Skip to main content
Erschienen in: Wireless Networks 5/2015

01.07.2015

A secure authentication scheme for VANETs with batch verification

verfasst von: Majid Bayat, Mostafa Barmshoory, Majid Rahimi, Mohammd Reza Aref

Erschienen in: Wireless Networks | Ausgabe 5/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Vehicular Ad-hoc Networks (VANETs) will start becoming deployed within the next decade. Among other benefits, it is expected that VANETs will support applications and services targeting the increase of safety on the road, and assist in improving the efficiency of the road transportation network. However, several serious challenges remain to be solved before efficient and secure VANET technology becomes available, one of them been efficient authentication of messages in a VANET. In this paper, we analyse a recent authentication scheme for VANETs introduced by Lee et al. Unfortunately this scheme is vulnerable to the impersonation attack so that a malicious user can generate a valid signature on behalf of the other vehicles. Based on the attack, we propose an improved scheme and introduce a simulation expressing the efficiency of the proposed scheme.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat (2005) Vehicle safety communications project: Task 3 final report: Identify intelligent vehicle safety applications enabled by dsrc, camp vehicle safety communications consortium and others. (2005) Vehicle safety communications project: Task 3 final report: Identify intelligent vehicle safety applications enabled by dsrc, camp vehicle safety communications consortium and others.
2.
Zurück zum Zitat (2008) Car talk-[update]. IEEE Spectrum, 45, 10. (2008) Car talk-[update]. IEEE Spectrum, 45, 10.
4.
Zurück zum Zitat (2010) Gnu m, the gnu multiple precision arithmetic library, 5.0. (2010) Gnu m, the gnu multiple precision arithmetic library, 5.0.
6.
Zurück zum Zitat Boneh. D., & Franklin, M. (2001). Identity-based encryption from the weil pairing. In: Advances in cryptology CRYPTO 2001 (pp. 213–229). New York: Springer. Boneh. D., & Franklin, M. (2001). Identity-based encryption from the weil pairing. In: Advances in cryptology CRYPTO 2001 (pp. 213–229). New York: Springer.
7.
Zurück zum Zitat Boyen, X., & Waters, B. (2006). Compact group signatures without random oracles. In: Advances in cryptology-EUROCRYPT 2006 (pp. 427–444). New York: Springer. Boyen, X., & Waters, B. (2006). Compact group signatures without random oracles. In: Advances in cryptology-EUROCRYPT 2006 (pp. 427–444). New York: Springer.
8.
Zurück zum Zitat de Fuentes, J. M., González-Manzano, L., González-Tablas, A. I., & Blasco, J. (2014). Security models in vehicular ad-hoc networks: A survey. IETE Technical Review, 31(1), 47–64.CrossRef de Fuentes, J. M., González-Manzano, L., González-Tablas, A. I., & Blasco, J. (2014). Security models in vehicular ad-hoc networks: A survey. IETE Technical Review, 31(1), 47–64.CrossRef
9.
Zurück zum Zitat Freudiger, J., Raya, M., Félegyházi, M., & Papadimitratos, P., et al. (2007). Mix-zones for location privacy in vehicular networks. In: Proceedings of the first international workshop on wireless networking for intelligent transportation systems (Win-ITS). Freudiger, J., Raya, M., Félegyházi, M., & Papadimitratos, P., et al. (2007). Mix-zones for location privacy in vehicular networks. In: Proceedings of the first international workshop on wireless networking for intelligent transportation systems (Win-ITS).
10.
Zurück zum Zitat Guo, J., Baugh, J. P., & Wang, S. (2007). A group signature based secure and privacy-preserving vehicular communication framework. Mobile Networking for Vehicular Environments, 2007, 103–108.CrossRef Guo, J., Baugh, J. P., & Wang, S. (2007). A group signature based secure and privacy-preserving vehicular communication framework. Mobile Networking for Vehicular Environments, 2007, 103–108.CrossRef
11.
Zurück zum Zitat Hankerson, D., Vanstone, S., & Menezes, A. J. (2004). Guide to elliptic curve cryptography. New York: Springer.MATH Hankerson, D., Vanstone, S., & Menezes, A. J. (2004). Guide to elliptic curve cryptography. New York: Springer.MATH
12.
Zurück zum Zitat He, D., Chen, C., Chan, S., & Bu, J. (2012). Analysis and improvement of a secure and efficient handover authentication for wireless networks. IEEE Communications Letters, 16(8), 1270–1273.CrossRef He, D., Chen, C., Chan, S., & Bu, J. (2012). Analysis and improvement of a secure and efficient handover authentication for wireless networks. IEEE Communications Letters, 16(8), 1270–1273.CrossRef
13.
Zurück zum Zitat He, D., Chen, C., Chan, S., & Bu, J. (2012). Secure and efficient handover authentication based on bilinear pairing functions. IEEE Transactions on Wireless Communications, 11(1), 48–53.CrossRef He, D., Chen, C., Chan, S., & Bu, J. (2012). Secure and efficient handover authentication based on bilinear pairing functions. IEEE Transactions on Wireless Communications, 11(1), 48–53.CrossRef
14.
Zurück zum Zitat Horng, S., Tzeng, S., Pan, Y., Fan, P., Wang, X., Li, T., et al. (2013). b-specs+: Batch verification for secure pseudonymous authentication in vanet. Horng, S., Tzeng, S., Pan, Y., Fan, P., Wang, X., Li, T., et al. (2013). b-specs+: Batch verification for secure pseudonymous authentication in vanet.
15.
Zurück zum Zitat Krajzewicz, D., Hertkorn, G., Rössel, C., & Wagner, P. (2002). Sumo (simulation of urban mobility). In: Proceedings of the 4th middle east symposium on simulation and modelling, pp. 183–187. Krajzewicz, D., Hertkorn, G., Rössel, C., & Wagner, P. (2002). Sumo (simulation of urban mobility). In: Proceedings of the 4th middle east symposium on simulation and modelling, pp. 183–187.
16.
Zurück zum Zitat Lee, C. C., & Lai, Y. M. (2013). Toward a secure batch verification with group testing for vanet. Wireless Networks, 19(6), 1441–1449.MathSciNetCrossRef Lee, C. C., & Lai, Y. M. (2013). Toward a secure batch verification with group testing for vanet. Wireless Networks, 19(6), 1441–1449.MathSciNetCrossRef
17.
Zurück zum Zitat Lin, X., Sun, X., Ho, P. H., & Shen, X. (2007). Gsis: A secure and privacy-preserving protocol for vehicular communications. IEEE Transactions on Vehicular Technology, 56(6), 3442–3456.CrossRef Lin, X., Sun, X., Ho, P. H., & Shen, X. (2007). Gsis: A secure and privacy-preserving protocol for vehicular communications. IEEE Transactions on Vehicular Technology, 56(6), 3442–3456.CrossRef
18.
Zurück zum Zitat Lin, X., Lu, R., Zhang, C., Zhu, H., Ho, P. H., & Shen, X. (2008). Security in vehicular ad hoc networks. IEEE Communications Magazine, 46(4), 88–95.CrossRef Lin, X., Lu, R., Zhang, C., Zhu, H., Ho, P. H., & Shen, X. (2008). Security in vehicular ad hoc networks. IEEE Communications Magazine, 46(4), 88–95.CrossRef
19.
Zurück zum Zitat Lu, R., Lin, X., Zhu, H., Ho, PH., & Shen, X. (2008). Ecpp: Efficient conditional privacy preservation protocol for secure vehicular communications. In: INFOCOM 2008. The 27th IEEE conference on computer communications. IEEE. Lu, R., Lin, X., Zhu, H., Ho, PH., & Shen, X. (2008). Ecpp: Efficient conditional privacy preservation protocol for secure vehicular communications. In: INFOCOM 2008. The 27th IEEE conference on computer communications. IEEE.
20.
Zurück zum Zitat Lu, R., Lin, X., Liang, X., & Shen, X. (2012). A dynamic privacy-preserving key management scheme for location-based services in vanets. IEEE Transactions on Intelligent Transportation Systems, 13(1), 127–139.CrossRef Lu, R., Lin, X., Liang, X., & Shen, X. (2012). A dynamic privacy-preserving key management scheme for location-based services in vanets. IEEE Transactions on Intelligent Transportation Systems, 13(1), 127–139.CrossRef
21.
Zurück zum Zitat Miyaji, A., Nakabayashi, M., & Takano, S. (2001). New explicit conditions of elliptic curve traces for fr-reduction. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 84(5), 1234–1243. Miyaji, A., Nakabayashi, M., & Takano, S. (2001). New explicit conditions of elliptic curve traces for fr-reduction. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 84(5), 1234–1243.
22.
Zurück zum Zitat Raya, M., & Hubaux, J. P. (2007). Securing vehicular ad hoc networks. Journal of Computer Security, 15(1), 39–68. Raya, M., & Hubaux, J. P. (2007). Securing vehicular ad hoc networks. Journal of Computer Security, 15(1), 39–68.
24.
Zurück zum Zitat Sun, X. (2007). Anonymous, secure and efficient vehicular communications. Sun, X. (2007). Anonymous, secure and efficient vehicular communications.
25.
Zurück zum Zitat Sun, X., Lin, X., & Ho, PH. (2007). Secure vehicular communications based on group signature and id-based signature scheme. In: ICC’07. IEEE international conference on communications, 2007. IEEE, pp. 1539–1545. Sun, X., Lin, X., & Ho, PH. (2007). Secure vehicular communications based on group signature and id-based signature scheme. In: ICC’07. IEEE international conference on communications, 2007. IEEE, pp. 1539–1545.
26.
Zurück zum Zitat Wasef, A., Jiang, Y., & Shen, X. (2010). Dcs: An efficient distributed-certificate-service scheme for vehicular networks. IEEE Transactions on Vehicular Technology, 59(2), 533–549.CrossRef Wasef, A., Jiang, Y., & Shen, X. (2010). Dcs: An efficient distributed-certificate-service scheme for vehicular networks. IEEE Transactions on Vehicular Technology, 59(2), 533–549.CrossRef
27.
Zurück zum Zitat Xiong, H., Beznosov, K., Qin, Z., & Ripeanu, M. (2010). Efficient and spontaneous privacy-preserving protocol for secure vehicular communication. In: 2010 IEEE international conference on communications (ICC). IEEE, pp. 1–6. Xiong, H., Beznosov, K., Qin, Z., & Ripeanu, M. (2010). Efficient and spontaneous privacy-preserving protocol for secure vehicular communication. In: 2010 IEEE international conference on communications (ICC). IEEE, pp. 1–6.
28.
Zurück zum Zitat Xiong, H., Chen, Z., & Li, F. (2012). Efficient and multi-level privacy-preserving communication protocol for vanet. Computers & Electrical Engineering, 38(3), 573–581.MathSciNetCrossRef Xiong, H., Chen, Z., & Li, F. (2012). Efficient and multi-level privacy-preserving communication protocol for vanet. Computers & Electrical Engineering, 38(3), 573–581.MathSciNetCrossRef
29.
Zurück zum Zitat Zhang, C., Lin, X., Lu, R., & Ho, PH. (2008). Raise: An efficient rsu-aided message authentication scheme in vehicular communication networks. In: ICC’08. IEEE international conference on communications, 2008. IEEE, pp. 1451–1457. Zhang, C., Lin, X., Lu, R., & Ho, PH. (2008). Raise: An efficient rsu-aided message authentication scheme in vehicular communication networks. In: ICC’08. IEEE international conference on communications, 2008. IEEE, pp. 1451–1457.
30.
Zurück zum Zitat Zhang, C., Ho, P. H., & Tapolcai, J. (2011). On batch verification with group testing for vehicular communications. Wireless Networks, 17(8), 1851–1865.CrossRef Zhang, C., Ho, P. H., & Tapolcai, J. (2011). On batch verification with group testing for vehicular communications. Wireless Networks, 17(8), 1851–1865.CrossRef
Metadaten
Titel
A secure authentication scheme for VANETs with batch verification
verfasst von
Majid Bayat
Mostafa Barmshoory
Majid Rahimi
Mohammd Reza Aref
Publikationsdatum
01.07.2015
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 5/2015
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-014-0881-0

Weitere Artikel der Ausgabe 5/2015

Wireless Networks 5/2015 Zur Ausgabe

Neuer Inhalt