Skip to main content
Erschienen in: Journal of Computer Virology and Hacking Techniques 3/2016

01.08.2016 | Short Contribution

A secure analysis of vehicular authentication security scheme of RSUs in VANET

verfasst von: Yongchan Kim, Jongkun Lee

Erschienen in: Journal of Computer Virology and Hacking Techniques | Ausgabe 3/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The Vehicular Ad-Hoc Network (VANET) is a network to provide communication between nearby V2V (Vehicular to vehicular) and V2I(Vehicular to Infrastructure). In order to increase the network efficiency, it is required to have stability of transmission and security of reliability. In this paper, we propose a novel Vehicular Authentication Security Scheme (VASS) guaranteeing secure RSUs (Roadside Units) to OBUs(On-Board Units) in VANET on the basis of the ID-based authentication scheme using hi-pass card (or highway pass ticket) and license plate number. We show a usefulness and effectiveness of VASS after analyzed by the Petri nets.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Zhang, C., Lin, X., Lu, R., Ho, P.H., Shen, X.: An efficient message authentication scheme for vehicular communications. IEEE Trans. Veh. Technol. 57(6), 3357–3368 (2008)CrossRef Zhang, C., Lin, X., Lu, R., Ho, P.H., Shen, X.: An efficient message authentication scheme for vehicular communications. IEEE Trans. Veh. Technol. 57(6), 3357–3368 (2008)CrossRef
2.
Zurück zum Zitat Biswas, S., Tatchikou, R., Dion, F.: Vehicle-to-vehicle wireless communication protocols for enhancing highway traffic safety. Proc. IEEE Commun. Mag. 44(1), 74–82 (2006)CrossRef Biswas, S., Tatchikou, R., Dion, F.: Vehicle-to-vehicle wireless communication protocols for enhancing highway traffic safety. Proc. IEEE Commun. Mag. 44(1), 74–82 (2006)CrossRef
3.
Zurück zum Zitat Sun, X., Lin, X., Ho, P.-H.: Secure Vehicular Communications Based on Group Signature and ID-based Signature Scheme. In: Proceedings of International Conference on Communications ICC 2007, pp. 1539–1545 (2007) Sun, X., Lin, X., Ho, P.-H.: Secure Vehicular Communications Based on Group Signature and ID-based Signature Scheme. In: Proceedings of International Conference on Communications ICC 2007, pp. 1539–1545 (2007)
4.
Zurück zum Zitat Li, C.-T., Hwang, M.-S., Chu, Y.-P.: A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Comput. Commun. 31, 2803–2814 (2008)CrossRef Li, C.-T., Hwang, M.-S., Chu, Y.-P.: A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Comput. Commun. 31, 2803–2814 (2008)CrossRef
5.
Zurück zum Zitat Eiza, M-H., Ni, Q.: A reachability-Based Routing Scheme for Vehicular Ad Hoc Networks, In: Proceedings of the 11th IEEE ICTSPCC, pp. 1578–1584 (2012) Eiza, M-H., Ni, Q.: A reachability-Based Routing Scheme for Vehicular Ad Hoc Networks, In: Proceedings of the 11th IEEE ICTSPCC, pp. 1578–1584 (2012)
6.
Zurück zum Zitat Biswas, S., Misic, J.: Proxy Signature-based RSU Message Broadcasting in VANET. In: Proceedings of the 25th Biennial Symposium On Communication, pp. 5–9 (2010) Biswas, S., Misic, J.: Proxy Signature-based RSU Message Broadcasting in VANET. In: Proceedings of the 25th Biennial Symposium On Communication, pp. 5–9 (2010)
7.
Zurück zum Zitat Hesham, A., A-Hanid, A., El-Nasr, M.A.: A Dynamic Key Distribution Protocol for PKI-based VANETs. In: Proceedings of the Wireless day, IFIP, pp. 1–3 (2011) Hesham, A., A-Hanid, A., El-Nasr, M.A.: A Dynamic Key Distribution Protocol for PKI-based VANETs. In: Proceedings of the Wireless day, IFIP, pp. 1–3 (2011)
8.
Zurück zum Zitat Chuang, M-C., Lee, J-F: PPAS: A Privacy Preservation Authentication Scheme for Vehicle-to-Infrastructure Communication Networks. In: Proceedings CECNet, pp. 1509–1512 (2011) Chuang, M-C., Lee, J-F: PPAS: A Privacy Preservation Authentication Scheme for Vehicle-to-Infrastructure Communication Networks. In: Proceedings CECNet, pp. 1509–1512 (2011)
9.
Zurück zum Zitat Raya, M., Hubaux, J.P.: Securing vehicular ad hoc networks. J. Comput. Secur. 15(1), 39–68 (2007)CrossRef Raya, M., Hubaux, J.P.: Securing vehicular ad hoc networks. J. Comput. Secur. 15(1), 39–68 (2007)CrossRef
10.
Zurück zum Zitat Lu, R., Lin, X., Zhu, H., Ho, P-H., Shen, X.: ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications. In: IEEE INFOCOM, pp. 1229–1237 (2008) Lu, R., Lin, X., Zhu, H., Ho, P-H., Shen, X.: ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications. In: IEEE INFOCOM, pp. 1229–1237 (2008)
11.
Zurück zum Zitat Zhang, C., Lin, X., Lu, R., Hp, P-H: RAISE: An Efficient RSU-Aided Message Authentication Scheme in Vehicular Communication Networks. In: IEEE ICC, pp. 1451–1457 (2008) Zhang, C., Lin, X., Lu, R., Hp, P-H: RAISE: An Efficient RSU-Aided Message Authentication Scheme in Vehicular Communication Networks. In: IEEE ICC, pp. 1451–1457 (2008)
12.
Zurück zum Zitat Peterson, J.L.: Petri Net Theory and the Modeling of Systems. Prentice-Hall, Englewood Cliffs (1981)MATH Peterson, J.L.: Petri Net Theory and the Modeling of Systems. Prentice-Hall, Englewood Cliffs (1981)MATH
13.
Zurück zum Zitat Shamir, A.: Identity Based Cryptosystems and Signature Schemes. In: CRYPTO 1984, pp. 47–53 (1984) Shamir, A.: Identity Based Cryptosystems and Signature Schemes. In: CRYPTO 1984, pp. 47–53 (1984)
14.
Zurück zum Zitat Biswas, S., Misic, J., Misic, V.: ID-Based Safety Message Authentication for Security and Trust in Vehicular Networks. In: 31th ICDCS 2011, pp. 323–331 (2011) Biswas, S., Misic, J., Misic, V.: ID-Based Safety Message Authentication for Security and Trust in Vehicular Networks. In: 31th ICDCS 2011, pp. 323–331 (2011)
15.
Zurück zum Zitat Murata, T.: Petri nets: properties, analysis and applications. Proc. IEEE 77, 541–580 (1989)CrossRef Murata, T.: Petri nets: properties, analysis and applications. Proc. IEEE 77, 541–580 (1989)CrossRef
16.
Zurück zum Zitat Gniewek, L., Kluska, J.: Hardware implementation of fuzzy Petri net as a controller. J. IEEE Trans. Syst. Man. Cybern. Part B Cybern. 34(3), 1315–1324 (2004)CrossRef Gniewek, L., Kluska, J.: Hardware implementation of fuzzy Petri net as a controller. J. IEEE Trans. Syst. Man. Cybern. Part B Cybern. 34(3), 1315–1324 (2004)CrossRef
17.
Zurück zum Zitat Ashritha, M., Sridhar, C.S.: RSU Based Efficient Vehicle Authentication Mechanism for VANETs. In: IEEE ISCO 2015, pp. 1–5 (2015) Ashritha, M., Sridhar, C.S.: RSU Based Efficient Vehicle Authentication Mechanism for VANETs. In: IEEE ISCO 2015, pp. 1–5 (2015)
Metadaten
Titel
A secure analysis of vehicular authentication security scheme of RSUs in VANET
verfasst von
Yongchan Kim
Jongkun Lee
Publikationsdatum
01.08.2016
Verlag
Springer Paris
Erschienen in
Journal of Computer Virology and Hacking Techniques / Ausgabe 3/2016
Elektronische ISSN: 2263-8733
DOI
https://doi.org/10.1007/s11416-016-0269-z

Weitere Artikel der Ausgabe 3/2016

Journal of Computer Virology and Hacking Techniques 3/2016 Zur Ausgabe