Multimedia Tools and Applications

, Volume 75, Issue 24, pp 17689–17709 | Cite as

An efficient anonymous authentication protocol using batch operations for VANETs

  • Yawei Liu
  • Zongjian He
  • Shengjie Zhao
  • Liangmin Wang


Security and privacy are both fundamental requirements of vehicular networking applications. Existing anonymous authentication protocols entail serious performance issues due to serialized verification operations. This paper presents an efficient anonymous authentication protocol based on signature with message recovery. Different from existing solutions, our proposed protocol authenticates multiple signatures using batch operations. Therefore, our solution can remarkably reduce the total authentication time. Meanwhile the transmission overhead can also be considerably decreased due to the combination of signature and message. We also prove the unforgeability of our proposed protocol in the random oracle model. Through extensive analysis and simulations, we show that the proposed protocol outperforms existing ones in terms of communication and computation efficiency.


Vehicular ad hoc networks Signature with message recovery Batch verification Privacy preservation 



The work in this paper was supported by the National Natural Science Foundation of China (No.61472001) and the project of academic leaders funding of Anhui University (NO.02303203).


  1. 1.
    Barreto PSLM, Galbraith SD, Ó’héigeartaigh C, Scott M (2007) Efficient pairing computation on supersingular abelian varieties. Des Codes Crypt 42(3):239–271MathSciNetCrossRefMATHGoogle Scholar
  2. 2.
    Barreto PSLM, Libert B, Mccullagh N, Quisquater J (2005) Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In Proc. Adv. Cryptology-Asiacrypt, ser. LNCS, vol. 3788. Springer-Verlag, New York, pp. 515–532Google Scholar
  3. 3.
    Boneh D, Gentry C, Lynn B, Shacham H (2003) Aggregate and verifiably encrypted signatures from bilinear maps. In: Proceedings of Eurocrypt, LNCS, Vol. 2656. pp. 416–432Google Scholar
  4. 4.
    Boneh D, Lynn B, Shacham H (2001) Short signatures from the Weil pairing. In: Proceedings of Asiacrypt, Vol. 2248. pp. 514–532Google Scholar
  5. 5.
    Chen W, Guha RK, Kwon TJ, Lee J, Hsu YY (2011) A survey and challenges in routing and data dissemination in vehicular ad hoc networks. Wirel Commun Mob Comput 11(7):787–795CrossRefGoogle Scholar
  6. 6.
    Chim TW, Yiu SM, Hui LCK, Li OK (2011) SPECS: Secure and privacy enhancing communications schemes for VANETs. Ad Hoc Netw 9(2):189–203CrossRefGoogle Scholar
  7. 7.
    Chim TW, Yiu SM, Hui CK, Li OK (2014) VSPN: VANET-based secure and privacy-preserving navigation. IEEE Trans Comput 63(2):510–524MathSciNetCrossRefGoogle Scholar
  8. 8.
    Jiang D, Taliwal V, Meier A et al (2006) Design of 5.9 GHz DSRC-based vehicular safety communication. IEEE Wireless Communication 13(5):36–43Google Scholar
  9. 9.
    Engoulou RG, Bellaïche M, Pierre S, Quintero A (2014) VANET security surveys. Comput Commun 44:1–13CrossRefGoogle Scholar
  10. 10.
    Hartenstein H, Laberteaux KP (2008) A tutorial survey on vehicular ad hoc networks. IEEE Commun Mag 46(6):164–171CrossRefGoogle Scholar
  11. 11.
    He D, Zeadally S, Xu B, Huang X (2015) An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad-hoc networks. IEEE Trans Inf Forensics Secur 10(12):2681–2691CrossRefGoogle Scholar
  12. 12.
    Horng SJ, Tzeng SF, Pan Y et al (2013) b-SPECS+: batch verification for secure pseudonymous authentication in VANET. IEEE Trans Inf Forensics Secur 8(11):1860–1875CrossRefGoogle Scholar
  13. 13.
    Huang JL, Yeh LY, Chien HY (2011) ABAKA: an anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks. IEEE Trans Veh Technol 60(1):248–262CrossRefGoogle Scholar
  14. 14.
    Islam SK, Khan MK, Al‐Khouri AM (2015) Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing. Secur Commun Netw 8(13):2214–2231CrossRefGoogle Scholar
  15. 15.
    Jiang D, Wang Y, Yao C, Han Y (2015) An effective dynamic spectrum access algorithm for multi-hop cognitive wireless networks. Comput Netw 84(19):1–16CrossRefGoogle Scholar
  16. 16.
    Khan MK (2009) Fingerprint biometric-based selfauthentication and deniable authentication schemes for the electronic world. IETE Tech Rev 26(3):191–195CrossRefGoogle Scholar
  17. 17.
    Khan MK, Zhang J (2006) An efficient and practical fingerprint-based remote user authentication scheme with smart cards. Lect Notes Comput Sci 3903:260–268Google Scholar
  18. 18.
    Khan MK, Zhang J, Tian L (2004) Protecting biometric data for personal identification, vol 3383, Sinobiometrics’04, lecture notes in computer science. Springer, Germany, pp 629–638Google Scholar
  19. 19.
    Liu J, Wan J, Wang Q, Deng P, Zhou K, Qiao Y (2015) A survey on position-based routing for vehicular ad hoc networks. Telecommun Syst. doi: 10.1007/s11235-015-9979-7 Google Scholar
  20. 20.
    Liu Y, Wang L, Chen HH (2015) Message authentication using proxy vehicles in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology 64(8):3697–3710Google Scholar
  21. 21.
    MIRACL Cryptographic Library: Multiprecision Integer and Rational Arithmetic C/C++ Library (2012) [Online]. Available:
  22. 22.
    Miyaji A, Nakabayashi M, Takano S (2001) New explicit conditions of elliptic curve traces for FR-reduction. IEICE Trans Fundam Electron Commun Comput Sci 84(5):1234–1243MATHGoogle Scholar
  23. 23.
    Pointcheval D, Stern J (2000) Security arguments for digital signatures and blind signatures. J Cryptol 13(3):361–396CrossRefMATHGoogle Scholar
  24. 24.
    Raya M, Hubaux JP (2007) Securing vehicular ad hoc networks. J Comput Secur Spec Issue Secur Ad Hoc Sens Netw 15(1):39–68Google Scholar
  25. 25.
    Ren K, Lou W, Zhang Y (2009) Multi-user broadcast authentication in wireless sensor networks. IEEE Trans Veh Technol 58(8):4554–4564CrossRefGoogle Scholar
  26. 26.
    Shim KA (2012) CPAS: an efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Trans Veh Technol 61(4):1874–1883CrossRefGoogle Scholar
  27. 27.
    Shim KA, Lee YR, Park CM (2013) EIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks. Ad Hoc Netw 11(1):182–189CrossRefGoogle Scholar
  28. 28.
    Lin X, Lu R, Zhang C, Zhu H, Ho PH, Shen X (2008) Security in vehicular ad hoc networks. IEEE Communications Magazine 46(4):88–95Google Scholar
  29. 29.
    Tso R, Gu C, Okamoto T, Okamoto E (2007) Efficient ID-based digital signatures with message recovery. In: Proceedings of Cryptology and Network Security, Springer-Verlag, Vol. 4856. pp. 47–59Google Scholar
  30. 30.
    Tzeng SF, Horng SJ, Li T, Wang X, Huang P, Khan MK (2015) Enhancing security and privacy for identity-based batch verification scheme in VANET. IEEE Trans Veh Technol. doi: 10.1109/TVT.2015.2406877 Google Scholar
  31. 31.
    Wan J, Zhang D, Zhao S, Yang L, Lloret J (2014) Context-aware vehicular cyber-physical systems with cloud support: architecture, challenges and solutions. IEEE Commun Mag 52(8):106–113CrossRefGoogle Scholar
  32. 32.
    Yang J, Zhou J, Lv Z, Wei W (2015) A real-time monitoring system of industry carbon monoxide based on wireless sensor networks[J]. Sensors 15(11):29535–29546CrossRefGoogle Scholar
  33. 33.
    Zhang D, Chen M, Guizani M, Xiong H (2014) Mobility prediction in telecom cloud using mobile calls. IEEE Wirel Commun 21(1):26–32CrossRefGoogle Scholar
  34. 34.
    Zhang C, Lu R, Lin X, Ho P, Shen X (2008) An efficient identity-based batch verification scheme for vehicular sensor networks. In: Proc. IEEE INFOCOM, Apr. 2008, pp. 816–824Google Scholar
  35. 35.
    Zhang D, Zhang D, Xiong H, Hsu CH, Vasilakos AV (2014) BASA: building mobile ad-hoc social networks on top of android[J]. IEEE Netw 28(1):4–9CrossRefGoogle Scholar
  36. 36.
    Zhang D, Zhang D, Xiong H, Yang LT, Gauthier V (2015) NextCell: predicting location using social interplay from cell phone traces. IEEE Trans Comput 64(2):452–463MathSciNetCrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  • Yawei Liu
    • 1
  • Zongjian He
    • 2
  • Shengjie Zhao
    • 3
  • Liangmin Wang
    • 4
    • 5
  1. 1.College of Computer Science and TechnologyAnhui UniversityHefeiChina
  2. 2.School of Software EngineeringTongji UniversityShanghaiChina
  3. 3.The Key Lab of Embedded System and Service Computing, Ministry of EducationTongji UniversityShanghaiChina
  4. 4.Co-Innovation Centre of Information Support & Assurance TechnologyAnhui UniversityHefeiChina
  5. 5.Department of Internet of Things EngineeringJiangsu UniversityZhenjiangChina

Personalised recommendations