Advertisement

Fast Confidentiality-Preserving Authentication for Vehicular Ad Hoc Networks

  • Siavash Mirzaee
  • Letian Jiang (蒋乐天)Email author
Article
  • 9 Downloads

Abstract

This paper studies the existing problems of message authentication protocols in vehicular ad hoc networks (VANETs) due to their significance in the future of commuting and transportation. Our contribution has been devoted to implementing a new protocol for VANETs so that inherent security problems in past works are resolved. Exclusive security measures have been considered for the system which protects the users against threat of any attack. The new protocol shows a great hardness guaranteed by certificate based 80 bit security which assures messages to remain confidential in any time. Also, new unprecedented features like V2X which improves system performance effectively have been instantiated. The simulation results indicate that message signature generation and verification both take place in much less time than present comparable rival protocols.

Key words

message authentication protocol vehicular ad hoc networks (VANETs) signature generation and verification 

CLC number

TN 918 

Document code

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    LIU J K, YUEN T H, AU M H, et al. Improvements on an authentication scheme for vehicular sensor networks [J]. Expert Systems with Applications, 2014, 41(5): 2559–2564.Google Scholar
  2. [2]
    DE FUENTES J M, GONZÁLEZ-TABLAS A I, RIBAGORDA A. Overview of security issues in vehicular ad-hoc networks [C]//Handbook of Research on Mobility and Computing. [s.l.]: IGI Global, 2011: 894–911.Google Scholar
  3. [3]
    GIORDANO S. Mobile ad hoc networks [C]//Handbook of Wireless Networks and Mobile Computing. New York, USA: John Wiley & Sons, 2002: 325–346.Google Scholar
  4. [4]
    RAVI S, RAGHUNATHAN A, CHAKRADHAR S. Tamper resistance mechanisms for secure embedded systems [C]//Proceedings of the 17th International Conference on VLSI Design. [s.l.]: IEEE, 2004: 605–611.Google Scholar
  5. [5]
    KERRY C F, GALLAGHER P D. Digital signature standard (DSS): FIPS 186–4 [S]. Gaithersburg, USA: The Federal Information Processing Standards Publication, 2013.Google Scholar
  6. [6]
    GOLDWASSER S, MICALI S, RIVEST R L. A digital signature scheme secure against adaptive chosenmessage attacks [J]. SIAM Journal on Computing, 1988, 17(2): 281–308.MathSciNetzbMATHGoogle Scholar
  7. [7]
    BOLDYREVA A, GOYAL V, KUMAR V. Identity-based encryption with efficient revocation [C]//Proceedings of the 14th ACM Conference on Computer and Communications Security. [s.l.]: ACM, 2008: 417–426.Google Scholar
  8. [8]
    WASEF A, SHEN X. EDR: Efficient decentralized revocation protocol for vehicular ad hoc networks [J]. IEEE Transactions on Vehicular Technology, 2009, 58(9): 5214–5224.Google Scholar
  9. [9]
    DÖTZER F. Privacy issues in vehicular ad hoc networks [C]//International Workshop on Privacy Enhancing Technologies. Berlln Heldelberg, Germany: Spnnger-Verlag, 2005: 197–209.Google Scholar
  10. [10]
    RAYA M, HUBAUX J P. Securing vehicular ad hoc networks [J]. Journal of Computer Security, 2007, 15(1): 39–68.Google Scholar
  11. [11]
    FERGUSON N, SCHNEIER B, KOHNO T. Cryprography engineering: Design principles and practical applications [M]. New York, USA: John Wiley & Sons, 2011.Google Scholar
  12. [12]
    ZHU H J, LU R X, SHEN X M, et al. Security in service-oriented vehicular networks [J]. IEEE Wireless Communications, 2009, 16(4): 16–22.Google Scholar
  13. [13]
    LIU Y L, WANG L M, CHEN H H. Message authentication using proxy vehicles in vehicular ad hoc networks [J]. IEEE Transactions on Vehicular Technolology, 2015, 64(8): 3697–3710.Google Scholar
  14. [14]
    SHAMIR A. Identity-based cryptosystems and signature schemes [C]//Advances in Cryptology, LNCS 196. Berlln Heldelberg, Germany: Spnnger-Verlag, 1985: 47–53.Google Scholar
  15. [15]
    KATZ J. Digital signatures [M]. New York, USA: Springer Science & Business Media, 2010.zbMATHGoogle Scholar
  16. [16]
    CHUANG M C, LEE J F. TEAM: Trust-extended authentication mechanism for vehicular ad hoc networks [J]. IEEE Systems Journal, 2014, 8(3): 749–758.Google Scholar
  17. [17]
    LIN X D, LI X. Achieving efficient cooperative message authentication in vehicular ad hoc networks [J]. IEEE Transactions on Vehicular Technology, 2013, 62(7): 3339–3348.Google Scholar
  18. [18]
    ZHU X Y, JIANG S R, WANG L M, et al. Efficient privacy-preserving authentication for vehicular ad hoc networks [J]. IEEE Transactions on Vehicular Technology, 2014, 63(2): 907–919.Google Scholar
  19. [19]
    SHIM K A. Reconstruction of a secure authentication scheme for vehicular ad hoc networks using a binary authentication tree [J]. IEEE Transactions on Wireless Communications, 2013, 12(11): 5386–5393.Google Scholar
  20. [20]
    HE D B, ZEADALLY S, XU B W, et al. An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks [J]. IEEE Transactions on Information Forensics and Security, 2015, 10(12): 2681–2691.Google Scholar
  21. [21]
    LO N W, TSAI J L. An efficient conditional privacypreserving authentication scheme for vehicular sensor networks without pairings [J]. IEEE Transactions on Intelligent Transportation Systems, 2016, 17(5): 1319–1328.Google Scholar
  22. [22]
    MISHRA A. Security and quality of service in ad hoc wireless networks [M]. Cambridge, UK: Cambridge University Press, 2008.Google Scholar
  23. [23]
    CHAUM D L. Untraceable electronic mail, return addresses, and digital pseudonyms [J]. Communications of the ACM, 1981, 24(5): 84–90.Google Scholar
  24. [24]
    Intelligent Transportation Systems Committee. IEEE trial-use standard for wireless access in vehicular environments: Security services for applications and management messages: IEEE Std 1609.2 [S]. New York, USA: IEEE Vehicular Technology Society, 2006.Google Scholar
  25. [25]
    HOFFSTEIN J, PIPHER J C, SILVERMAN J H. An introduction to mathematical cryptography [M]. New York, USA: Springer Science & Business Media, 2008.zbMATHGoogle Scholar

Copyright information

© Shanghai Jiaotong University and Springer-Verlag GmbH Germany, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Department of Electronic EngineeringShanghai Jiao Tong UniversityShanghaiChina

Personalised recommendations