Skip to main content
Erschienen in: Computing 7/2016

01.07.2016

LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication

verfasst von: Mingzhong Wang, Dan Liu, Liehuang Zhu, Yongjun Xu, Fei Wang

Erschienen in: Computing | Ausgabe 7/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Authentication in vehicular ad-hoc network (VANET) is still a research challenge, as it requires not only secure and efficient authentication, but also privacy preservation. In this paper, we proposed a lightweight and efficient authentication scheme (LESPP) with strong privacy preservation for secure VANET communication. The proposed scheme utilizes self-generated pseudo identity to guarantee both privacy preservation and conditional traceability, and it only requires a lightweight symmetric encryption and message authentication code (MAC) generation for message signing and a fast MAC re-generation for verification. Compared with currently existing public key based schemes, the proposed scheme significantly reduces computation cost by \(10^2\)\(10^3\) times and decreases communication overhead by 41.33–77.60 %, thus achieving resilience to denial of service (DoS) attack. In LESPP, only key management center can expose a vehicle’s real identity from its pseudo identity, therefore, LESPP provides strong privacy preservation so that the adversaries cannot trace any vehicles, even if all roadside units are compromised. Furthermore, vehicles in LESPP need not maintain certificate revocation list (CRL), so any CRL related overhead is avoided. Extensive simulations reveal that the novel scheme is feasible and has an outstanding performance of nearly 0 ms network delay and 0 % packet loss ratio, which are especially appropriate for realtime emergency event reporting applications.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
3.
Zurück zum Zitat Wang F, Zeng D, Yang L (2006) Smart cars on smart roads: an IEEE intelligent transportation systems society update. IEEE Pervasive Comput 5(4):68–69MathSciNetCrossRef Wang F, Zeng D, Yang L (2006) Smart cars on smart roads: an IEEE intelligent transportation systems society update. IEEE Pervasive Comput 5(4):68–69MathSciNetCrossRef
6.
Zurück zum Zitat Raya M, Hubaux J (2005) The security of vehicular ad Hoc networks. In: Proceedings of the 3rd ACM workshop on security of ad hoc and sensor networks, pp 11–21 Raya M, Hubaux J (2005) The security of vehicular ad Hoc networks. In: Proceedings of the 3rd ACM workshop on security of ad hoc and sensor networks, pp 11–21
7.
Zurück zum Zitat Raya M, Papadimitratos P, Hubaux JP (2006) Securing vehicular communications. IEEE Wirel Commun 13(1):8–15CrossRef Raya M, Papadimitratos P, Hubaux JP (2006) Securing vehicular communications. IEEE Wirel Commun 13(1):8–15CrossRef
8.
Zurück zum Zitat Sun Y, Lu R, Lin X, Shen XS (2010) An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. IEEE Trans Veh Technol 59(1):3589–3603CrossRef Sun Y, Lu R, Lin X, Shen XS (2010) An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. IEEE Trans Veh Technol 59(1):3589–3603CrossRef
9.
Zurück zum Zitat Mao W (2003) Modern cryptography: theory and practice. Prentice-Hall, Englewood Cliffs Mao W (2003) Modern cryptography: theory and practice. Prentice-Hall, Englewood Cliffs
10.
Zurück zum Zitat Libert B, Vergnaud D (2008) Multi-use unidirectional proxy re-signatures. In: Proceedings of ACM CCS, Alexandria, pp 511–520 Libert B, Vergnaud D (2008) Multi-use unidirectional proxy re-signatures. In: Proceedings of ACM CCS, Alexandria, pp 511–520
11.
Zurück zum Zitat Lu R, Lin X, Zhu H, Ho P, Shen XS (2008) ECPP: efficient conditional privacy preservation protocol for secure vehicular communications. In: Proceedings of 2008 INFOCOM, pp 1229–1237 Lu R, Lin X, Zhu H, Ho P, Shen XS (2008) ECPP: efficient conditional privacy preservation protocol for secure vehicular communications. In: Proceedings of 2008 INFOCOM, pp 1229–1237
12.
Zurück zum Zitat Zhang C, Lu R, Lin X, Ho P, Shen XS (2008) An efficient identity-based batch verification scheme for vehicular sensor networks. In: Proceedings of 2008 INFOCOM, pp 246–250 Zhang C, Lu R, Lin X, Ho P, Shen XS (2008) An efficient identity-based batch verification scheme for vehicular sensor networks. In: Proceedings of 2008 INFOCOM, pp 246–250
13.
Zurück zum Zitat Fiat A (1990) Batch RSA. In: Proceedings of CRYPTO’89, pp 175–185 Fiat A (1990) Batch RSA. In: Proceedings of CRYPTO’89, pp 175–185
14.
Zurück zum Zitat Camenisch J, Hohenberger S, Pedersen M (2007) Batch verification of short signatures. In: Proceedings of EUROCRYPT’07, pp 246–263 Camenisch J, Hohenberger S, Pedersen M (2007) Batch verification of short signatures. In: Proceedings of EUROCRYPT’07, pp 246–263
15.
Zurück zum Zitat Lin X, Sun X, Ho P, Shen XS (2007) GSIS: a secure and privacy preserving protocol for vehicular communications. IEEE Trans Veh Technol 56(1):3442–3456 Lin X, Sun X, Ho P, Shen XS (2007) GSIS: a secure and privacy preserving protocol for vehicular communications. IEEE Trans Veh Technol 56(1):3442–3456
16.
Zurück zum Zitat Cham D, Heyst EV (1991) Group signatures. In: Proceedings of 1991 advances in cryptology- EUROCRYPT, pp 257–265 Cham D, Heyst EV (1991) Group signatures. In: Proceedings of 1991 advances in cryptology- EUROCRYPT, pp 257–265
17.
Zurück zum Zitat Boneh D, Boyen X, Shacham H (2004) Short group signatures. In: Proceedings of 2004 CRYPTO, pp 227–242 Boneh D, Boyen X, Shacham H (2004) Short group signatures. In: Proceedings of 2004 CRYPTO, pp 227–242
18.
Zurück zum Zitat Shamir A (1984) Identity-based cryptosystems and signature schemes. In: Proceedings of 1984 advances in CryptologyCrypto. Springer, New York, pp 47–53 Shamir A (1984) Identity-based cryptosystems and signature schemes. In: Proceedings of 1984 advances in CryptologyCrypto. Springer, New York, pp 47–53
19.
Zurück zum Zitat Wang F, Xu YJ, Wu L, Dan Liu, Zhu LH (2013) Authenticating and tracing biological anonym of VANET based on KMC decentralization and two-factor. In: Proceedings of the 11th annual international conference on mobile systems, applications, and services (MobiSys ’13). ACM, New York, pp 519–520 Wang F, Xu YJ, Wu L, Dan Liu, Zhu LH (2013) Authenticating and tracing biological anonym of VANET based on KMC decentralization and two-factor. In: Proceedings of the 11th annual international conference on mobile systems, applications, and services (MobiSys ’13). ACM, New York, pp 519–520
20.
Zurück zum Zitat Zhang L, Wu Q, Solanas A, Domingo FJ (2010) A scalable robust authentication protocol for secure vehicular communications. IEEE Trans Veh Technol 59(1):1606–1617CrossRef Zhang L, Wu Q, Solanas A, Domingo FJ (2010) A scalable robust authentication protocol for secure vehicular communications. IEEE Trans Veh Technol 59(1):1606–1617CrossRef
21.
Zurück zum Zitat Sampigethaya K, Li M, Huang L, Poovendran R (2007) AMOEBA: robust location privacy scheme for VANET. IEEE J Sel Areas Commun 25(1):1569–1589CrossRef Sampigethaya K, Li M, Huang L, Poovendran R (2007) AMOEBA: robust location privacy scheme for VANET. IEEE J Sel Areas Commun 25(1):1569–1589CrossRef
22.
Zurück zum Zitat Calandriello G, Papadimitratos P, Hubaux J, Lioy A (2007) Efficient and robust pseudonymous authentication in VANET. In: Proceedings of 2007 the fourth ACM international workshop on Vehicular, ad hoc networks, pp 19–28 Calandriello G, Papadimitratos P, Hubaux J, Lioy A (2007) Efficient and robust pseudonymous authentication in VANET. In: Proceedings of 2007 the fourth ACM international workshop on Vehicular, ad hoc networks, pp 19–28
23.
Zurück zum Zitat Studer A, Bai F, Bellur B, Perrig A (2008) Flexible, extensible, and efficient VANET authentication. J Commun Netw 11(6):574–588CrossRef Studer A, Bai F, Bellur B, Perrig A (2008) Flexible, extensible, and efficient VANET authentication. J Commun Netw 11(6):574–588CrossRef
24.
Zurück zum Zitat Perrig A, Canetti R, Tygar JD, Song D (2002) The TESLA broadcast authentication protocol. In: Proceedings of RSA CryptoBytes’02 Perrig A, Canetti R, Tygar JD, Song D (2002) The TESLA broadcast authentication protocol. In: Proceedings of RSA CryptoBytes’02
25.
Zurück zum Zitat Lin X, Sun X, Wang X, Zhang C, Ho P, Shen XS (2008) TSVC—timed efficient and secure vehicular communications with privacy preserving. IEEE Trans Wirel Commun 7(1):4987–4998CrossRef Lin X, Sun X, Wang X, Zhang C, Ho P, Shen XS (2008) TSVC—timed efficient and secure vehicular communications with privacy preserving. IEEE Trans Wirel Commun 7(1):4987–4998CrossRef
26.
Zurück zum Zitat Ren K, Lou W, Deng RH, Kim K (2006) A novel privacy preserving authentication and access control scheme in pervasive computing environments. IEEE Trans Veh Technol 55(4):1373–1384CrossRef Ren K, Lou W, Deng RH, Kim K (2006) A novel privacy preserving authentication and access control scheme in pervasive computing environments. IEEE Trans Veh Technol 55(4):1373–1384CrossRef
27.
Zurück zum Zitat Sampigethava K, Huang L, Li M, Poovendran R, Matsuura K, Sezaki K (2006) CARAVAN: providing location privacy for VANET. In: Proceedings of International workshop on vehicular ad hoc networks Sampigethava K, Huang L, Li M, Poovendran R, Matsuura K, Sezaki K (2006) CARAVAN: providing location privacy for VANET. In: Proceedings of International workshop on vehicular ad hoc networks
28.
Zurück zum Zitat Daemen J, Rijmen V (1998) AES Proposal: Rijndael. In: Proceedings of the first advanced encryption standard candidate conference, National Institute of Standards and Technology (NIST) Daemen J, Rijmen V (1998) AES Proposal: Rijndael. In: Proceedings of the first advanced encryption standard candidate conference, National Institute of Standards and Technology (NIST)
29.
Zurück zum Zitat Bellare M, Canetti R, Krawczyk H (1996) Message authentication using hash functions the HMAC construction. RSA Lab CryptoBytes 2(1):12–15MATH Bellare M, Canetti R, Krawczyk H (1996) Message authentication using hash functions the HMAC construction. RSA Lab CryptoBytes 2(1):12–15MATH
30.
Zurück zum Zitat Hess F (2003) Efficient identity based signature schemes based on pairings. Sel Areas Cryptogr 2595:310–324 Hess F (2003) Efficient identity based signature schemes based on pairings. Sel Areas Cryptogr 2595:310–324
31.
Zurück zum Zitat Boneh D, Lynn B, Shacham H (2001) Short signatures from the Weil pairing. In: Proceedings of 2001 ASIACRYPT, pp 514–532 Boneh D, Lynn B, Shacham H (2001) Short signatures from the Weil pairing. In: Proceedings of 2001 ASIACRYPT, pp 514–532
32.
Zurück zum Zitat Katz J, Lindell Y (2007) Introduction to modern cryptography: principles and protocols. Chapman & Hall/CRC, Boca Raton, FloridaMATH Katz J, Lindell Y (2007) Introduction to modern cryptography: principles and protocols. Chapman & Hall/CRC, Boca Raton, FloridaMATH
34.
Zurück zum Zitat Zhang C, Lin X, Lu R, Ho P, Shen XS (2008) An efficient message authentication scheme for vehicular communications. IEEE Trans Veh Technol 57(1):3357–3368CrossRef Zhang C, Lin X, Lu R, Ho P, Shen XS (2008) An efficient message authentication scheme for vehicular communications. IEEE Trans Veh Technol 57(1):3357–3368CrossRef
35.
Zurück zum Zitat Keranen A, Ott J, Karkkainen T (2009) The ONE simulator for DTN protocol evaluation. In: Proceedings of the 2nd international conference on simulation tools and techniques Keranen A, Ott J, Karkkainen T (2009) The ONE simulator for DTN protocol evaluation. In: Proceedings of the 2nd international conference on simulation tools and techniques
36.
Zurück zum Zitat Papadimitratos P, Levente B, Schoch E, Freudiger J, Raya M, Ma Z (2008) Secure vehicular communication systems: design and architecture. Commun Mag IEEE 46(1):100–109CrossRef Papadimitratos P, Levente B, Schoch E, Freudiger J, Raya M, Ma Z (2008) Secure vehicular communication systems: design and architecture. Commun Mag IEEE 46(1):100–109CrossRef
37.
Zurück zum Zitat Hsiao H, Studer A, Chen C, Perrig A, Bai F, Bellur B (2011) Flooding-resilient broadcast authentication for VANETs. In: Proceedings of the 17th annual international conference on mobile computing and networking, pp 193–204 Hsiao H, Studer A, Chen C, Perrig A, Bai F, Bellur B (2011) Flooding-resilient broadcast authentication for VANETs. In: Proceedings of the 17th annual international conference on mobile computing and networking, pp 193–204
38.
Zurück zum Zitat Zhang X, Liu C, Nepal S, Pandey S, Chen J (2013) A privacy leakage upper-bound constraint based approach for cost-effective privacy preserving of intermediate datasets in cloud. IEEE Trans Parallel Distrib Syst 24(6):1192–1202CrossRef Zhang X, Liu C, Nepal S, Pandey S, Chen J (2013) A privacy leakage upper-bound constraint based approach for cost-effective privacy preserving of intermediate datasets in cloud. IEEE Trans Parallel Distrib Syst 24(6):1192–1202CrossRef
39.
Zurück zum Zitat Zhang X, Yang LT, Liu C, Chen J (2014) A scalable two-phase top-down specialization approach for data anonymization using MapReduce on cloud. IEEE Trans Parallel Distrib Syst 25(2):363–373CrossRef Zhang X, Yang LT, Liu C, Chen J (2014) A scalable two-phase top-down specialization approach for data anonymization using MapReduce on cloud. IEEE Trans Parallel Distrib Syst 25(2):363–373CrossRef
40.
Zurück zum Zitat Zhang X, Liu C, Nepal S, Chen J (2013) An efficient quasi-identifier index based approach for privacy preservation over incremental data sets on cloud. J Comput Syst Sci 79(5):542–555MathSciNetCrossRefMATH Zhang X, Liu C, Nepal S, Chen J (2013) An efficient quasi-identifier index based approach for privacy preservation over incremental data sets on cloud. J Comput Syst Sci 79(5):542–555MathSciNetCrossRefMATH
Metadaten
Titel
LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication
verfasst von
Mingzhong Wang
Dan Liu
Liehuang Zhu
Yongjun Xu
Fei Wang
Publikationsdatum
01.07.2016
Verlag
Springer Vienna
Erschienen in
Computing / Ausgabe 7/2016
Print ISSN: 0010-485X
Elektronische ISSN: 1436-5057
DOI
https://doi.org/10.1007/s00607-014-0393-x