Abstract
Road users are now able to retrieve safety information, computing task results and subscribing content through various vehicular ad hoc network (VANET) services. Most commonly used services are safety beacon, cloud computation, and content subscription. Road users concern more about data security than ever. Privacy preserving authentication (PPA) is one main mechanism to secure inter-vehicle messages. However, for historical reasons, PPA for three services are different and therefore hard to be unified and not lightweight enough. To improve the flexibility and efficiency of PPA for various VANET services, it is necessary to securely authenticate messages preserving privacy for individual service, but also to unify PPA processes of various services in one vehicle. Here we propose an Efficient Pseudonymous-based Inter-Vehicle Authentication Framework for various VANET services. Our novel framework employs three methods. Method No. 1 consists of a decentralized certificate authority (CA), which allows vehicles to communicate only if vehicles registering themselves. Method No. 2 adopts a three-stage mutual authenticating process, which adapts to different communicating models in various services. Method No. 3 we design a universal basic module that requires only lightweight hashing and MAC operations to accomplish the signing and verifying processes. To analyze the security performance of our EPAF, we use automated tool under symbolic approach. Our results strongly suggest that EPAF is secure, robust and adaptable in vehicular safety, as well as in content and cloud computation services. To analyze the performance of EPAF, we calculate benchmarks and simulate the network. Our results strongly suggest that EPAF reduces computation cost by 370–3500 times, decreases communication overhead by 45.98%–75.53% and CA need not to manage CRL compared with classical schemes. In conclusion our framework provides insights into how data privacy can be simultaneously protected using our EPAF, while also improving communication and computing speed even in high traffic density.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Su, Z., Hui, Y., Yang, Q.: The next generation vehicular networks: a content-centric framework. IEEE Wirel. Commun. 24(1), 60–66 (2007)
Harding, J., Powell, G., Yoon, R., Fikentscher, J., Doyle, C., Sade, D., Lukuc, M., Simons, J., Wang, J.: Vehicle-to-vehicle communications: readiness of V2V technology for application. NHTSA, Washington, DC, Technical report, DOT-HS-812-014 (2014)
Chim, T.W., Yiu, S.M., Hui, L.C., Li, V.O.: VSPN: VANET-based secure and privacy-preserving navigation. IEEE Trans. Comput. 63(2), 510–512 (2014)
Wang, M., Liu, D., Zhu, L., Xu, Y., Wang, F.: LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication. Computing 98, 1–24 (2014)
Raya, M., Hubaux, J.-P.: Securing vehicular Ad hoc networks. J. Comput. Secur. 15(1), 39–68 (2007)
Huang, C., Lu, R., Zhu, H., Hu, H., Lin, X.: PTVC: achieving privacy-preserving trust-based verifiable vehicular cloud computing. In: 2016 IEEE Global Communications Conference (GLOBECOM), Washington, DC, pp. 1–6 (2016)
Lu, R., Lin, X., Zhu, H., Ho, P.-H., Shen, X.: ECPP: efficient conditional privacy preservation protocol for secure vehicular communications. In: Proceedings of the INFOCOM 2008, pp. 1903–1911 (2008)
Lin, X., Sun, X., Ho, P.-H., Shen, X.: GSIS: a secure and privacy-preserving protocol for vehicular communications. IEEE Trans. Veh. Technol. 56(6), 3442–3456 (2007)
Zhang, L., Wu, Q., Solanas, A., Josep, D.-F.: A scalable robust authentication protocol for secure vehicular communications. IEEE Trans. Veh. Technol. 59(4), 1606–1617 (2010)
Studer, A., Bai, F., Bellur, B., Perrig, A.: Flexible, extensible, and efficient VANET authentication. J. Commun. Netw. 11, 589–598 (2009)
Bellare, M., Canetti, R., Krawczyk, H.: Message authentication using hash functions: the HMAC construction. RSA Laboratories’ CryptoBytes 2(1), 12–15 (1996)
Scott, M.: Efficient Implementation of Cryptographic Pairings. http://www.pairing-conference.org/2007/invited/Scott slide.pdf
Keränen, A., Ott, J., Kärkkäinen, T.: The ONE simulator for DTN protocol evaluation. In: Proceedings of the 2nd International Conference on Simulation Tools and Techniques (2009)
Wang, F., Xu, Y., Zhang, H., Zhang, Y., Zhu, L.: 2FLIP: a two-factor lightweight privacy-preserving authentication scheme for VANET. IEEE Trans. Veh. Technol. 65(2), 896–911 (2016)
Horng, S.J., Tzeng, S.F., Li, T., Wang, X., Huang, P.H., Khan, M.K.: Enhancing security and privacy for identity-based batch verification scheme in VANET. IEEE Trans. Veh. Technol. 66(4), 3235–3248 (2017)
Canetti, R., Herzog, J.: Universally composable symbolic analysis of mutual authentication and key-exchange protocols. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 380–403. Springer, Heidelberg (2006). https://doi.org/10.1007/11681878_20
Zhang, Z., Zhu, L., Liao, L., Wang, M.: Computationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairings. Inf. Sci. 276(20), 93–112 (2012)
Du, X., Chen, H.H.: Security in wireless sensor networks. IEEE Wirel. Commun. Mag. 15(4), 60–66 (2008)
Du, X., Guizani, M., Xiao, Y., Chen, H.H.: Secure and efficient time synchronization in heterogeneous sensor networks. IEEE Trans. Vehi. Technol. 57(4), 2387–2394 (2008)
Du, X., Xiao, Y., Guizani, M., Chen, H.H.: An effective key management scheme for heterogeneous sensor networks. Ad Hoc Netw. 5(1), 24–34 (2007)
Xiao, Y., Rayi, V., Sun, B., Du, X., Hu, F., Galloway, M.: A survey of key management schemes in wireless sensor networks. J. Comput. Commun. 30(11–12), 2314–2341 (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Wang, F., Du, Y., Xu, Y., Cheng, T., Pan, X. (2018). EPAF: An Efficient Pseudonymous-Based Inter-vehicle Authentication Framework for VANET. In: Zhu, L., Zhong, S. (eds) Mobile Ad-hoc and Sensor Networks. MSN 2017. Communications in Computer and Information Science, vol 747. Springer, Singapore. https://doi.org/10.1007/978-981-10-8890-2_18
Download citation
DOI: https://doi.org/10.1007/978-981-10-8890-2_18
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8889-6
Online ISBN: 978-981-10-8890-2
eBook Packages: Computer ScienceComputer Science (R0)