Skip to main content
Erschienen in: Cluster Computing 4/2013

01.12.2013

PPAS: privacy protection authentication scheme for VANET

verfasst von: Hui Zhu, Tingting Liu, Guanghui Wei, Hui Li

Erschienen in: Cluster Computing | Ausgabe 4/2013

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Vehicular ad hoc network (VANET) can increase the traffic efficiency by allowing arbitrary vehicles to broadcast the messages to other vehicles and road side units (RSUs). But due to the openness of the wireless network, VANET is very vulnerable to forgery attack. Thus, the security and privacy of the messages should be provided, to make sure that the real identity of vehicles can be traceable by authorized party while not be revealed to other vehicles. The existing solutions can neither satisfy the privacy requirement nor have an effective message verification scheme on vehicles. A secure and privacy protect authentication scheme is proposed in this paper, which comprises local authentication and roaming authentication for VANET based on bilinear pairing and can provide secure communications and anonymous authentication among RSUs and vehicles.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
4.
Zurück zum Zitat Sampigethaya, K., Huang, L., Li, M., Poovendran, R., Matsuura, K., Sezaki, K.: CARAVAN: providing location privacy for VANET. In: Proceedings of the Workshop on Embedded Security in Cars (ESCAR05) (2005). doi:10.1.1.102.3150 Sampigethaya, K., Huang, L., Li, M., Poovendran, R., Matsuura, K., Sezaki, K.: CARAVAN: providing location privacy for VANET. In: Proceedings of the Workshop on Embedded Security in Cars (ESCAR05) (2005). doi:10.​1.​1.​102.​3150
6.
Zurück zum Zitat Qin, B., Wu, Q.: Distributed privacy-preserving secure aggregation in vehicular communication. In: Third International Conference on Intelligent Networking and Collaborative Systems, pp. 100–107 (2011). doi:10.1109/INCoS.2011.78 CrossRef Qin, B., Wu, Q.: Distributed privacy-preserving secure aggregation in vehicular communication. In: Third International Conference on Intelligent Networking and Collaborative Systems, pp. 100–107 (2011). doi:10.​1109/​INCoS.​2011.​78 CrossRef
7.
Zurück zum Zitat Lu, R., Lin, X., Zhu, H.: ECPP: efficient conditional privacy preservation protocol for secure vehicular communications. In: The Proceedings of the IEEE INFOCOM, pp. 1229–1237 (2008). doi:10.1109/CIS.2010.120 Lu, R., Lin, X., Zhu, H.: ECPP: efficient conditional privacy preservation protocol for secure vehicular communications. In: The Proceedings of the IEEE INFOCOM, pp. 1229–1237 (2008). doi:10.​1109/​CIS.​2010.​120
8.
Zurück zum Zitat Wasef, A., Lu, R., Lin, X., Shen, X.: Complementing public key infrastructure to secure vehicular ad hoc networks. Wirel. Commun. 17(5), 22–28 (2010). doi:10.1.1.228.7044 CrossRef Wasef, A., Lu, R., Lin, X., Shen, X.: Complementing public key infrastructure to secure vehicular ad hoc networks. Wirel. Commun. 17(5), 22–28 (2010). doi:10.​1.​1.​228.​7044 CrossRef
9.
10.
Zurück zum Zitat Fujii, A., Ohtake, G., Hanaoka, G., Ogawa, K.: Anonymous authentication scheme for subscription services. In: Proceedings of the 11th International Conference, KES 2007 and XV. Italian Workshop on Neural Network Conference on Knowledge-Based Intelligent Information and Engineering Systems: Part III, pp. 975–983. Springer, Berlin (2007). doi:10.1007/978-3-540-74829-8_119 Fujii, A., Ohtake, G., Hanaoka, G., Ogawa, K.: Anonymous authentication scheme for subscription services. In: Proceedings of the 11th International Conference, KES 2007 and XV. Italian Workshop on Neural Network Conference on Knowledge-Based Intelligent Information and Engineering Systems: Part III, pp. 975–983. Springer, Berlin (2007). doi:10.​1007/​978-3-540-74829-8_​119
12.
Zurück zum Zitat Sun, Y., Feng, Z., Hu, Q.: An efficient distributed key management scheme for group-signature based anonymous authentication in VANET. Secur. Commun. Netw. 5(1), 79–86 (2012). doi:10.1002/sec.302 CrossRef Sun, Y., Feng, Z., Hu, Q.: An efficient distributed key management scheme for group-signature based anonymous authentication in VANET. Secur. Commun. Netw. 5(1), 79–86 (2012). doi:10.​1002/​sec.​302 CrossRef
13.
Zurück zum Zitat Zhang, S., Tao, J., Yuan, Y.: Anonymous authentication-oriented vehicular privacy protection technology research in VANET. In: International Conference on Electrical and Control Engineering (ICECE), pp. 4365–4368 (2011). doi:10.1109/ICECENG.2011.6057434 Zhang, S., Tao, J., Yuan, Y.: Anonymous authentication-oriented vehicular privacy protection technology research in VANET. In: International Conference on Electrical and Control Engineering (ICECE), pp. 4365–4368 (2011). doi:10.​1109/​ICECENG.​2011.​6057434
14.
15.
17.
Zurück zum Zitat Baek, J., Safavi-Naini, R., Susilo, W.: Universal designated verifier signature proof (or how to efficiently prove knowledge of a signature). In: Advances in Cryptology-Asiacrypt’05, pp. 644–661. Springer, Berlin (2005). doi:10.1007/11593447_35 Baek, J., Safavi-Naini, R., Susilo, W.: Universal designated verifier signature proof (or how to efficiently prove knowledge of a signature). In: Advances in Cryptology-Asiacrypt’05, pp. 644–661. Springer, Berlin (2005). doi:10.​1007/​11593447_​35
18.
Zurück zum Zitat Zhang, F., Safavi-Naini, R., Susilo, W.: An efficient signature scheme from bilinear pairings and its applications. In: International Workshop on Practice and Theory in Public Key Cryptography-PKC’2004. Lecture Notes in Computer Science, pp. 277–290. Springer, Berlin (2004). doi:10.1007/978-3-540-24632-9_20 Zhang, F., Safavi-Naini, R., Susilo, W.: An efficient signature scheme from bilinear pairings and its applications. In: International Workshop on Practice and Theory in Public Key Cryptography-PKC’2004. Lecture Notes in Computer Science, pp. 277–290. Springer, Berlin (2004). doi:10.​1007/​978-3-540-24632-9_​20
19.
Zurück zum Zitat Bellare, M., Canetti, R., Krawczyk, H.: A modular approach to the design and analysis of authentication and key exchange protocols. In: Proceedings of the 30th Annual Symposium on the Theory of Computing, pp. 419–428 (1998). doi:10.1145/276698.276854 Bellare, M., Canetti, R., Krawczyk, H.: A modular approach to the design and analysis of authentication and key exchange protocols. In: Proceedings of the 30th Annual Symposium on the Theory of Computing, pp. 419–428 (1998). doi:10.​1145/​276698.​276854
21.
Zurück zum Zitat Tin, Y.S.T., Vasanta, H., Boyd, C.: Protocols with security proofs for mobile applications. In: Information Security and Privacy: 9th Australasian Conference (ACISP 2004). LNCS, vol. 3108, pp. 358–369. Springer, Berlin (2004). doi:10.1007/978-3-540-27800-9_31 CrossRef Tin, Y.S.T., Vasanta, H., Boyd, C.: Protocols with security proofs for mobile applications. In: Information Security and Privacy: 9th Australasian Conference (ACISP 2004). LNCS, vol. 3108, pp. 358–369. Springer, Berlin (2004). doi:10.​1007/​978-3-540-27800-9_​31 CrossRef
23.
Metadaten
Titel
PPAS: privacy protection authentication scheme for VANET
verfasst von
Hui Zhu
Tingting Liu
Guanghui Wei
Hui Li
Publikationsdatum
01.12.2013
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe 4/2013
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-013-0260-0

Weitere Artikel der Ausgabe 4/2013

Cluster Computing 4/2013 Zur Ausgabe

Premium Partner