Skip to main content
Erschienen in: Wireless Personal Communications 1/2020

01.05.2020

Ring Signature-Based Conditional Privacy-Preserving Authentication in VANETs

verfasst von: Pravin Mundhe, Vijay Kumar Yadav, Abhishek Singh, Shekhar Verma, S. Venkatesan

Erschienen in: Wireless Personal Communications | Ausgabe 1/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Vehicular ad hoc networks (VANETs) consist of vehicles with high mobility that broadcasts delay-intolerant safety and informative messages frequently. The real identity of a vehicle needs to be kept private as these vehicles operate in an open and insecure network. A receiving vehicle must also authenticate the received messages before accepting or rejecting it. Additionally, the original identity of an authenticated vehicle must be discovered if it tries to obstruct the normal functioning of the network by transmitting the wrong messages. In this paper, a lightweight ring signature-based conditional privacy-preserving authentication (RCPPA) scheme is proposed to address the security issues in VANETs. In the proposed scheme, a vehicle gets a pseudonym from root trusted authority (RTA). If a vehicle performs a malicious action, then only RTA can reveal the original identity of the vehicle. A vehicle produces a ring signature to sign a message. Vehicles within the communication range verify this signature to ensure that the message is sent from an authenticated vehicle. Ring signature provides unconditional privacy to vehicles, but a pseudonym that is sent in the message is used by the RTA to reveal the real identity. The biggest advantage of this scheme is that it allows only authenticated vehicles to generate a ring signature and not any intruder without requiring any cooperation from any other vehicle. The results of the simulation show that the RCPPA scheme using a ring signature and pseudonym provides not only vehicle and message authentication but also non-repudiation through conditional privacy-preservation.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Sakiz, F., & Sen, S. (2017). A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV. Ad Hoc Networks, 61, 33–50. Sakiz, F., & Sen, S. (2017). A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV. Ad Hoc Networks, 61, 33–50.
2.
Zurück zum Zitat Xu, Q., Mak, T., Ko, J., & Sengupta, R. (2004). Vehicle-to-vehicle safety messaging in dsrc. In Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks (pp. 19–28). ACM. Xu, Q., Mak, T., Ko, J., & Sengupta, R. (2004). Vehicle-to-vehicle safety messaging in dsrc. In Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks (pp. 19–28). ACM.
3.
Zurück zum Zitat Aloqaily, M., Kantarci, B., & Mouftah, H. T. (2016). Multiagent/multiobjective interaction game system for service provisioning in vehicular cloud. IEEE Access, 4, 3153–3168. Aloqaily, M., Kantarci, B., & Mouftah, H. T. (2016). Multiagent/multiobjective interaction game system for service provisioning in vehicular cloud. IEEE Access, 4, 3153–3168.
4.
Zurück zum Zitat Talat, H., Nomani, T., Mohsin, M., & Sattar, S. (2019). A survey on location privacy techniques deployed in vehicular networks. In 2019 16th International Bhurban conference on applied sciences and technology (IBCAST) (pp. 604–613). IEEE Talat, H., Nomani, T., Mohsin, M., & Sattar, S. (2019). A survey on location privacy techniques deployed in vehicular networks. In 2019 16th International Bhurban conference on applied sciences and technology (IBCAST) (pp. 604–613). IEEE
5.
Zurück zum Zitat Aloqaily, M., Otoum, S., Al Ridhawi, I., & Jararweh, Y. (2019). An intrusion detection system for connected vehicles in smart cities. Ad Hoc Networks, 90, 101842. Aloqaily, M., Otoum, S., Al Ridhawi, I., & Jararweh, Y. (2019). An intrusion detection system for connected vehicles in smart cities. Ad Hoc Networks, 90, 101842.
6.
Zurück zum Zitat Otoum, S., Kantarci, B., & Mouftah, H. T. (2017). Detection of known and unknown intrusive sensor behavior in critical applications. IEEE Sensors Letters, 1(5), 1–4. Otoum, S., Kantarci, B., & Mouftah, H. T. (2017). Detection of known and unknown intrusive sensor behavior in critical applications. IEEE Sensors Letters, 1(5), 1–4.
7.
Zurück zum Zitat Kiltz, E., & Pietrzak, K. (2010). Leakage resilient elgamal encryption. In International conference on the theory and application of cryptology and information security (pp. 595–612). New York: Springer. Kiltz, E., & Pietrzak, K. (2010). Leakage resilient elgamal encryption. In International conference on the theory and application of cryptology and information security (pp. 595–612). New York: Springer.
8.
Zurück zum Zitat Jain, R., & Kashyap, I. (2019). An qos aware link defined olsr (ld-olsr) routing protocol for manets. Wireless Personal Communications, 108(3), 1745–58. Jain, R., & Kashyap, I. (2019). An qos aware link defined olsr (ld-olsr) routing protocol for manets. Wireless Personal Communications, 108(3), 1745–58.
9.
Zurück zum Zitat Xie, Y., Wu, L., Zhang, Y., & Shen, J. (2016). Efficient and secure authentication scheme with conditional privacy-preserving for vanets. Chinese Journal of Electronics, 25(5), 950–956. Xie, Y., Wu, L., Zhang, Y., & Shen, J. (2016). Efficient and secure authentication scheme with conditional privacy-preserving for vanets. Chinese Journal of Electronics, 25(5), 950–956.
10.
Zurück zum Zitat Rajput, U., Abbas, F., Eun, H., & Oh, H. (2017). A hybrid approach for efficient privacy-preserving authentication in vanet. IEEE Access, 5, 12014–12030. Rajput, U., Abbas, F., Eun, H., & Oh, H. (2017). A hybrid approach for efficient privacy-preserving authentication in vanet. IEEE Access, 5, 12014–12030.
11.
Zurück zum Zitat Al Ridhawi, I., Aloqaily, M., Kotb, Y., Jararweh, Y., & Baker, T. (2019). A profitable and energy-efficient cooperative fog solution for iot services. IEEE Transactions on Industrial Informatics, 16(5), 3578–86. Al Ridhawi, I., Aloqaily, M., Kotb, Y., Jararweh, Y., & Baker, T. (2019). A profitable and energy-efficient cooperative fog solution for iot services. IEEE Transactions on Industrial Informatics, 16(5), 3578–86.
12.
Zurück zum Zitat Otoum, S., Kantarci, B., & Mouftah, H. T. (2019). On the feasibility of deep learning in sensor network intrusion detection. IEEE Networking Letters, 1(2), 68–71. Otoum, S., Kantarci, B., & Mouftah, H. T. (2019). On the feasibility of deep learning in sensor network intrusion detection. IEEE Networking Letters, 1(2), 68–71.
13.
Zurück zum Zitat Lai, Y., Xu, Y., Yang, F., Lu, W., & Yu, Q. (2019). Privacy-aware query processing in vehicular ad-hoc networks. Ad Hoc Networks, 91, 101876. Lai, Y., Xu, Y., Yang, F., Lu, W., & Yu, Q. (2019). Privacy-aware query processing in vehicular ad-hoc networks. Ad Hoc Networks, 91, 101876.
14.
Zurück zum Zitat Raya, M., & Hubaux, J.-P. (2007). Securing vehicular ad hoc networks. Journal of Computer Security, 15(1), 39–68. Raya, M., & Hubaux, J.-P. (2007). Securing vehicular ad hoc networks. Journal of Computer Security, 15(1), 39–68.
16.
Zurück zum Zitat Azees, M., Vijayakumar, P., & Deboarh, L. J. (2017). EAAP: Efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems, 18(9), 2467–2476. Azees, M., Vijayakumar, P., & Deboarh, L. J. (2017). EAAP: Efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems, 18(9), 2467–2476.
17.
Zurück zum Zitat Michael, E. N., & Henry, L. O. (2010). Scalable certificate revocation list distribution in vehicular ad hoc networks. In 2010 IEEE Globecom Workshops (pp. 54–58). IEEE. Michael, E. N., & Henry, L. O. (2010). Scalable certificate revocation list distribution in vehicular ad hoc networks. In 2010 IEEE Globecom Workshops (pp. 54–58). IEEE.
18.
Zurück zum Zitat Cui, J., Zhang, J., Zhong, H., & Xu, Y. (2017). Spacf: A secure privacy-preserving authentication scheme for vanet with cuckoo filter. IEEE Transactions on Vehicular Technology, 66(11), 10283–10295. Cui, J., Zhang, J., Zhong, H., & Xu, Y. (2017). Spacf: A secure privacy-preserving authentication scheme for vanet with cuckoo filter. IEEE Transactions on Vehicular Technology, 66(11), 10283–10295.
19.
Zurück zum Zitat Zhang, L., Wu, Q., Domingo-Ferrer, J., Qin, B., & Hu, C. (2017). Distributed aggregate privacy-preserving authentication in vanets. IEEE, 18(3), 516–526. Zhang, L., Wu, Q., Domingo-Ferrer, J., Qin, B., & Hu, C. (2017). Distributed aggregate privacy-preserving authentication in vanets. IEEE, 18(3), 516–526.
20.
Zurück zum Zitat Lim, K., Tuladhar, K. M., Wang, X., & Liu, W. (2017). A scalable and secure key distribution scheme for group signature based authentication in vanet. In 2017 IEEE 8th annual ubiquitous computing, electronics and mobile communication conference (UEMCON) (pp. 478–483). IEEE, 2017. Lim, K., Tuladhar, K. M., Wang, X., & Liu, W. (2017). A scalable and secure key distribution scheme for group signature based authentication in vanet. In 2017 IEEE 8th annual ubiquitous computing, electronics and mobile communication conference (UEMCON) (pp. 478–483). IEEE, 2017.
21.
Zurück zum Zitat Sugumar, R., Rengarajan, A., & Jayakumar, C. (2018). Trust based authentication technique for cluster based vehicular ad hoc networks (vanet). Wireless Networks, 24(2), 373–382. Sugumar, R., Rengarajan, A., & Jayakumar, C. (2018). Trust based authentication technique for cluster based vehicular ad hoc networks (vanet). Wireless Networks, 24(2), 373–382.
22.
Zurück zum Zitat Aljallad, S., Al-Qassas, R. S., & Qasaimeh, M. (2017). A group leader location hiding technique for vanets. International Journal of Distributed Systems and Technologies (IJDST), 8(3), 67–80. Aljallad, S., Al-Qassas, R. S., & Qasaimeh, M. (2017). A group leader location hiding technique for vanets. International Journal of Distributed Systems and Technologies (IJDST), 8(3), 67–80.
23.
Zurück zum Zitat Zhong, H., Han, S., Cui, J., Zhang, J., & Xu, Y. (2019). Privacy-preserving authentication scheme with full aggregation in vanet. Information Sciences, 476, 211–221. Zhong, H., Han, S., Cui, J., Zhang, J., & Xu, Y. (2019). Privacy-preserving authentication scheme with full aggregation in vanet. Information Sciences, 476, 211–221.
24.
Zurück zum Zitat Ali, I., & Li, F. (2020). An efficient conditional privacy-preserving authentication scheme for vehicle-to-infrastructure communication in vanets. Vehicular Communications, 22, 100228. Ali, I., & Li, F. (2020). An efficient conditional privacy-preserving authentication scheme for vehicle-to-infrastructure communication in vanets. Vehicular Communications, 22, 100228.
25.
Zurück zum Zitat Vijayakumar, P., Chang, V., Deborah, L. J., Balusamy, B., & Shynu, P. (2018). Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks. Future Generation Computer Systems, 78, 943–955. Vijayakumar, P., Chang, V., Deborah, L. J., Balusamy, B., & Shynu, P. (2018). Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks. Future Generation Computer Systems, 78, 943–955.
27.
Zurück zum Zitat Cui, Y., Cao, L., Zhang, X., & Zeng, G. (2017). Ring signature based on lattice and vanet privacy preservation. Chinese Journal of Computation, 40(169), 1–14. Cui, Y., Cao, L., Zhang, X., & Zeng, G. (2017). Ring signature based on lattice and vanet privacy preservation. Chinese Journal of Computation, 40(169), 1–14.
28.
Zurück zum Zitat Liu, J., Yu, Y., Jia, J., Wang, S., Fan, P., Wang, H., et al. (2019). Lattice-based double-authentication-preventing ring signature for security and privacy in vehicular ad-hoc networks. Tsinghua Science and Technology, 24(5), 575–584. Liu, J., Yu, Y., Jia, J., Wang, S., Fan, P., Wang, H., et al. (2019). Lattice-based double-authentication-preventing ring signature for security and privacy in vehicular ad-hoc networks. Tsinghua Science and Technology, 24(5), 575–584.
29.
Zurück zum Zitat Helfrich, B. (1985). Algorithms to construct minkowski reduced and hermite reduced lattice bases. Theoretical Computer Science, 41, 125–139.MathSciNetMATH Helfrich, B. (1985). Algorithms to construct minkowski reduced and hermite reduced lattice bases. Theoretical Computer Science, 41, 125–139.MathSciNetMATH
30.
Zurück zum Zitat Ajtai, M. (1996). Generating hard instances of lattice problems. In Proceedings of the twenty-eighth annual ACM symposium on theory of computing, (pp. 99–108). ACM. Ajtai, M. (1996). Generating hard instances of lattice problems. In Proceedings of the twenty-eighth annual ACM symposium on theory of computing, (pp. 99–108). ACM.
31.
Zurück zum Zitat Peikert, C., & Rosen, A. (2006). Efficient collision-resistant hashing from worst-case assumptions on cyclic lattices. In Theory of Cryptography Conference, (pp. 145–166). Springer Peikert, C., & Rosen, A. (2006). Efficient collision-resistant hashing from worst-case assumptions on cyclic lattices. In Theory of Cryptography Conference, (pp. 145–166). Springer
32.
Zurück zum Zitat Regev, O. (2009). On lattices, learning with errors, random linear codes, and cryptography. Journal of the ACM (JACM), 56(6), 34.MathSciNetMATH Regev, O. (2009). On lattices, learning with errors, random linear codes, and cryptography. Journal of the ACM (JACM), 56(6), 34.MathSciNetMATH
33.
Zurück zum Zitat Lyubashevsky, V., Peikert, C., & Regev, O. (2010). On ideal lattices and learning with errors over rings. In Annual international conference on the theory and applications of cryptographic techniques, (pp. 1–23). Springer. Lyubashevsky, V., Peikert, C., & Regev, O. (2010). On ideal lattices and learning with errors over rings. In Annual international conference on the theory and applications of cryptographic techniques, (pp. 1–23). Springer.
34.
Zurück zum Zitat Alkim, E., Ducas, L., Pöppelmann, T., & Schwabe, P. (2016). Post-quantum key exchange—a new hope. In 25th\(\{USENIX\}\)Security Symposium (\(\{USENIX\}\)Security 16) (pp. 327–343). Alkim, E., Ducas, L., Pöppelmann, T., & Schwabe, P. (2016). Post-quantum key exchange—a new hope. In 25th\(\{USENIX\}\)Security Symposium (\(\{USENIX\}\)Security 16) (pp. 327–343).
35.
Zurück zum Zitat Wang, Y., Zhong, H., Xu, Y., & Cui, J. (2016). Ecpb: Efficient conditional privacy-preserving authentication scheme supporting batch verification for vanets. IJ Network Security, 18(2), 374–382. Wang, Y., Zhong, H., Xu, Y., & Cui, J. (2016). Ecpb: Efficient conditional privacy-preserving authentication scheme supporting batch verification for vanets. IJ Network Security, 18(2), 374–382.
Metadaten
Titel
Ring Signature-Based Conditional Privacy-Preserving Authentication in VANETs
verfasst von
Pravin Mundhe
Vijay Kumar Yadav
Abhishek Singh
Shekhar Verma
S. Venkatesan
Publikationsdatum
01.05.2020
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2020
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-020-07396-x

Weitere Artikel der Ausgabe 1/2020

Wireless Personal Communications 1/2020 Zur Ausgabe

Neuer Inhalt