Skip to main content

2018 | OriginalPaper | Buchkapitel

Modeling and Analysis of a Hybrid Authentication Protocol for VANET

verfasst von : Yang Xu, Ziwang Wang, Lei Huang, Xiaoyao Xie

Erschienen in: Cloud Computing and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A policy mechanism of pseudonym exchange was established in VANET. The group signature is introduced as the identity attribute tag of the message which be used as a supplement to pseudonym. A white list mechanism is also proposed to avoid generate huge storage and cancellation overhead in the pseudonym signature scheme. The security and performance analysis show that the proposed protocol is feasible. In the storage overhead, authentication speed and robustness are superior to the traditional scheme. However, the increase of message length has little effect on packet loss rate and end-to-end delay. Compared to its performance in privacy protection and saving computational overhead, these effects can be ignored.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Zhang, H.G., Han, W.B., Lai, X.J., et al.: Survey on cyberspace security. Sci. China Inf. Sci. 58(11), 1–43 (2015)MathSciNet Zhang, H.G., Han, W.B., Lai, X.J., et al.: Survey on cyberspace security. Sci. China Inf. Sci. 58(11), 1–43 (2015)MathSciNet
2.
Zurück zum Zitat Mokhtar, B., Azab, M.: Survey on security issues in vehicular ad hoc networks. AEJ – Alex. Eng. J. 54(4), 1115–1126 (2015)CrossRef Mokhtar, B., Azab, M.: Survey on security issues in vehicular ad hoc networks. AEJ – Alex. Eng. J. 54(4), 1115–1126 (2015)CrossRef
3.
Zurück zum Zitat Mohammed, N.H.A., El-Moafy, H.N., Abdel-Mageid, S.M., et al.: Mobility management scheme based on smart buffering for vehicular networks. Int. J. Comput. Netw. Appl. 4(2), 35–46 (2017) Mohammed, N.H.A., El-Moafy, H.N., Abdel-Mageid, S.M., et al.: Mobility management scheme based on smart buffering for vehicular networks. Int. J. Comput. Netw. Appl. 4(2), 35–46 (2017)
4.
Zurück zum Zitat Liu, X., Zhang, Y., Wang, B., et al.: Mona: secure multi-owner data sharing for dynamic groups in the Cloud. IEEE Trans. Parallel Distrib. Syst. 24(6), 1182–1191 (2013)CrossRef Liu, X., Zhang, Y., Wang, B., et al.: Mona: secure multi-owner data sharing for dynamic groups in the Cloud. IEEE Trans. Parallel Distrib. Syst. 24(6), 1182–1191 (2013)CrossRef
5.
Zurück zum Zitat Joe, M.M., Ramakrishnan, B.: Review of vehicular ad hoc network communication models including WVANET (Web VANET) model and WVANET future research directions. Wirel. Netw. 22(7), 1–18 (2015) Joe, M.M., Ramakrishnan, B.: Review of vehicular ad hoc network communication models including WVANET (Web VANET) model and WVANET future research directions. Wirel. Netw. 22(7), 1–18 (2015)
6.
Zurück zum Zitat Raya, M., Hubaux, J.: Securing vehicular ad hoc networks. J. Comput. Secur. 15(1), 39–68 (2007)CrossRef Raya, M., Hubaux, J.: Securing vehicular ad hoc networks. J. Comput. Secur. 15(1), 39–68 (2007)CrossRef
7.
Zurück zum Zitat Haas, J., Hu, Y., Laberteaux, K.: Design and analysis of a lightweight certificate revocation mechanism for VANET. In: Proceedings of 6th ACM International Workshop on Vehicular Inter-networking, New York, pp. 89–98 (2009) Haas, J., Hu, Y., Laberteaux, K.: Design and analysis of a lightweight certificate revocation mechanism for VANET. In: Proceedings of 6th ACM International Workshop on Vehicular Inter-networking, New York, pp. 89–98 (2009)
8.
Zurück zum Zitat Lin, X., Sun, X., Ho, P.H., et al.: GSIS: a secure and privacy-preserving protocol for vehicular communications. IEEE Trans. Veh. Technol. 56(6), 3442–3456 (2007)CrossRef Lin, X., Sun, X., Ho, P.H., et al.: GSIS: a secure and privacy-preserving protocol for vehicular communications. IEEE Trans. Veh. Technol. 56(6), 3442–3456 (2007)CrossRef
10.
Zurück zum Zitat Freudiger, J., Raya, M., Félegyházi, M., et al.: Mix-zones for location privacy in vehicular networks. In: ACM Workshop on Wireless Networking for Intelligent Transportation Systems (2007) Freudiger, J., Raya, M., Félegyházi, M., et al.: Mix-zones for location privacy in vehicular networks. In: ACM Workshop on Wireless Networking for Intelligent Transportation Systems (2007)
11.
Zurück zum Zitat Zhu, X., Donghui, H., Hou, Z., et al.: A location privacy preserving solution to resist passive and active attacks in VANET. China Commun. 11(9), 60–67 (2014)CrossRef Zhu, X., Donghui, H., Hou, Z., et al.: A location privacy preserving solution to resist passive and active attacks in VANET. China Commun. 11(9), 60–67 (2014)CrossRef
13.
Zurück zum Zitat Freudiger, J., Shokri, R., Hubaux, J.P.: On the optimal placement of mix zones. In: PETS 2009, 216–234 (2009) Freudiger, J., Shokri, R., Hubaux, J.P.: On the optimal placement of mix zones. In: PETS 2009, 216–234 (2009)
15.
Zurück zum Zitat Hao, Y., Cheng, Yu., Chi, Z., et al.: A distributed key management framework with cooperative message authentication in VANETs. IEEE J. Sel. Areas Commun. 29(3), 616–629 (2011)CrossRef Hao, Y., Cheng, Yu., Chi, Z., et al.: A distributed key management framework with cooperative message authentication in VANETs. IEEE J. Sel. Areas Commun. 29(3), 616–629 (2011)CrossRef
16.
Zurück zum Zitat Jung, Y.H., Li, Q.: Short dynamic group signature scheme supporting controllable linkabilityp. IEEE Trans. Inf. Forensics Secur. 32(6), 1–14 (2013) Jung, Y.H., Li, Q.: Short dynamic group signature scheme supporting controllable linkabilityp. IEEE Trans. Inf. Forensics Secur. 32(6), 1–14 (2013)
17.
Zurück zum Zitat Sampigethaya, K., Li, M., Huang, L., Poovendran, R.: AMOEBA: robust location privacy scheme for VANET. IEEE J. Sel. Areas Commun. 25(8), 1569–1589 (2007)CrossRef Sampigethaya, K., Li, M., Huang, L., Poovendran, R.: AMOEBA: robust location privacy scheme for VANET. IEEE J. Sel. Areas Commun. 25(8), 1569–1589 (2007)CrossRef
18.
Zurück zum Zitat Liu, Z., Liu, J., Wu, Q., et al.: Secure and efficient distributed pseudonym generation in VANET. J. Commun. 36(11), 33–40 (2015) Liu, Z., Liu, J., Wu, Q., et al.: Secure and efficient distributed pseudonym generation in VANET. J. Commun. 36(11), 33–40 (2015)
19.
Zurück zum Zitat Chow, C.Y., Mokbel, M.F., Liu, X.: A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In: Proceedings of the 14th Annual ACM International Symposium on Advances in Geographic Information Systems, pp. 171–178. ACM (2006) Chow, C.Y., Mokbel, M.F., Liu, X.: A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In: Proceedings of the 14th Annual ACM International Symposium on Advances in Geographic Information Systems, pp. 171–178. ACM (2006)
20.
Zurück zum Zitat Li, M., Sampigethaya, K., Huang, L., et al.: Swing & swap: user-centric approaches towards maximizing location privacy. In: Proceedings of ACM WPES, pp. 19–28 (2006) Li, M., Sampigethaya, K., Huang, L., et al.: Swing & swap: user-centric approaches towards maximizing location privacy. In: Proceedings of ACM WPES, pp. 19–28 (2006)
21.
Zurück zum Zitat Lin, X., Sun, X., Wang, X., et al.: TSVC: timed efficient and secure vehicular communications with privacy preserving. IEEE Trans. Wirel. Commun. 7(12), 4987–4998 (2009)CrossRef Lin, X., Sun, X., Wang, X., et al.: TSVC: timed efficient and secure vehicular communications with privacy preserving. IEEE Trans. Wirel. Commun. 7(12), 4987–4998 (2009)CrossRef
22.
Zurück zum Zitat Zeng, S., Huang, Y., Liu, X.: Privacy-preserving communication for VANETs with conditionally anonymous ring signature. Int. J. Netw. Secur. 17(2), 135–141 (2015) Zeng, S., Huang, Y., Liu, X.: Privacy-preserving communication for VANETs with conditionally anonymous ring signature. Int. J. Netw. Secur. 17(2), 135–141 (2015)
Metadaten
Titel
Modeling and Analysis of a Hybrid Authentication Protocol for VANET
verfasst von
Yang Xu
Ziwang Wang
Lei Huang
Xiaoyao Xie
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-030-00012-7_12