Skip to main content
Erschienen in: Telecommunication Systems 2/2017

13.09.2016

EIAS-CP: new efficient identity-based authentication scheme with conditional privacy-preserving for VANETs

verfasst von: Yong Xie, LiBing Wu, Jian Shen, Abdulhameed Alelaiwi

Erschienen in: Telecommunication Systems | Ausgabe 2/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In VANETs, vehicles broadcast traffic-related messages periodically according to Dedicated Short Range Communication protocol. To ensure the reliability and integrity of messages, authentication schemes are involved in VANETs. As traffic-related messages are time-sensitive, they must be verified and processed timely, or it may cause inestimable harm to the traffic system. However, the OBUs and the RSUs are limited in computation ability and cannot afford vast messages’ verification. Recently, some identity-based authentication schemes using bilinear pairing have been proposed to improve the efficiency of message verification for VANETs. Nevertheless, the bilinear pairing is not suited for VANETs due to its complex operations. The design of an efficient and secure authentication scheme with low computation cost for VANETs still is a rewarding challenge. To settle this challenge, a new efficient identity-based authentication scheme is proposed in this paper. The proposed scheme ensures reliability and integrity of messages and provides conditional privacy-preserving. Compared with the most recent proposed authentication schemes for VANETs, the computation costs of the message signing and verification in the proposed scheme reduce by 88 and 93 % respectively, while security analysis demonstrates that our proposed scheme satisfies all security and privacy requirements for VANETs.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Kakkasageri, M. S., & Manvi, S. S. (2014). Information management in vehicular ad hoc networks: A review. Journal of Network and Computer Applications, 39, 334–350.CrossRef Kakkasageri, M. S., & Manvi, S. S. (2014). Information management in vehicular ad hoc networks: A review. Journal of Network and Computer Applications, 39, 334–350.CrossRef
2.
Zurück zum Zitat Bitam, S., Mellouk, A., & Zeadally, S. (2015). VANET-cloud: a generic cloud computing model for vehicular Ad Hoc networks. IEEE Wireless Communications, 22(1), 96–102.CrossRef Bitam, S., Mellouk, A., & Zeadally, S. (2015). VANET-cloud: a generic cloud computing model for vehicular Ad Hoc networks. IEEE Wireless Communications, 22(1), 96–102.CrossRef
3.
Zurück zum Zitat Bayat, M., Barmshoory, M., Rahimi, M., & Aref, M. R. (2015). A secure authentication scheme for VANETs with batch verification. Wireless Networks, 21(5), 1733–1743.CrossRef Bayat, M., Barmshoory, M., Rahimi, M., & Aref, M. R. (2015). A secure authentication scheme for VANETs with batch verification. Wireless Networks, 21(5), 1733–1743.CrossRef
4.
Zurück zum Zitat Li, J., Lu, H., & Guizani, M. (2015). ACPN: a novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs. IEEE Transactions on Parallel and Distributed Systems, 26(4), 938–948.CrossRef Li, J., Lu, H., & Guizani, M. (2015). ACPN: a novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs. IEEE Transactions on Parallel and Distributed Systems, 26(4), 938–948.CrossRef
5.
Zurück zum Zitat Zhang, C., Ho, P. H., & Tapolcai, J. (2011). On batch verification with group testing for vehicular communications. Wireless Networks, 17(8), 1851–1865.CrossRef Zhang, C., Ho, P. H., & Tapolcai, J. (2011). On batch verification with group testing for vehicular communications. Wireless Networks, 17(8), 1851–1865.CrossRef
6.
Zurück zum Zitat Zhu, H., Lin, X., Lu, R., Ho, P. H., & Shen, X. (2008). AEMA: An aggregated emergency message authentication scheme for enhancing the security of vehicular ad hoc networks. In 2008 IEEE International Conference on Communications (pp. 1436–1440). Zhu, H., Lin, X., Lu, R., Ho, P. H., & Shen, X. (2008). AEMA: An aggregated emergency message authentication scheme for enhancing the security of vehicular ad hoc networks. In 2008 IEEE International Conference on Communications (pp. 1436–1440).
7.
Zurück zum Zitat Tsai, J. L., & Lo, N. W. (2015). A privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Systems Journal, 9(3), 805–815.CrossRef Tsai, J. L., & Lo, N. W. (2015). A privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Systems Journal, 9(3), 805–815.CrossRef
8.
Zurück zum Zitat Jiang, Q., Khan, M. K., Lu, X., Ma, J., & He, D. (2016). A privacy preserving three-factor authentication protocol for e-Health clouds. The Journal of Supercomputing, 1-24. Jiang, Q., Khan, M. K., Lu, X., Ma, J., & He, D. (2016). A privacy preserving three-factor authentication protocol for e-Health clouds. The Journal of Supercomputing, 1-24.
9.
Zurück zum Zitat Raya, M., & Hubaux, J. P. (2007). Securing vehicular ad hoc networks. Journal of Computer Security, 15(1), 39–68.CrossRef Raya, M., & Hubaux, J. P. (2007). Securing vehicular ad hoc networks. Journal of Computer Security, 15(1), 39–68.CrossRef
10.
Zurück zum Zitat Freudiger, J., Raya, M., Félegyházi, M., & Papadimitratos, P. (2007). Mix-zones for location privacy in vehicular networks. Freudiger, J., Raya, M., Félegyházi, M., & Papadimitratos, P. (2007). Mix-zones for location privacy in vehicular networks.
11.
Zurück zum Zitat Lu, R., Lin, X., Zhu, H., Ho, P. H., & Shen, X. (2008). ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications. In The 27th conference on computer communications (INFOCOM 2008). Lu, R., Lin, X., Zhu, H., Ho, P. H., & Shen, X. (2008). ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications. In The 27th conference on computer communications (INFOCOM 2008).
12.
Zurück zum Zitat Zhang, C., Lin, X., Lu, R., & Ho, P. H. (2008, May). RAISE: an efficient RSU-aided message authentication scheme in vehicular communication networks. In 2008 IEEE international conference on communications (pp. 1451–1457). Zhang, C., Lin, X., Lu, R., & Ho, P. H. (2008, May). RAISE: an efficient RSU-aided message authentication scheme in vehicular communication networks. In 2008 IEEE international conference on communications (pp. 1451–1457).
13.
Zurück zum Zitat Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In Proceedings of CRYPTO’ (Vol. 84). Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In Proceedings of CRYPTO’ (Vol. 84).
14.
Zurück zum Zitat Zhang, C., Lu, R., Lin, X., Ho, P. H., & Shen, X. (2008). An efficient identity-based batch verification scheme for vehicular sensor networks. In The 27th conference on computer communications (INFOCOM 2008). Zhang, C., Lu, R., Lin, X., Ho, P. H., & Shen, X. (2008). An efficient identity-based batch verification scheme for vehicular sensor networks. In The 27th conference on computer communications (INFOCOM 2008).
15.
Zurück zum Zitat Shim, K. A. (2012). An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Transactions on Vehicular Technology, 61(4), 1874–1883.CrossRef Shim, K. A. (2012). An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Transactions on Vehicular Technology, 61(4), 1874–1883.CrossRef
16.
Zurück zum Zitat Lee, C. C., & Lai, Y. M. (2013). Toward a secure batch verification with group testing for VANET. Wireless Networks, 19(6), 1441–1449.CrossRef Lee, C. C., & Lai, Y. M. (2013). Toward a secure batch verification with group testing for VANET. Wireless Networks, 19(6), 1441–1449.CrossRef
17.
Zurück zum Zitat Chim, T. W., Yiu, S. M., Hui, L. C., & Li, V. O. (2011). SPECS: Secure and privacy enhancing communications schemes for VANETs. Ad Hoc Networks, 9(2), 189–203.CrossRef Chim, T. W., Yiu, S. M., Hui, L. C., & Li, V. O. (2011). SPECS: Secure and privacy enhancing communications schemes for VANETs. Ad Hoc Networks, 9(2), 189–203.CrossRef
18.
Zurück zum Zitat Horng, S. J., Tzeng, S. F., Pan, Y., Fan, P., Wang, X., Li, T., et al. (2013). b-SPECS+: Batch verification for secure pseudonymous authentication in VANET. IEEE Transactions on Information Forensics and Security, 8(11), 1860–1875.CrossRef Horng, S. J., Tzeng, S. F., Pan, Y., Fan, P., Wang, X., Li, T., et al. (2013). b-SPECS+: Batch verification for secure pseudonymous authentication in VANET. IEEE Transactions on Information Forensics and Security, 8(11), 1860–1875.CrossRef
19.
Zurück zum Zitat Huang, J. L., Yeh, L. Y., & Chien, H. Y. (2011). ABAKA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology, 60(1), 248–262.CrossRef Huang, J. L., Yeh, L. Y., & Chien, H. Y. (2011). ABAKA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology, 60(1), 248–262.CrossRef
20.
Zurück zum Zitat Liu, J. K., Yuen, T. H., Au, M. H., & Susilo, W. (2014). Improvements on an authentication scheme for vehicular sensor networks. Expert Systems with Applications, 41(5), 2559–2564.CrossRef Liu, J. K., Yuen, T. H., Au, M. H., & Susilo, W. (2014). Improvements on an authentication scheme for vehicular sensor networks. Expert Systems with Applications, 41(5), 2559–2564.CrossRef
21.
Zurück zum Zitat Jianhong, Z., Min, X., & Liying, L. (2014). On the security of a secure batch verification with group testing for VANET. International Journal of Network Security, 16(5), 351–358. Jianhong, Z., Min, X., & Liying, L. (2014). On the security of a secure batch verification with group testing for VANET. International Journal of Network Security, 16(5), 351–358.
22.
Zurück zum Zitat Freeman, D., Scott, M., & Teske, E. (2010). A taxonomy of pairing-friendly elliptic curves. Journal of Cryptology, 23(2), 224–280.CrossRef Freeman, D., Scott, M., & Teske, E. (2010). A taxonomy of pairing-friendly elliptic curves. Journal of Cryptology, 23(2), 224–280.CrossRef
23.
Zurück zum Zitat Miller, V. S. (1985). Use of elliptic curves in cryptography. In Proceedings of CRYPTO’85 (pp. 417-426). Miller, V. S. (1985). Use of elliptic curves in cryptography. In Proceedings of CRYPTO’85 (pp. 417-426).
24.
Zurück zum Zitat Koblitz, N. (1987). Elliptic curve cryptosystems. Mathematics of computation, 48(177), 203–209.CrossRef Koblitz, N. (1987). Elliptic curve cryptosystems. Mathematics of computation, 48(177), 203–209.CrossRef
25.
Zurück zum Zitat Hankerson, D., Menezes, A. J., & Vanstone, S. (2006). Guide to elliptic curve cryptography. New York: Springer. Hankerson, D., Menezes, A. J., & Vanstone, S. (2006). Guide to elliptic curve cryptography. New York: Springer.
26.
Zurück zum Zitat Chen, J., Mamun, M. S. I., & Miyaji, A. (2015). An efficient batch verification system and its effect in a real time VANET environment. Security and Communication Networks, 8(2), 298–310. Chen, J., Mamun, M. S. I., & Miyaji, A. (2015). An efficient batch verification system and its effect in a real time VANET environment. Security and Communication Networks, 8(2), 298–310.
27.
Zurück zum Zitat Pointcheval, D., & Stern, J. (1996). Security proofs for signature schemes. In Proceedings of EUROCRYPT’96 (pp. 387–398). Pointcheval, D., & Stern, J. (1996). Security proofs for signature schemes. In Proceedings of EUROCRYPT’96 (pp. 387–398).
29.
Zurück zum Zitat Jiang, Q., Wei, F., Fu, S., Ma, J., Li, G., & Alelaiwi, A. (2016). Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy. Nonlinear Dynamics, 83(4), 2085–2101.CrossRef Jiang, Q., Wei, F., Fu, S., Ma, J., Li, G., & Alelaiwi, A. (2016). Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy. Nonlinear Dynamics, 83(4), 2085–2101.CrossRef
30.
Zurück zum Zitat He, D., Kumar, N., Wang, H., Wang, L., Choo K., Vinel A., A provably-secure cross-domainhandshake scheme with symptoms-matching for mobile healthcare social network. IEEE Transactions on Dependable and Secure Computing. doi:10.1109/TDSC.2016.2596286. He, D., Kumar, N., Wang, H., Wang, L., Choo K., Vinel A., A provably-secure cross-domainhandshake scheme with symptoms-matching for mobile healthcare social network. IEEE Transactions on Dependable and Secure Computing. doi:10.​1109/​TDSC.​2016.​2596286.
31.
Zurück zum Zitat Alizadeh, M., Zamani, M., Baharun, S., Manaf, A. A., Sakurai, K., Anada, H., et al. (2015). Cryptanalysis and improvement of a secure password authentication mechanism for seamless handover in proxy mobile IPv6 networks. PloS One, 10(11), e0142716.CrossRef Alizadeh, M., Zamani, M., Baharun, S., Manaf, A. A., Sakurai, K., Anada, H., et al. (2015). Cryptanalysis and improvement of a secure password authentication mechanism for seamless handover in proxy mobile IPv6 networks. PloS One, 10(11), e0142716.CrossRef
32.
Zurück zum Zitat He, D., Kumar, N., Shen, H., & Lee, J. H. (2015). One-to-many authentication for access control in mobile pay-TV systems. Science China Information Sciences, 1–14. doi:10.1007/s11432-015-5469-5. He, D., Kumar, N., Shen, H., & Lee, J. H. (2015). One-to-many authentication for access control in mobile pay-TV systems. Science China Information Sciences, 1–14. doi:10.​1007/​s11432-015-5469-5.
33.
Zurück zum Zitat Jiang, Q., Ma, J., Lu, X., & Tian, Y. (2015). An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Networking and Applications, 8(6), 1070–1081.CrossRef Jiang, Q., Ma, J., Lu, X., & Tian, Y. (2015). An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Networking and Applications, 8(6), 1070–1081.CrossRef
34.
Metadaten
Titel
EIAS-CP: new efficient identity-based authentication scheme with conditional privacy-preserving for VANETs
verfasst von
Yong Xie
LiBing Wu
Jian Shen
Abdulhameed Alelaiwi
Publikationsdatum
13.09.2016
Verlag
Springer US
Erschienen in
Telecommunication Systems / Ausgabe 2/2017
Print ISSN: 1018-4864
Elektronische ISSN: 1572-9451
DOI
https://doi.org/10.1007/s11235-016-0222-y

Weitere Artikel der Ausgabe 2/2017

Telecommunication Systems 2/2017 Zur Ausgabe

Neuer Inhalt