving protocol for vehicular communications. IEEE Trans. Veh. Technol. 56(6), 3442–3456 (2007)CrossRef
24.
go back to reference Lu, H., Li, J., Guizani, M.: A novel ID-based authentication framework with adaptive privacy preservation for VANETs. In: IEEE Computing, Communications and Applications Conference, pp. 345–350 (2012) Lu, H., Li, J., Guizani, M.: A novel ID-based authentication framework with adaptive privacy preservation for VANETs. In: IEEE Computing, Communications and Applications Conference, pp. 345–350 (2012)
25.
go back to reference Lu, R., Lin, X., Zhu, H., Ho, P.H., Shen, X.: ECPP: efficient conditional privacy preservation protocol for secure vehicular communications. In: IEEE 27th Conference on Computer Communications (INFOCOM 2008), 13–18, 1903–1911 April (2008) Lu, R., Lin, X., Zhu, H., Ho, P.H., Shen, X.: ECPP: efficient conditional privacy preservation protocol for secure vehicular communications. In: IEEE 27th Conference on Computer Communications (INFOCOM 2008), 13–18, 1903–1911 April (2008)
26.
go back to reference Merkle, R.: A certified digital signature. In: Advances in Cryptology, CRYPTO89, Lecture Notes in Computer Science 435, Springer-Verlag, 234246 (1989) Merkle, R.: A certified digital signature. In: Advances in Cryptology, CRYPTO89, Lecture Notes in Computer Science 435, Springer-Verlag, 234246 (1989)
27.
go back to reference Pal, S.K., Sardana, P., Yadav, K.: Efficient multilingual keyword search using bloom filter for cloud computing applications. In: Fourth International Conference on Advanced Computing, pp. 13–15 (2012) Pal, S.K., Sardana, P., Yadav, K.: Efficient multilingual keyword search using bloom filter for cloud computing applications. In: Fourth International Conference on Advanced Computing, pp. 13–15 (2012)
28.
go back to reference Papadimitriou, A., Fessant, F.L., Viana, A.C., Sengul, C.: Cryptographic protocols to fight sinkhole attacks on tree-based routing in wireless sensor networks. In: 5th IEEE Workshop on Secure Network Protocols, pp. 43–48 (2009). doi:10.1109/NPSEC.2009.5342246 Papadimitriou, A., Fessant, F.L., Viana, A.C., Sengul, C.: Cryptographic protocols to fight sinkhole attacks on tree-based routing in wireless sensor networks. In: 5th IEEE Workshop on Secure Network Protocols, pp. 43–48 (2009). doi:10.​1109/​NPSEC.​2009.​5342246
29.
go back to reference Raya, M., Papadimitratos, P., Hubaux, J.P.: Securing vehicular communications. In: IEEE Wireless Communications Magazine, Special Issue on Inter-Vehicular Communications 13, no. LCA-ARTICLE-2006-015, 8–15 (2006) Raya, M., Papadimitratos, P., Hubaux, J.P.: Securing vehicular communications. In: IEEE Wireless Communications Magazine, Special Issue on Inter-Vehicular Communications 13, no. LCA-ARTICLE-2006-015, 8–15 (2006)
30.
go back to reference Raya, M., Hubaux, J.P.: Securing vehicular ad hoc networks. J. Comput. Secur. 15(1), 39–68 (2007)CrossRef Raya, M., Hubaux, J.P.: Securing vehicular ad hoc networks. J. Comput. Secur. 15(1), 39–68 (2007)CrossRef
31.
go back to reference Shamir, A.: Identity-based cryptosystems and signature schemes. In: Proceedings of CRYPTO ’84, LNCS 196, Springer-Verlag, pp.47–53 (1984) Shamir, A.: Identity-based cryptosystems and signature schemes. In: Proceedings of CRYPTO ’84, LNCS 196, Springer-Verlag, pp.47–53 (1984)
33.
go back to reference Shuhaimi, N., Juhana, T.: Security in vehicular ad-hoc network with identity based cryptography approach: a survey. In: 7th International Conference on Telecommunication Systems, Services, and Applications, 276–279 (2012) Shuhaimi, N., Juhana, T.: Security in vehicular ad-hoc network with identity based cryptography approach: a survey. In: 7th International Conference on Telecommunication Systems, Services, and Applications, 276–279 (2012)
34.
go back to reference Studer, A., Shi, E., Bai, F., Perrig, A.: Tacking together efficient authentication, revocation, and privacy in VANETs. In: 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 1–9 (2009) Studer, A., Shi, E., Bai, F., Perrig, A.: Tacking together efficient authentication, revocation, and privacy in VANETs. In: 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 1–9 (2009)
35.
go back to reference Sun, Y., Lu, R., Lin, X., Shen, X.S., Su, J.: An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. IEEE Trans. Veh. Technol. 59(7), 3589–3603 (2010)CrossRef Sun, Y., Lu, R., Lin, X., Shen, X.S., Su, J.: An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. IEEE Trans. Veh. Technol. 59(7), 3589–3603 (2010)CrossRef
36.
go back to reference Tsai, J.L.: An improved cross-layer privacy-preserving authentication in WAVE-enabled VANETs. IEEE Commun. Lett. 18(11), 1931–1934 (2014)CrossRef Tsai, J.L.: An improved cross-layer privacy-preserving authentication in WAVE-enabled VANETs. IEEE Commun. Lett. 18(11), 1931–1934 (2014)CrossRef
37.
go back to reference Wagan, A.A., Jung, L.T.: Security framework for low latency vanet applications. In: IEEE International Conference on Computer and Information Sciences (ICCOINS), pp. 1–6, Kuala Lumpur, Malaysia, 3–5 June (2014) Wagan, A.A., Jung, L.T.: Security framework for low latency vanet applications. In: IEEE International Conference on Computer and Information Sciences (ICCOINS), pp. 1–6, Kuala Lumpur, Malaysia, 3–5 June (2014)
38.
go back to reference Wang, M., Liu, D., Zhu, L., Xu, Y., Wang, F.: LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication. Computing, 1–24 (2014). doi:10.1007/s00607-014-0393-x Wang, M., Liu, D., Zhu, L., Xu, Y., Wang, F.: LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication. Computing, 1–24 (2014). doi:10.​1007/​s00607-014-0393-x
39.
go back to reference Wasef, A., Jiang, Y., Shen, X.: DCS: an efficient distributed-certificate-service scheme for vehicular networks. IEEE Trans. Veh. Technol. 59(2), 533–549 (2010)CrossRef Wasef, A., Jiang, Y., Shen, X.: DCS: an efficient distributed-certificate-service scheme for vehicular networks. IEEE Trans. Veh. Technol. 59(2), 533–549 (2010)CrossRef
40.
go back to reference Xue, X., Ding, J.: LPA: a new location based privacy preserving authentication protocol in VANET. Secur. Commun. Netw. 5(1), 69–78 (2012)CrossRef Xue, X., Ding, J.: LPA: a new location based privacy preserving authentication protocol in VANET. Secur. Commun. Netw. 5(1), 69–78 (2012)CrossRef
41.
go back to reference Yeh, C.H., Hsieh, M.Y., Li, K.C.: A certificate enhanced group key framework for vehicular Ad Hoc networks. In: Ubiquitous Information Technologies and Applications, Springer Netherlands, pp. 215–222 (2013) Yeh, C.H., Hsieh, M.Y., Li, K.C.: A certificate enhanced group key framework for vehicular Ad Hoc networks. In: Ubiquitous Information Technologies and Applications, Springer Netherlands, pp. 215–222 (2013)
42.
go back to reference Younes, M.B., Boukerche, A.: SCOOL: a secure traffic congestion control protocol for VANETs. In: Wireless Communications and Networking Conference (WCNC), 2015 IEEE, pp. 1960–1965 (2015) Younes, M.B., Boukerche, A.: SCOOL: a secure traffic congestion control protocol for VANETs. In: Wireless Communications and Networking Conference (WCNC), 2015 IEEE, pp. 1960–1965 (2015)
43.
go back to reference Zhang, C., Lu, R., Lin, X., Ho, P.H., Shen, X.: An efficient identity-based batch verification scheme for vehicular sensor networks. In: IEEE 27th Conference on Computer Communications (INFOCOM 2008), Phoenix, AZ, USA, pp. 246–250. April (2008) Zhang, C., Lu, R., Lin, X., Ho, P.H., Shen, X.: An efficient identity-based batch verification scheme for vehicular sensor networks. In: IEEE 27th Conference on Computer Communications (INFOCOM 2008), Phoenix, AZ, USA, pp. 246–250. April (2008)
44.
go back to reference Zhu, X., Lu, Y., Zhu, X., Qiu, S.: Lightweight and scalable secure communication in VANET. Int. J. Electron. 102(5), 765–780 (2015)CrossRef Zhu, X., Lu, Y., Zhu, X., Qiu, S.: Lightweight and scalable secure communication in VANET. Int. J. Electron. 102(5), 765–780 (2015)CrossRef
Metadata
Title
Privacy-preserving authentication framework using bloom filter for secure vehicular communications
Authors
Avleen Malhi
Shalini Batra
Publication date
01-08-2016
Publisher
Springer Berlin Heidelberg
Published in
International Journal of Information Security / Issue 4/2016
Print ISSN: 1615-5262
Electronic ISSN: 1615-5270
DOI
https://doi.org/10.1007/s10207-015-0299-4

Other articles of this Issue 4/2016

International Journal of Information Security 4/2016 Go to the issue

Premium Partner