Skip to main content
Erschienen in: Telecommunication Systems 4/2017

25.07.2016

Secure and distributed certification system architecture for safety message authentication in VANET

verfasst von: Tiziri Oulhaci, Mawloud Omar, Fatiha Harzine, Ines Harfi

Erschienen in: Telecommunication Systems | Ausgabe 4/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Vehicular Ad hoc NETworks (VANETs) are a burgeoning research focus, aimed at creating communication among vehicles to improve the road safety and enhance driving conditions. For such networks, security is one of the most challenging issues due to their nature of wireless transmission and high topology changing frequency. In this paper, we propose a secure and distributed certification system architecture for safety message authentication in VANET, which resists against false public-key certification. To increase the availability of the authentication service, our proposal is designed through a decentralized system, supervised by a root authority. The latter authority delegates to a set of regional certification authorities the privilege of issuing public-key certificates to the vehicles. Each regional certification authority cooperates with its subordinates RSUs to sign public-key certificates using threshold signature. The main purpose of our solution is to ensure the messages authentication while respecting the imposed constraints by the real-time aspect and the nodes mobility. We demonstrate through the practical analysis and simulation results the efficiency of our solution with comparison to other concurrent protocols.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Al-Sultan, S., Al-Doori, M. M., Al-Bayatti, A. H., & Zedan, H. (2013). A comprehensive survey on vehicular ad hoc network. Journal of Network and Computer Applications, 37, 380–392.CrossRef Al-Sultan, S., Al-Doori, M. M., Al-Bayatti, A. H., & Zedan, H. (2013). A comprehensive survey on vehicular ad hoc network. Journal of Network and Computer Applications, 37, 380–392.CrossRef
2.
Zurück zum Zitat Engoulou, R. G., Bellaïche, M., Pierre, S., & Quintero, A. (2014). VANET security surveys. Computer Communications, 44, 1–13.CrossRef Engoulou, R. G., Bellaïche, M., Pierre, S., & Quintero, A. (2014). VANET security surveys. Computer Communications, 44, 1–13.CrossRef
3.
Zurück zum Zitat Mejri, M. N., Ben-Othman, J., & Hamdi, M. (2014). Survey on VANET security challenges and possible cryptographic solutions. Vehicular Communication, 1(2), 53–66.CrossRef Mejri, M. N., Ben-Othman, J., & Hamdi, M. (2014). Survey on VANET security challenges and possible cryptographic solutions. Vehicular Communication, 1(2), 53–66.CrossRef
4.
Zurück zum Zitat Yun, W., & Dianjun, L. (2012). An efficient threshold signature scheme based on the elliptic curve cryptosystem. In International conference on computer science and electronics engineering. Yun, W., & Dianjun, L. (2012). An efficient threshold signature scheme based on the elliptic curve cryptosystem. In International conference on computer science and electronics engineering.
5.
Zurück zum Zitat Karati, S., Das, A., Roychowdhury, D., Bellur, B., Bhattacharya, D., & Iyer, A. (2014). New algorithms for batch verification of standard ECDSA signatures. Journal of Cryptographic Engineering, 4(4), 237–258.CrossRef Karati, S., Das, A., Roychowdhury, D., Bellur, B., Bhattacharya, D., & Iyer, A. (2014). New algorithms for batch verification of standard ECDSA signatures. Journal of Cryptographic Engineering, 4(4), 237–258.CrossRef
6.
Zurück zum Zitat Park, Y., Sur, C., Jung, C. D., & Rhee, K. H. (2010). An efficient anonymous authentication protocol for secure vehicular communication. Journal of Information Science and Engineering, 26, 785–800. Park, Y., Sur, C., Jung, C. D., & Rhee, K. H. (2010). An efficient anonymous authentication protocol for secure vehicular communication. Journal of Information Science and Engineering, 26, 785–800.
7.
Zurück zum Zitat Jung, C. D., Sur, C., Park, Y., & Rhee, K. H. (2009). A robust and efficient anonymous authentication protocol in VANETs. Journal of Communication and Networks, 11(6), 607–614.CrossRef Jung, C. D., Sur, C., Park, Y., & Rhee, K. H. (2009). A robust and efficient anonymous authentication protocol in VANETs. Journal of Communication and Networks, 11(6), 607–614.CrossRef
8.
Zurück zum Zitat Lu, R., Lin, X., Zhu, H., Ho, P. H., & Shen, X. (2008). ECPP: Efficient conditional privacy preservation protocol for secure vehicular communication. In Proceedings of IEEE Infocom. Lu, R., Lin, X., Zhu, H., Ho, P. H., & Shen, X. (2008). ECPP: Efficient conditional privacy preservation protocol for secure vehicular communication. In Proceedings of IEEE Infocom.
9.
Zurück zum Zitat Grover, J., Gaur, M. S., Laxmi, V., & Prajapati, N. K. (2011). A Sybil attack detection approach using neighboring vehicles in VANET. In International conference on security of information and networks Grover, J., Gaur, M. S., Laxmi, V., & Prajapati, N. K. (2011). A Sybil attack detection approach using neighboring vehicles in VANET. In International conference on security of information and networks
10.
Zurück zum Zitat Huang, D., Misra, S., Verma, M., & Xue, G. (2011). PACP: An efficient pseudonymous authentication-based conditional privacy protocol for VANETs. IEEE Transactions on Intelligent Transportation Systems, 12(3), 736–746.CrossRef Huang, D., Misra, S., Verma, M., & Xue, G. (2011). PACP: An efficient pseudonymous authentication-based conditional privacy protocol for VANETs. IEEE Transactions on Intelligent Transportation Systems, 12(3), 736–746.CrossRef
11.
Zurück zum Zitat Chim, T. W., Yiu, S. M., Hui, L. C. K., & Li, V. O. K. (2009). Security and privacy issues for inter-vehicle communication in VANETs. In Proceedings of 6th Lnnual IEEE communication society conference on SECON workshops. Chim, T. W., Yiu, S. M., Hui, L. C. K., & Li, V. O. K. (2009). Security and privacy issues for inter-vehicle communication in VANETs. In Proceedings of 6th Lnnual IEEE communication society conference on SECON workshops.
12.
Zurück zum Zitat Verma, K., Hasbullah, H., & Kumar, A. (2013). Prevention of DoS attacks in VANET. Wireless Personal Communications, 73(1), 95–126.CrossRef Verma, K., Hasbullah, H., & Kumar, A. (2013). Prevention of DoS attacks in VANET. Wireless Personal Communications, 73(1), 95–126.CrossRef
13.
Zurück zum Zitat Azogu, I. K., Ferreira, M. T., Larcom, J. A., & Liu, H. (2013). A new anti-jamming strategy for VANET metrics-directed security defense. In International Conference—Globecom—Vehicular netwok evolution. Azogu, I. K., Ferreira, M. T., Larcom, J. A., & Liu, H. (2013). A new anti-jamming strategy for VANET metrics-directed security defense. In International Conference—Globecom—Vehicular netwok evolution.
14.
Zurück zum Zitat Karumanchi, S., Squicciarini, A., & Lin, D. (2012). Selective and confidential message exchange in vehicular ad hoc networks. Chapter Book on Network and System Security of the Series Lecture Notes in Computer Science, 7645, 445–461. Karumanchi, S., Squicciarini, A., & Lin, D. (2012). Selective and confidential message exchange in vehicular ad hoc networks. Chapter Book on Network and System Security of the Series Lecture Notes in Computer Science, 7645, 445–461.
15.
Zurück zum Zitat Farooq, M. U., Pasha, M., Khan, K. U. R., & Atif, M. U. H. (2012). An advanced security and data integrity protocol for vehicular ad-hoc networks. Advanced Materials Research, 403–408, 994–1001. Farooq, M. U., Pasha, M., Khan, K. U. R., & Atif, M. U. H. (2012). An advanced security and data integrity protocol for vehicular ad-hoc networks. Advanced Materials Research, 403–408, 994–1001.
16.
Zurück zum Zitat Li, J., Lu, H., & Guizani, M. (2015). ACPN: A novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs. IEEE Transactions on Parallel and Distributed Systems, 26(4), 938–948.CrossRef Li, J., Lu, H., & Guizani, M. (2015). ACPN: A novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs. IEEE Transactions on Parallel and Distributed Systems, 26(4), 938–948.CrossRef
17.
Zurück zum Zitat Boneh, D., & Shacham, H. (2004). Group signatures with verifier-local revocation. In Proceedings of the 11th ACM conference on computer and communication security. Boneh, D., & Shacham, H. (2004). Group signatures with verifier-local revocation. In Proceedings of the 11th ACM conference on computer and communication security.
18.
Zurück zum Zitat Golle, P., Jakobsson, M., Juels, A., & Syverson, P. (2004). Universal reencryption for mixnets. In Proceedings of CT-RSA. Lecture notes in computer science (Vol. 2964). Golle, P., Jakobsson, M., Juels, A., & Syverson, P. (2004). Universal reencryption for mixnets. In Proceedings of CT-RSA. Lecture notes in computer science (Vol. 2964).
19.
Zurück zum Zitat Maurer, U. M., & Yacobi, Y. (1996). A non-interactive public-key distribution system. Designs, Codes, and Cryptography, 9(3), 305–316. Maurer, U. M., & Yacobi, Y. (1996). A non-interactive public-key distribution system. Designs, Codes, and Cryptography, 9(3), 305–316.
20.
Zurück zum Zitat Wasef, A., & Shen, X. S. (2009). ASIC: Aggregate signatures and certificates verification scheme for vehicular networks. In Global telecommunication conference. Wasef, A., & Shen, X. S. (2009). ASIC: Aggregate signatures and certificates verification scheme for vehicular networks. In Global telecommunication conference.
21.
Zurück zum Zitat Wasef, A., & Shen, X. (2013). EMAP: Expedite message authentication protocol for vehicular ad hoc networks. IEEE Transactions on Mobile Computing, 12(1), 78–89.CrossRef Wasef, A., & Shen, X. (2013). EMAP: Expedite message authentication protocol for vehicular ad hoc networks. IEEE Transactions on Mobile Computing, 12(1), 78–89.CrossRef
22.
Zurück zum Zitat Vijayalakshmi, V., Sathya, M., Saranya, S., & Selvaroopini, C. (2014). Survey on various mechanisms for Secure and Efficient VANET communication. In International conference on information communication and embedded systems. Vijayalakshmi, V., Sathya, M., Saranya, S., & Selvaroopini, C. (2014). Survey on various mechanisms for Secure and Efficient VANET communication. In International conference on information communication and embedded systems.
23.
Zurück zum Zitat Ying, B., Makrakis, D., & Mouftah, H. T. (2012). Privacy preserving broadcast message authentication protocol for VANETs. Journal of Network and Computer Applications, 36(5), 1352–1364.CrossRef Ying, B., Makrakis, D., & Mouftah, H. T. (2012). Privacy preserving broadcast message authentication protocol for VANETs. Journal of Network and Computer Applications, 36(5), 1352–1364.CrossRef
24.
Zurück zum Zitat Hu, C., Chim, T. W., Yiu, S. M., Hui, L. C. K., & Li, V. O. K. (2012). Efficient HMAC-based secure communication for VANETs. Computer Networks, 56(9), 2292–2303.CrossRef Hu, C., Chim, T. W., Yiu, S. M., Hui, L. C. K., & Li, V. O. K. (2012). Efficient HMAC-based secure communication for VANETs. Computer Networks, 56(9), 2292–2303.CrossRef
25.
Zurück zum Zitat Al-Qutayri, M., Yeun, C., & Al-Hawi, F. (2010.) Security and privacy of intelligent VANETs. In A.-D. Ali (Ed.), Computer and information science. Security and privacy of intelligent VANETs, Computational intelligence and modern heuristics. Rijeka: InTech. doi:10.5772/7815. Al-Qutayri, M., Yeun, C., & Al-Hawi, F. (2010.) Security and privacy of intelligent VANETs. In A.-D. Ali (Ed.), Computer and information science. Security and privacy of intelligent VANETs, Computational intelligence and modern heuristics. Rijeka: InTech. doi:10.​5772/​7815.
26.
Zurück zum Zitat Zhang, L., Wu, Q., Solanas, A., & Ferrer, J. D. (2010). A scalable robust authentication protocol for secure vehicular communication. IEEE Transactions on Vehicular Technology, 59(4), 1606–1617.CrossRef Zhang, L., Wu, Q., Solanas, A., & Ferrer, J. D. (2010). A scalable robust authentication protocol for secure vehicular communication. IEEE Transactions on Vehicular Technology, 59(4), 1606–1617.CrossRef
27.
Zurück zum Zitat Kim, J., & Song, J. (2012). A pre-authentication method for secure communication in vehicular ad hoc networks. In 8th international conference on wireless communication, networking and mobile computing. Kim, J., & Song, J. (2012). A pre-authentication method for secure communication in vehicular ad hoc networks. In 8th international conference on wireless communication, networking and mobile computing.
28.
Zurück zum Zitat Xiong, H., Guan, Z., Hu, J., & Chen, Z. (2010). Anonymous authentication protocols for vehicular ad hoc networks: An overview. In J. Sen (Ed.), Computer and information science. Applied cryptography and network security. Rijeka: InTech. doi:10.5772/34675. Xiong, H., Guan, Z., Hu, J., & Chen, Z. (2010). Anonymous authentication protocols for vehicular ad hoc networks: An overview. In J. Sen (Ed.), Computer and information science. Applied cryptography and network security. Rijeka: InTech. doi:10.​5772/​34675.
29.
Zurück zum Zitat Chim, T. W., Yiu, S. M., Hui, L. C. K., & Li, V. O. K. (2010). SPECS: Secure and privacy enhancing communication schemes for VANETs. Ad Hoc Networks, 9(2), 189–203.CrossRef Chim, T. W., Yiu, S. M., Hui, L. C. K., & Li, V. O. K. (2010). SPECS: Secure and privacy enhancing communication schemes for VANETs. Ad Hoc Networks, 9(2), 189–203.CrossRef
30.
Zurück zum Zitat Horng, S. J., Tzeng, S. F., Pan, Y., Fan, P., Wang, X., Li, T., et al. (2013). b-SPECS+: Batch verification for secure pseudonymous authentication in VANET. IEEE Transactions on Information Forensics and Security, 8(11), 1860–1875.CrossRef Horng, S. J., Tzeng, S. F., Pan, Y., Fan, P., Wang, X., Li, T., et al. (2013). b-SPECS+: Batch verification for secure pseudonymous authentication in VANET. IEEE Transactions on Information Forensics and Security, 8(11), 1860–1875.CrossRef
31.
Zurück zum Zitat Boneh, D., & Franklin, M. (2001). Identity-based encryption from the weil pairing. In Proceedings of 21st annual international cryptology conference on advanced cryptology. Boneh, D., & Franklin, M. (2001). Identity-based encryption from the weil pairing. In Proceedings of 21st annual international cryptology conference on advanced cryptology.
32.
Zurück zum Zitat Maity, B. B .N. S., & Hansdah, R .C. (2013) . A protocol for authentication with multiple levels of anonymity (AMLA) in VANETs. In 27th international conference on advanced information networking and applications workshops. Maity, B. B .N. S., & Hansdah, R .C. (2013) . A protocol for authentication with multiple levels of anonymity (AMLA) in VANETs. In 27th international conference on advanced information networking and applications workshops.
33.
Zurück zum Zitat Liu, B., & Zhang, L. (2013). An improved identity-based batch verification scheme for VANETs. In 5th international conference on intelligent networking and collaborative systems Liu, B., & Zhang, L. (2013). An improved identity-based batch verification scheme for VANETs. In 5th international conference on intelligent networking and collaborative systems
34.
Zurück zum Zitat Chim, T. W., Yiu, S. M., Hui, L. C. K., & Li, V. O. K. (2012). MLAS: Multiple level authentication scheme for VANETs. Ad Hoc Networks, 10(7), 1445–1456.CrossRef Chim, T. W., Yiu, S. M., Hui, L. C. K., & Li, V. O. K. (2012). MLAS: Multiple level authentication scheme for VANETs. Ad Hoc Networks, 10(7), 1445–1456.CrossRef
35.
Zurück zum Zitat Jesudoss, A., Raja, S. V. K., & Park, S. H. (2013). GRAS: A group reliant authentication scheme for V2V communication in VANET. Systemics, Cybernetics and Informatics, 11(6), 47–52. Jesudoss, A., Raja, S. V. K., & Park, S. H. (2013). GRAS: A group reliant authentication scheme for V2V communication in VANET. Systemics, Cybernetics and Informatics, 11(6), 47–52.
36.
Zurück zum Zitat Riley, M., Akkaya, K., & Fong, K. (2010). A survey of authentication schemes for vehicular ad hoc networks. Security and Communication Networks, 4(10), 1137–1152.CrossRef Riley, M., Akkaya, K., & Fong, K. (2010). A survey of authentication schemes for vehicular ad hoc networks. Security and Communication Networks, 4(10), 1137–1152.CrossRef
37.
Zurück zum Zitat Zhang, J., Zhen, W., & Xu, M. (2013). An efficient privacy-preserving authentication protocol in VANETs. In 9th international conference on mobile ad-hoc and sensor networks. Zhang, J., Zhen, W., & Xu, M. (2013). An efficient privacy-preserving authentication protocol in VANETs. In 9th international conference on mobile ad-hoc and sensor networks.
38.
Zurück zum Zitat Liu, J. K., Au, M. H., & Susilo, W. (2007). Self-generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model. In 2nd ACM symposium on Information, computer and communications security. New York: ACM. Liu, J. K., Au, M. H., & Susilo, W. (2007). Self-generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model. In 2nd ACM symposium on Information, computer and communications security. New York: ACM.
39.
Zurück zum Zitat Darrel, H., & Scott, V. (2003). Guide to elliptic curve cryptography. New York: Springer Professional Computing Publishing Company Incorporated. Darrel, H., & Scott, V. (2003). Guide to elliptic curve cryptography. New York: Springer Professional Computing Publishing Company Incorporated.
40.
Zurück zum Zitat Aboobaker, A. K. K. (2010). Performance analysis of authentication protocols in vehicular ad hoc networks (VANET). Technical report, Department of Mathematics, Royal Holloway, University of London, Egham, England. Aboobaker, A. K. K. (2010). Performance analysis of authentication protocols in vehicular ad hoc networks (VANET). Technical report, Department of Mathematics, Royal Holloway, University of London, Egham, England.
41.
Zurück zum Zitat Raya, M., & Hubaux, J. P. (2005). The security of vehicular ad hoc networks. In Proceedings of the 3rd ACM workshop on security of ad hoc and sensor networks. Raya, M., & Hubaux, J. P. (2005). The security of vehicular ad hoc networks. In Proceedings of the 3rd ACM workshop on security of ad hoc and sensor networks.
43.
Zurück zum Zitat Al-kahtani, M. S. (2012). Survey on security attacks in Vehicular ad hoc networks (VANETs). In 6th international conference on signal processing and communication systems. Al-kahtani, M. S. (2012). Survey on security attacks in Vehicular ad hoc networks (VANETs). In 6th international conference on signal processing and communication systems.
Metadaten
Titel
Secure and distributed certification system architecture for safety message authentication in VANET
verfasst von
Tiziri Oulhaci
Mawloud Omar
Fatiha Harzine
Ines Harfi
Publikationsdatum
25.07.2016
Verlag
Springer US
Erschienen in
Telecommunication Systems / Ausgabe 4/2017
Print ISSN: 1018-4864
Elektronische ISSN: 1572-9451
DOI
https://doi.org/10.1007/s11235-016-0200-4

Weitere Artikel der Ausgabe 4/2017

Telecommunication Systems 4/2017 Zur Ausgabe

Neuer Inhalt