Skip to main content
Erschienen in: International Journal of Information Security 4/2016

01.08.2016 | Regular Contribution

Privacy-preserving authentication framework using bloom filter for secure vehicular communications

verfasst von: Avleen Malhi, Shalini Batra

Erschienen in: International Journal of Information Security | Ausgabe 4/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Vehicular ad hoc networks (VANETs) are the future of the intelligent transportation systems (ITS), which aim to improve traffic safety. The received message in VANETs can contain the malicious content that may affect the entire network; hence, these networks are more prone to such attacks. Thus, security is a major consideration before the deployment of such network. In this paper, a secure privacy-preserving authentication framework is proposed, which employs the use of pseudonyms for anonymous communication. A new digital signature scheme and aggregate verification scheme are designed for vehicular communications, and the ID-based signature scheme is used for vehicle-to-RSU communication. The multiple authorities are involved in revealing the identity of the vehicle in case of revocation. The signature verification scheme is improved by the use of bloom filters, and the results achieved by the proposed scheme have been implemented on a simulated environment.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Biswas, S., Misic, J.: A cross-layer approach to privacy-preserving authentication in WAVE-enabled VANETs. IEEE Trans. Veh. Technol. 62(5), 2182–2192 (2013)CrossRef Biswas, S., Misic, J.: A cross-layer approach to privacy-preserving authentication in WAVE-enabled VANETs. IEEE Trans. Veh. Technol. 62(5), 2182–2192 (2013)CrossRef
3.
Zurück zum Zitat Bloom, B.H.: Space/time tradeoffs in hash coding with allowable errors. Commun. ACM 13(7), 422–426 (1970)CrossRefMATH Bloom, B.H.: Space/time tradeoffs in hash coding with allowable errors. Commun. ACM 13(7), 422–426 (1970)CrossRefMATH
4.
Zurück zum Zitat Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Proceedings of CRYPTO, LNCS 2139, Springer-Verlag, pp. 213–229 (2001) Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Proceedings of CRYPTO, LNCS 2139, Springer-Verlag, pp. 213–229 (2001)
5.
Zurück zum Zitat Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Advances incryptology EUROCRYPT,Springer Berlin Heidelberg, pp. 416-432 (2003) Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Advances incryptology EUROCRYPT,Springer Berlin Heidelberg, pp. 416-432 (2003)
6.
Zurück zum Zitat Cheon, J.H., Yi, J.H.: Fast batch verification of multiple signatures. In: 10th International Conference on Practice and Theory in Public-Key Cryptography—PKC, Lecture Notes in Computer Science 4450, 442–457 (2007) Cheon, J.H., Yi, J.H.: Fast batch verification of multiple signatures. In: 10th International Conference on Practice and Theory in Public-Key Cryptography—PKC, Lecture Notes in Computer Science 4450, 442–457 (2007)
7.
Zurück zum Zitat Choi, M.J., Hong, J.W.K.: Towards management of next generation networks. IEICE Trans. Commun. E90–B(1), 3004–3014 (2007)CrossRef Choi, M.J., Hong, J.W.K.: Towards management of next generation networks. IEICE Trans. Commun. E90–B(1), 3004–3014 (2007)CrossRef
8.
Zurück zum Zitat Chuang, M.C., Lee, J.F.: TEAM: trust-extended authentication mechanism for vehicular ad hoc networks. IEEE Syst. J. 8(3), 749–758 (2014)CrossRef Chuang, M.C., Lee, J.F.: TEAM: trust-extended authentication mechanism for vehicular ad hoc networks. IEEE Syst. J. 8(3), 749–758 (2014)CrossRef
9.
Zurück zum Zitat Gamage, C., Gras, B., Crispo, B., Tanenbaum, A.S.: An identity-based ring signature scheme with enhanced privacy. In: Second International Conference on Security and Privacy in Communication Networks (SecureComm 06) (2006) Gamage, C., Gras, B., Crispo, B., Tanenbaum, A.S.: An identity-based ring signature scheme with enhanced privacy. In: Second International Conference on Security and Privacy in Communication Networks (SecureComm 06) (2006)
10.
Zurück zum Zitat Gamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Proceedings of CRYPTO 84 on Advances in Cryptology, pp. 10–18. Springer-Verlag New York, Inc., Santa Barbara, California, United States (1985) Gamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Proceedings of CRYPTO 84 on Advances in Cryptology, pp. 10–18. Springer-Verlag New York, Inc., Santa Barbara, California, United States (1985)
11.
Zurück zum Zitat Ganan, C., Munoz, J.L., Esparza, O., Mata-Diaz, J., Alins, J.: EPA: an efficient and privacy-aware revocation mechanism for vehicular ad-hoc networks. Pervasive Mob. Comput. 21, 75–91 (2015)CrossRef Ganan, C., Munoz, J.L., Esparza, O., Mata-Diaz, J., Alins, J.: EPA: an efficient and privacy-aware revocation mechanism for vehicular ad-hoc networks. Pervasive Mob. Comput. 21, 75–91 (2015)CrossRef
12.
Zurück zum Zitat Gan, C., Muoz, J.L., Esparza, O., Mata-Daz, J., Alins, J.: PPREM: privacy preserving REvocation mechanism for vehicular ad hoc networks. Comput. Stand. Interfaces 36(3), 513–523 (2014)CrossRef Gan, C., Muoz, J.L., Esparza, O., Mata-Daz, J., Alins, J.: PPREM: privacy preserving REvocation mechanism for vehicular ad hoc networks. Comput. Stand. Interfaces 36(3), 513–523 (2014)CrossRef
13.
Zurück zum Zitat Gavril, O.: Security in VANET, Graduation project, PolytehnicaUniversity of Bucharest(2009) Gavril, O.: Security in VANET, Graduation project, PolytehnicaUniversity of Bucharest(2009)
14.
Zurück zum Zitat Hartenstein, H., Laberteaux, K.P.: VANET: Vehicular Applications and Inter-Networking Technologies, vol. 1. Wiley, UK (2010)CrossRef Hartenstein, H., Laberteaux, K.P.: VANET: Vehicular Applications and Inter-Networking Technologies, vol. 1. Wiley, UK (2010)CrossRef
15.
Zurück zum Zitat IEEE 1609.2: IEEE Trial-Use Standard for Wireless Access in Vehicular Environments (WAVE). Security Services for Applications and Management Messages. IEEE Std. IEEE 1609.2, version 2006 (2006) IEEE 1609.2: IEEE Trial-Use Standard for Wireless Access in Vehicular Environments (WAVE). Security Services for Applications and Management Messages. IEEE Std. IEEE 1609.2, version 2006 (2006)
16.
Zurück zum Zitat Isern-Dey, A.P., Huguet-Rotger, L., Magdalena Payeras-Capell, M., Mut-Puigserver, M.: On the practicability of using group signatures on mobile devices: implementation and performance analysis on the android platform. Int. J. Inform. Secur. 14, 335345 (2015) Isern-Dey, A.P., Huguet-Rotger, L., Magdalena Payeras-Capell, M., Mut-Puigserver, M.: On the practicability of using group signatures on mobile devices: implementation and performance analysis on the android platform. Int. J. Inform. Secur. 14, 335345 (2015)
17.
Zurück zum Zitat Jiang, Y., Shi, M., Shen, X., Lin, C.: BAT: a robust signature scheme for vehicular networks using binary authentication tree. IEEE Trans. Wirel. Commun. 8(4), 1974–1983 (2009)CrossRef Jiang, Y., Shi, M., Shen, X., Lin, C.: BAT: a robust signature scheme for vehicular networks using binary authentication tree. IEEE Trans. Wirel. Commun. 8(4), 1974–1983 (2009)CrossRef
18.
Zurück zum Zitat Johnson, D., Menezes, A.: The Elliptic Curve Digital Signature Algorithm (ECDSA), Certicom Research, Canada; and Department of Combinatorics and Optimization, University of Waterloo, Canada,Technical Report, August (1999) Johnson, D., Menezes, A.: The Elliptic Curve Digital Signature Algorithm (ECDSA), Certicom Research, Canada; and Department of Combinatorics and Optimization, University of Waterloo, Canada,Technical Report, August (1999)
19.
Zurück zum Zitat Kim, S.S., Choi, M.J., Ju, H.T., Ejiri, M., Hong, J.W.K.: Towards management requirements of future internet. In: Challenges for Next Generation Network Operations and Service Management, Lecture Notes in Computer Science 5297, 156–166 (2008). doi:10.1007/978-3-540-88623-5_16 Kim, S.S., Choi, M.J., Ju, H.T., Ejiri, M., Hong, J.W.K.: Towards management requirements of future internet. In: Challenges for Next Generation Network Operations and Service Management, Lecture Notes in Computer Science 5297, 156–166 (2008). doi:10.​1007/​978-3-540-88623-5_​16
20.
Zurück zum Zitat Kim, S.H., Lee, I.Y.: A secure and efficient vehicle-to-vehicle communication scheme using bloom filter in VANETs. Int. J. Secur. Appl. 8(2), 9–24 (2014) Kim, S.H., Lee, I.Y.: A secure and efficient vehicle-to-vehicle communication scheme using bloom filter in VANETs. Int. J. Secur. Appl. 8(2), 9–24 (2014)
21.
Zurück zum Zitat Li, Z., Chigan, C.: On resource-aware message verification in VANETs. In: Proceedings of IEEE International Conference on Communications, Cape Town, South Africa, pp. 23–27. 1–6 May (2010) Li, Z., Chigan, C.: On resource-aware message verification in VANETs. In: Proceedings of IEEE International Conference on Communications, Cape Town, South Africa, pp. 23–27. 1–6 May (2010)
22.
Zurück zum Zitat Li, J., Lu, H., Guizani, M.: ACPN: a novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs. IEEE Trans. Parallel Distrib. Syst. 26(4), 938–948 (2015)CrossRef Li, J., Lu, H., Guizani, M.: ACPN: a novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs. IEEE Trans. Parallel Distrib. Syst. 26(4), 938–948 (2015)CrossRef
23.
Zurück zum Zitat Lin, X., Sun, X., Ho, P.H., Shen, X.: GSIS: a secure and privacy-preserving protocol for vehicular communications. IEEE Trans. Veh. Technol. 56(6), 3442–3456 (2007)CrossRef Lin, X., Sun, X., Ho, P.H., Shen, X.: GSIS: a secure and privacy-preserving protocol for vehicular communications. IEEE Trans. Veh. Technol. 56(6), 3442–3456 (2007)CrossRef
24.
Zurück zum Zitat Lu, H., Li, J., Guizani, M.: A novel ID-based authentication framework with adaptive privacy preservation for VANETs. In: IEEE Computing, Communications and Applications Conference, pp. 345–350 (2012) Lu, H., Li, J., Guizani, M.: A novel ID-based authentication framework with adaptive privacy preservation for VANETs. In: IEEE Computing, Communications and Applications Conference, pp. 345–350 (2012)
25.
Zurück zum Zitat Lu, R., Lin, X., Zhu, H., Ho, P.H., Shen, X.: ECPP: efficient conditional privacy preservation protocol for secure vehicular communications. In: IEEE 27th Conference on Computer Communications (INFOCOM 2008), 13–18, 1903–1911 April (2008) Lu, R., Lin, X., Zhu, H., Ho, P.H., Shen, X.: ECPP: efficient conditional privacy preservation protocol for secure vehicular communications. In: IEEE 27th Conference on Computer Communications (INFOCOM 2008), 13–18, 1903–1911 April (2008)
26.
Zurück zum Zitat Merkle, R.: A certified digital signature. In: Advances in Cryptology, CRYPTO89, Lecture Notes in Computer Science 435, Springer-Verlag, 234246 (1989) Merkle, R.: A certified digital signature. In: Advances in Cryptology, CRYPTO89, Lecture Notes in Computer Science 435, Springer-Verlag, 234246 (1989)
27.
Zurück zum Zitat Pal, S.K., Sardana, P., Yadav, K.: Efficient multilingual keyword search using bloom filter for cloud computing applications. In: Fourth International Conference on Advanced Computing, pp. 13–15 (2012) Pal, S.K., Sardana, P., Yadav, K.: Efficient multilingual keyword search using bloom filter for cloud computing applications. In: Fourth International Conference on Advanced Computing, pp. 13–15 (2012)
28.
Zurück zum Zitat Papadimitriou, A., Fessant, F.L., Viana, A.C., Sengul, C.: Cryptographic protocols to fight sinkhole attacks on tree-based routing in wireless sensor networks. In: 5th IEEE Workshop on Secure Network Protocols, pp. 43–48 (2009). doi:10.1109/NPSEC.2009.5342246 Papadimitriou, A., Fessant, F.L., Viana, A.C., Sengul, C.: Cryptographic protocols to fight sinkhole attacks on tree-based routing in wireless sensor networks. In: 5th IEEE Workshop on Secure Network Protocols, pp. 43–48 (2009). doi:10.​1109/​NPSEC.​2009.​5342246
29.
Zurück zum Zitat Raya, M., Papadimitratos, P., Hubaux, J.P.: Securing vehicular communications. In: IEEE Wireless Communications Magazine, Special Issue on Inter-Vehicular Communications 13, no. LCA-ARTICLE-2006-015, 8–15 (2006) Raya, M., Papadimitratos, P., Hubaux, J.P.: Securing vehicular communications. In: IEEE Wireless Communications Magazine, Special Issue on Inter-Vehicular Communications 13, no. LCA-ARTICLE-2006-015, 8–15 (2006)
30.
Zurück zum Zitat Raya, M., Hubaux, J.P.: Securing vehicular ad hoc networks. J. Comput. Secur. 15(1), 39–68 (2007)CrossRef Raya, M., Hubaux, J.P.: Securing vehicular ad hoc networks. J. Comput. Secur. 15(1), 39–68 (2007)CrossRef
31.
Zurück zum Zitat Shamir, A.: Identity-based cryptosystems and signature schemes. In: Proceedings of CRYPTO ’84, LNCS 196, Springer-Verlag, pp.47–53 (1984) Shamir, A.: Identity-based cryptosystems and signature schemes. In: Proceedings of CRYPTO ’84, LNCS 196, Springer-Verlag, pp.47–53 (1984)
33.
Zurück zum Zitat Shuhaimi, N., Juhana, T.: Security in vehicular ad-hoc network with identity based cryptography approach: a survey. In: 7th International Conference on Telecommunication Systems, Services, and Applications, 276–279 (2012) Shuhaimi, N., Juhana, T.: Security in vehicular ad-hoc network with identity based cryptography approach: a survey. In: 7th International Conference on Telecommunication Systems, Services, and Applications, 276–279 (2012)
34.
Zurück zum Zitat Studer, A., Shi, E., Bai, F., Perrig, A.: Tacking together efficient authentication, revocation, and privacy in VANETs. In: 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 1–9 (2009) Studer, A., Shi, E., Bai, F., Perrig, A.: Tacking together efficient authentication, revocation, and privacy in VANETs. In: 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 1–9 (2009)
35.
Zurück zum Zitat Sun, Y., Lu, R., Lin, X., Shen, X.S., Su, J.: An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. IEEE Trans. Veh. Technol. 59(7), 3589–3603 (2010)CrossRef Sun, Y., Lu, R., Lin, X., Shen, X.S., Su, J.: An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. IEEE Trans. Veh. Technol. 59(7), 3589–3603 (2010)CrossRef
36.
Zurück zum Zitat Tsai, J.L.: An improved cross-layer privacy-preserving authentication in WAVE-enabled VANETs. IEEE Commun. Lett. 18(11), 1931–1934 (2014)CrossRef Tsai, J.L.: An improved cross-layer privacy-preserving authentication in WAVE-enabled VANETs. IEEE Commun. Lett. 18(11), 1931–1934 (2014)CrossRef
37.
Zurück zum Zitat Wagan, A.A., Jung, L.T.: Security framework for low latency vanet applications. In: IEEE International Conference on Computer and Information Sciences (ICCOINS), pp. 1–6, Kuala Lumpur, Malaysia, 3–5 June (2014) Wagan, A.A., Jung, L.T.: Security framework for low latency vanet applications. In: IEEE International Conference on Computer and Information Sciences (ICCOINS), pp. 1–6, Kuala Lumpur, Malaysia, 3–5 June (2014)
38.
Zurück zum Zitat Wang, M., Liu, D., Zhu, L., Xu, Y., Wang, F.: LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication. Computing, 1–24 (2014). doi:10.1007/s00607-014-0393-x Wang, M., Liu, D., Zhu, L., Xu, Y., Wang, F.: LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication. Computing, 1–24 (2014). doi:10.​1007/​s00607-014-0393-x
39.
Zurück zum Zitat Wasef, A., Jiang, Y., Shen, X.: DCS: an efficient distributed-certificate-service scheme for vehicular networks. IEEE Trans. Veh. Technol. 59(2), 533–549 (2010)CrossRef Wasef, A., Jiang, Y., Shen, X.: DCS: an efficient distributed-certificate-service scheme for vehicular networks. IEEE Trans. Veh. Technol. 59(2), 533–549 (2010)CrossRef
40.
Zurück zum Zitat Xue, X., Ding, J.: LPA: a new location based privacy preserving authentication protocol in VANET. Secur. Commun. Netw. 5(1), 69–78 (2012)CrossRef Xue, X., Ding, J.: LPA: a new location based privacy preserving authentication protocol in VANET. Secur. Commun. Netw. 5(1), 69–78 (2012)CrossRef
41.
Zurück zum Zitat Yeh, C.H., Hsieh, M.Y., Li, K.C.: A certificate enhanced group key framework for vehicular Ad Hoc networks. In: Ubiquitous Information Technologies and Applications, Springer Netherlands, pp. 215–222 (2013) Yeh, C.H., Hsieh, M.Y., Li, K.C.: A certificate enhanced group key framework for vehicular Ad Hoc networks. In: Ubiquitous Information Technologies and Applications, Springer Netherlands, pp. 215–222 (2013)
42.
Zurück zum Zitat Younes, M.B., Boukerche, A.: SCOOL: a secure traffic congestion control protocol for VANETs. In: Wireless Communications and Networking Conference (WCNC), 2015 IEEE, pp. 1960–1965 (2015) Younes, M.B., Boukerche, A.: SCOOL: a secure traffic congestion control protocol for VANETs. In: Wireless Communications and Networking Conference (WCNC), 2015 IEEE, pp. 1960–1965 (2015)
43.
Zurück zum Zitat Zhang, C., Lu, R., Lin, X., Ho, P.H., Shen, X.: An efficient identity-based batch verification scheme for vehicular sensor networks. In: IEEE 27th Conference on Computer Communications (INFOCOM 2008), Phoenix, AZ, USA, pp. 246–250. April (2008) Zhang, C., Lu, R., Lin, X., Ho, P.H., Shen, X.: An efficient identity-based batch verification scheme for vehicular sensor networks. In: IEEE 27th Conference on Computer Communications (INFOCOM 2008), Phoenix, AZ, USA, pp. 246–250. April (2008)
44.
Zurück zum Zitat Zhu, X., Lu, Y., Zhu, X., Qiu, S.: Lightweight and scalable secure communication in VANET. Int. J. Electron. 102(5), 765–780 (2015)CrossRef Zhu, X., Lu, Y., Zhu, X., Qiu, S.: Lightweight and scalable secure communication in VANET. Int. J. Electron. 102(5), 765–780 (2015)CrossRef
Metadaten
Titel
Privacy-preserving authentication framework using bloom filter for secure vehicular communications
verfasst von
Avleen Malhi
Shalini Batra
Publikationsdatum
01.08.2016
Verlag
Springer Berlin Heidelberg
Erschienen in
International Journal of Information Security / Ausgabe 4/2016
Print ISSN: 1615-5262
Elektronische ISSN: 1615-5270
DOI
https://doi.org/10.1007/s10207-015-0299-4

Weitere Artikel der Ausgabe 4/2016

International Journal of Information Security 4/2016 Zur Ausgabe

Premium Partner