Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 5/2020

10.05.2020

Hybrid conditional privacy-preserving authentication scheme for VANETs

verfasst von: Shibin Wang, Kele Mao, Furui Zhan, Dong Liu

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 5/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In existing authentication schemes for vehicular ad hoc networks (VANETs), the public key infrastructure (PKI)-based pseudonym certificate, identity-based encryption and group signature technology are usually used to preserve the security and privacy. However, these schemes face some challenges, e.g., the time-consuming certificate revocation list (CRL) checking, identity revocation issue and the computation overhead of group signature, respectively. To cope with these challenges, we propose a hybrid conditional privacy-preserving authentication protocol based on the PKI certificate and identity-based signature. In our scheme, the trust authority (TA) assigns the unique long-term certificate for every registered node. Only the vehicle with valid certificate can apply the anonymous short term identity from the current RSU to sign safety-related message. The identity-based signature avoids the CRL checking and the complex bilinear paring operation. When vehicle is compromised, TA can easily revoke its identity by the only long-term certificate. To further enhance efficiency, vehicle can verify the received messages by the single or batch authentication manner. In addition, we optimize the authentication process to avoid vehicle verifying the repeated and unnecessary signatures. Compared with the current schemes, the simulation result shows that our authentication protocol can effectively reduce verified messages in the case of meeting the requirement of security and privacy.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Alazzawi MA, Lu H, Yassin AA, Chen K (2019) Robust conditional privacy-preserving authentication based on pseudonym root with cuckoo filter in vehicular ad hoc networks. KSII Transactions on Internet and Information Systems 13(12):6121–6144 Alazzawi MA, Lu H, Yassin AA, Chen K (2019) Robust conditional privacy-preserving authentication based on pseudonym root with cuckoo filter in vehicular ad hoc networks. KSII Transactions on Internet and Information Systems 13(12):6121–6144
2.
Zurück zum Zitat Alfadhli SA, Alresheedi S, Lu S, Fatani A, Ince M (2019) Elcph: an efficient lightweight conditional privacy-preserving authentication scheme based on hash function and local group secrete key for vanet. pp 32–36 Alfadhli SA, Alresheedi S, Lu S, Fatani A, Ince M (2019) Elcph: an efficient lightweight conditional privacy-preserving authentication scheme based on hash function and local group secrete key for vanet. pp 32–36
3.
Zurück zum Zitat Ali I, Lawrence T, Li F (2020) An efficient identity-based signature scheme without bilinear pairing for vehicle-to-vehicle communication in vanets Journal of Systems Architecture 103 Ali I, Lawrence T, Li F (2020) An efficient identity-based signature scheme without bilinear pairing for vehicle-to-vehicle communication in vanets Journal of Systems Architecture 103
4.
5.
Zurück zum Zitat Bayat M, Barmshoory M, Rahimi M, Aref MR (2015) A secure authentication scheme for vanets with batch verification. Wireless Networks 21(5):1–11CrossRef Bayat M, Barmshoory M, Rahimi M, Aref MR (2015) A secure authentication scheme for vanets with batch verification. Wireless Networks 21(5):1–11CrossRef
6.
Zurück zum Zitat Ben Jaballah W, Conti M, Mosbah M, Palazzi CE (2014) Fast and secure multihop broadcast solutions for intervehicular communication. Intelligent Transportation Systems IEEE Transactions on 15(1):433–450CrossRef Ben Jaballah W, Conti M, Mosbah M, Palazzi CE (2014) Fast and secure multihop broadcast solutions for intervehicular communication. Intelligent Transportation Systems IEEE Transactions on 15(1):433–450CrossRef
8.
Zurück zum Zitat Buttyán L., Holczer T, Weimerskirch A, Whyte W (2010) SLOW: A Practical pseudonym changing scheme for location privacy in VANETs. In: IEEE Vehicular NETWORKING conference, pp. 1–8 Buttyán L., Holczer T, Weimerskirch A, Whyte W (2010) SLOW: A Practical pseudonym changing scheme for location privacy in VANETs. In: IEEE Vehicular NETWORKING conference, pp. 1–8
9.
Zurück zum Zitat Chaum D, Heyst EV (1991) Group signatures springer berlin heidelberg Chaum D, Heyst EV (1991) Group signatures springer berlin heidelberg
10.
Zurück zum Zitat Chen J, Mamun MSI, Miyaji A (2015) An efficient batch verification system and its effect in a real time vanet environment. Security & Communication Networks 8(2):298–310CrossRef Chen J, Mamun MSI, Miyaji A (2015) An efficient batch verification system and its effect in a real time vanet environment. Security & Communication Networks 8(2):298–310CrossRef
11.
Zurück zum Zitat Doumiati S, Choikani TA, Artail H (2014) LPS For LBS: Location-privacy scheme for location-based services. In: Ieee/acs international conference on computer systems and applications, pp. 449–456 Doumiati S, Choikani TA, Artail H (2014) LPS For LBS: Location-privacy scheme for location-based services. In: Ieee/acs international conference on computer systems and applications, pp. 449–456
12.
Zurück zum Zitat Emara K, Woerndl W, Schlichter J (2015) On evaluation of location privacy preserving schemes for vanet safety applications. Computer Communications 63(C):11–23CrossRef Emara K, Woerndl W, Schlichter J (2015) On evaluation of location privacy preserving schemes for vanet safety applications. Computer Communications 63(C):11–23CrossRef
13.
Zurück zum Zitat Forster D, Kargl F, Lohr H (2014) PUCA: A pseudonym scheme with user-controlled anonymity for vehicular ad-hoc networks (vanet). In: Vehicular NETWORKING conference, pp. 25–32 Forster D, Kargl F, Lohr H (2014) PUCA: A pseudonym scheme with user-controlled anonymity for vehicular ad-hoc networks (vanet). In: Vehicular NETWORKING conference, pp. 25–32
14.
Zurück zum Zitat Hao Y, Chengcheng Y, Zhou C, Song W (2011) A distributed key management framework with cooperative message authentication in vanets. IEEE Journal on Selected Areas in Communications 29(3):616–629CrossRef Hao Y, Chengcheng Y, Zhou C, Song W (2011) A distributed key management framework with cooperative message authentication in vanets. IEEE Journal on Selected Areas in Communications 29(3):616–629CrossRef
15.
Zurück zum Zitat He D, Zeadally S, Xu B, Huang X (2015) An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Transactions on Information Forensics & Security 10 (12):1–1CrossRef He D, Zeadally S, Xu B, Huang X (2015) An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Transactions on Information Forensics & Security 10 (12):1–1CrossRef
16.
Zurück zum Zitat Horng SJ, Tzeng SF, Huang PH, Wang X, Li T, Khan MK (2015) An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks. Information Sciences An International Journal, 317, pp 48–66 Horng SJ, Tzeng SF, Huang PH, Wang X, Li T, Khan MK (2015) An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks. Information Sciences An International Journal, 317, pp 48–66
17.
Zurück zum Zitat Horng SJ, Tzeng SF, Pan Y, Fan P, Wang X, Li T, Khan MK (2013) b-SPECS+: Batch verification for secure pseudonymous authentication in VANET. IEEE Transactions on Information Forensics & Security 8(11):1860–1875CrossRef Horng SJ, Tzeng SF, Pan Y, Fan P, Wang X, Li T, Khan MK (2013) b-SPECS+: Batch verification for secure pseudonymous authentication in VANET. IEEE Transactions on Information Forensics & Security 8(11):1860–1875CrossRef
18.
Zurück zum Zitat Huang D, Misra S, Verma M, Xue G (2011) PACP: An efficient pseudonymous authentication-based conditional privacy protocol for vanets. IEEE Transactions on Intelligent Transportation Systems 12(3):736–746CrossRef Huang D, Misra S, Verma M, Xue G (2011) PACP: An efficient pseudonymous authentication-based conditional privacy protocol for vanets. IEEE Transactions on Intelligent Transportation Systems 12(3):736–746CrossRef
19.
Zurück zum Zitat Huang JL, Yeh LY, Chien HY (2011) ABAKA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology 60(1):248–262CrossRef Huang JL, Yeh LY, Chien HY (2011) ABAKA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology 60(1):248–262CrossRef
20.
Zurück zum Zitat Islam SH, Obaidat MS, Vijayakumar P, Abdulhay E, Reddy MKC (2017) A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for vanets. Future Generation Computer Systems 84(JUL):216–227 Islam SH, Obaidat MS, Vijayakumar P, Abdulhay E, Reddy MKC (2017) A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for vanets. Future Generation Computer Systems 84(JUL):216–227
21.
Zurück zum Zitat Jiang S, Zhu X, Wang L (2016) An efficient anonymous batch authentication scheme based on HMAC for VANETs. IEEE Transactions on Intelligent Transportation Systems 17(8):1CrossRef Jiang S, Zhu X, Wang L (2016) An efficient anonymous batch authentication scheme based on HMAC for VANETs. IEEE Transactions on Intelligent Transportation Systems 17(8):1CrossRef
22.
Zurück zum Zitat Kanchan S, Singh G, Chaudhari NS (2020) Easpsc: Efficient authentication of signrecryption protocol using shareable clouds in vanet groups. Peer-to-Peer Networking and Applications 13(1):388–411CrossRef Kanchan S, Singh G, Chaudhari NS (2020) Easpsc: Efficient authentication of signrecryption protocol using shareable clouds in vanet groups. Peer-to-Peer Networking and Applications 13(1):388–411CrossRef
23.
Zurück zum Zitat Liu X, Jia Z, Xu E, Gong B, Wang L (2019) A privacy protection scheme in vanets based on group signature. Communications in Computer and Information Science 960:286–300CrossRef Liu X, Jia Z, Xu E, Gong B, Wang L (2019) A privacy protection scheme in vanets based on group signature. Communications in Computer and Information Science 960:286–300CrossRef
24.
Zurück zum Zitat Liu Y, Wang L, Chen H (2015) Message authentication using proxy vehicles in vehicular ad hoc networks. Vehicular Technology IEEE Transactions on 64(8):3697–3710CrossRef Liu Y, Wang L, Chen H (2015) Message authentication using proxy vehicles in vehicular ad hoc networks. Vehicular Technology IEEE Transactions on 64(8):3697–3710CrossRef
25.
Zurück zum Zitat Lo NW, Tsai JL (2016) An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings. IEEE Transactions on Intelligent Transportation Systems 17(5):1319–1328CrossRef Lo NW, Tsai JL (2016) An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings. IEEE Transactions on Intelligent Transportation Systems 17(5):1319–1328CrossRef
26.
Zurück zum Zitat Lu R, Li X, Luan TH, Liang X (2012) Pseudonym changing at social spots: an effective strategy for location privacy in vanets. Vehicular Technology IEEE Transactions on 61(1):86–96CrossRef Lu R, Li X, Luan TH, Liang X (2012) Pseudonym changing at social spots: an effective strategy for location privacy in vanets. Vehicular Technology IEEE Transactions on 61(1):86–96CrossRef
27.
Zurück zum Zitat Pan Y, Li J (2013) Cooperative pseudonym change scheme based on the number of neighbors in vanets. Journal of Network & Computer Applications 36(6):1599–1609MathSciNetCrossRef Pan Y, Li J (2013) Cooperative pseudonym change scheme based on the number of neighbors in vanets. Journal of Network & Computer Applications 36(6):1599–1609MathSciNetCrossRef
28.
Zurück zum Zitat Shen AN, Guo S, Zeng D, Guizani M (2012) A lightweight privacy-preserving protocol using chameleon hashing for secure vehicular communications, Vehicular Communication, pp 2543–2548 Shen AN, Guo S, Zeng D, Guizani M (2012) A lightweight privacy-preserving protocol using chameleon hashing for secure vehicular communications, Vehicular Communication, pp 2543–2548
29.
Zurück zum Zitat Shim KA (2012) CPAS: An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Transactions on Vehicular Technology 61(4):1874–1883CrossRef Shim KA (2012) CPAS: An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Transactions on Vehicular Technology 61(4):1874–1883CrossRef
30.
Zurück zum Zitat Shirase M, Miyazaki Y, Takagi T, Han DG, Choi D (2009) Efficient implementation of pairing-based cryptography on a sensor node. Ieice Transactions on Information & Systems 92-D(5):909–917CrossRef Shirase M, Miyazaki Y, Takagi T, Han DG, Choi D (2009) Efficient implementation of pairing-based cryptography on a sensor node. Ieice Transactions on Information & Systems 92-D(5):909–917CrossRef
31.
Zurück zum Zitat Song C, Gu X, Wang L, Liu Z, Ping Y (2019) Research on identity-based batch anonymous authentication scheme for vanet. KSII Transactions on Internet and Information Systems 13(12):6175–6189 Song C, Gu X, Wang L, Liu Z, Ping Y (2019) Research on identity-based batch anonymous authentication scheme for vanet. KSII Transactions on Internet and Information Systems 13(12):6175–6189
32.
Zurück zum Zitat Sun Y, Lu R, Lin X, Shen X (2010) An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. IEEE Transactions on Vehicular Technology 59(7):3589–3603CrossRef Sun Y, Lu R, Lin X, Shen X (2010) An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. IEEE Transactions on Vehicular Technology 59(7):3589–3603CrossRef
33.
Zurück zum Zitat Sun Y, Zhang B, Zhao B, Su X, Su J (2015) Mix-zones optimal deployment for protecting location privacy in vanet. Peer-to-Peer Networking and Applications 8(6):1108–1121CrossRef Sun Y, Zhang B, Zhao B, Su X, Su J (2015) Mix-zones optimal deployment for protecting location privacy in vanet. Peer-to-Peer Networking and Applications 8(6):1108–1121CrossRef
34.
Zurück zum Zitat Thenmozhi T, Somasundaram RM (2015) Pseudonyms based blind signature approach for an improved secured communication at social spots in vanets. Wireless Personal Communications 82(1):643–658CrossRef Thenmozhi T, Somasundaram RM (2015) Pseudonyms based blind signature approach for an improved secured communication at social spots in vanets. Wireless Personal Communications 82(1):643–658CrossRef
35.
Zurück zum Zitat Vijayakumar P, Azees M, Chang V, Deborah J, Balusamy B Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks. Cluster Computing Vijayakumar P, Azees M, Chang V, Deborah J, Balusamy B Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks. Cluster Computing
36.
Zurück zum Zitat Vijayakumar P, Azees M, Deborah LJ (2015) Cpav: Computationally efficient privacy preserving anonymous authentication scheme for vehicular ad hoc networks. In: 2015 IEEE 2Nd international conference on cyber security and cloud computing (CSCloud) Vijayakumar P, Azees M, Deborah LJ (2015) Cpav: Computationally efficient privacy preserving anonymous authentication scheme for vehicular ad hoc networks. In: 2015 IEEE 2Nd international conference on cyber security and cloud computing (CSCloud)
37.
Zurück zum Zitat Wasef A, Shen X (2010) Efficient group signature scheme supporting batch verification for securing vehicular networks. In: IEEE International conference on communications, pp. 1–5 Wasef A, Shen X (2010) Efficient group signature scheme supporting batch verification for securing vehicular networks. In: IEEE International conference on communications, pp. 1–5
38.
Zurück zum Zitat Wasef A, Shen X (2010) REP: Location Privacy for vanets using random encryption periods. Mobile Networks & Applications 15(1):172–185CrossRef Wasef A, Shen X (2010) REP: Location Privacy for vanets using random encryption periods. Mobile Networks & Applications 15(1):172–185CrossRef
39.
Zurück zum Zitat Wasef A, Shen X (2013) EMAP: Expedite Message authentication protocol for vehicular ad hoc networks. Mobile Computing IEEE Transactions on 12(1):78–89CrossRef Wasef A, Shen X (2013) EMAP: Expedite Message authentication protocol for vehicular ad hoc networks. Mobile Computing IEEE Transactions on 12(1):78–89CrossRef
40.
Zurück zum Zitat Wisitpongphan N, Bai F, Mudalige P, Sadekar V (2007) Routing in sparse vehicular ad hoc wireless networks. IEEE Journal on Selected Areas in Communications 25(8):1538–1556CrossRef Wisitpongphan N, Bai F, Mudalige P, Sadekar V (2007) Routing in sparse vehicular ad hoc wireless networks. IEEE Journal on Selected Areas in Communications 25(8):1538–1556CrossRef
41.
Zurück zum Zitat Xiong H, Guan Z, Chen Z, Li F (2013) An efficient certificateless aggregate signature with constant pairing computations. Information Sciences, 219, pp 225–235 Xiong H, Guan Z, Chen Z, Li F (2013) An efficient certificateless aggregate signature with constant pairing computations. Information Sciences, 219, pp 225–235
42.
Zurück zum Zitat Yang X, Liu R, Wang M, Chen G (2019) Identity-based aggregate signature scheme in vehicle ad-hoc network. pp 1046–1049 Yang X, Liu R, Wang M, Chen G (2019) Identity-based aggregate signature scheme in vehicle ad-hoc network. pp 1046–1049
43.
Zurück zum Zitat Ying B, Makrakis D, Hou Z (2015) Motivation for protecting selfish vehicles’ location privacy in vehicular networks. IEEE Transactions on Vehicular Technology 64(12):5631–5641CrossRef Ying B, Makrakis D, Hou Z (2015) Motivation for protecting selfish vehicles’ location privacy in vehicular networks. IEEE Transactions on Vehicular Technology 64(12):5631–5641CrossRef
44.
Zurück zum Zitat Zhang C, Ho PH, Tapolcai J (2011) On batch verification with group testing for vehicular communications. Wireless Networks 17(8):1851–1865CrossRef Zhang C, Ho PH, Tapolcai J (2011) On batch verification with group testing for vehicular communications. Wireless Networks 17(8):1851–1865CrossRef
45.
Zurück zum Zitat Zhang L, Hu C, Wu Q, Domingo-Ferrer J (2016) Privacy-preserving vehicular communication authentication with hierarchical aggregation and fast response. IEEE Transactions on Computers 65(8):2562–2574MathSciNetMATHCrossRef Zhang L, Hu C, Wu Q, Domingo-Ferrer J (2016) Privacy-preserving vehicular communication authentication with hierarchical aggregation and fast response. IEEE Transactions on Computers 65(8):2562–2574MathSciNetMATHCrossRef
46.
Zurück zum Zitat Zhu X, Jiang S, Wang L, Li H (2014) Efficient privacy-preserving authentication for vehicular ad hoc networks. IEEE Transactions on Vehicular Technology 63(2):907–919CrossRef Zhu X, Jiang S, Wang L, Li H (2014) Efficient privacy-preserving authentication for vehicular ad hoc networks. IEEE Transactions on Vehicular Technology 63(2):907–919CrossRef
Metadaten
Titel
Hybrid conditional privacy-preserving authentication scheme for VANETs
verfasst von
Shibin Wang
Kele Mao
Furui Zhan
Dong Liu
Publikationsdatum
10.05.2020
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 5/2020
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-020-00916-3

Weitere Artikel der Ausgabe 5/2020

Peer-to-Peer Networking and Applications 5/2020 Zur Ausgabe

Premium Partner