Skip to main content

SLIM: Secure and Lightweight Identity Management in VANETs with Minimum Infrastructure Reliance

  • Conference paper
  • First Online:

Abstract

Vehicular Ad-hoc Networks (VANETs) show a promising future of automobile technology as it enables vehicles to dynamically form networks for vehicle-to-vehicle (V2V) communication. For vehicles to securely and privately communicate with each other in VANETs, various privacy-preserving authentication protocols have been proposed. Most of the existing approaches assume the existence of Road-Side Units (RSUs) to serve as the trusted party during the authentication. However, building RSUs is costly and may not be able to capture the speed of the deployment of the VANETs in the near future. Aiming at minimizing the reliance on the infrastructure support, we propose a Secure and Lightweight Identity Management (SLIM) mechanism for vehicle-to-vehicle communications. Our approach is built upon self-organized groups of vehicles which take turns to serve as captain authentication unit to provide temporary local identities for member vehicles. While ensuring the vehicles’ identities are verifiable to each other, we also prevent any vehicle in VANETs including the captain authentication unit from seeing the true identities of other vehicles. The proposed authentication protocols leverage the public key infrastructure in a way that the key generation workload is distributed over time and hence achieve authentication efficiency during the V2V communication. Compared to the previous related work, the proposed SLIM mechanism is more secure in that it can defend more types of attacks in VANETs, and is more efficient in that it requires much shorter response time for identity verification between vehicles.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   143.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Di Crescenzo, G., Katz, J., Ostrovsky, R., Smith, A.: Efficient and non-interactive non-malleable commitment. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 40–59. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-44987-6_4

    Chapter  Google Scholar 

  2. Festag, A., Noecker, G., Strassberger, M., Lübke, A., Bochow, B., Torrent-Moreno, M., Schnaufer, S., Eigner, R., Catrinescu, C., Kunisch, J.: Now-network on wheels: project objectives, technology and achievements. In: Proceedings of 6th International Workshop on Intelligent Transportations (WIT), Hamburg, Germany (2008)

    Google Scholar 

  3. Fischlin, M., Fischlin, R.: Efficient non-malleable commitment schemes. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 413–431. Springer, Heidelberg (2000). https://doi.org/10.1007/3-540-44598-6_26

    Chapter  MATH  Google Scholar 

  4. Fischlin, M., Fischlin, R.: Efficient non-malleable commitment schemes. J. Cryptol. 24(1), 203–244 (2011)

    Article  MathSciNet  Google Scholar 

  5. Hao, Y., Yu, C., Zhou, C., Song, W.: A distributed key management framework with cooperative message authentication in VANETs. IEEE J. Sel. Areas Commun. 29(3), 616–629 (2011)

    Article  Google Scholar 

  6. Harsch, C., Festag, A., Papadimitratos, P.: Secure position-based routing for VANETs. In: Vehicular Technology Conference, pp. 26–30. IEEE (2007)

    Google Scholar 

  7. Hasrouny, H., Bassil, C., Samhat, A.E., Laouiti, A.: Group-based authentication in V2V communications. In: Digital Information and Communication Technology and its Applications (DICTAP), pp. 173–177. IEEE (2015)

    Google Scholar 

  8. Jiang, W., Lin, D., Li, F., Bertino, E.: No one can track you: randomized authentication in vehicular ad-hoc networks. In: IEEE International Conference on Pervasive Computing and Communications (PerCom). IEEE (2017)

    Google Scholar 

  9. Jung, C.D., Sur, C., Park, Y., Rhee, K.-H.: A robust conditional privacy-preserving authentication protocol in VANET. In: Schmidt, A.U., Lian, S. (eds.) MobiSec 2009. LNICST, vol. 17, pp. 35–45. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-04434-2_4

    Chapter  MATH  Google Scholar 

  10. Li, J., Lu, H., Guizani, M.: ACPN: a novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs. IEEE Trans. Parallel Distrib. Syst. 26(4), 938–948 (2015)

    Article  Google Scholar 

  11. Lin, D., Kang, J., Squicciarini, A., Wu, Y., Gurung, S., Tonguz, O.: MoZo: a moving zone based routing protocol using pure V2V communication in VANETs. IEEE Trans. Mob. Comput. PP(99), 1 (2016)

    Google Scholar 

  12. Lin, D., Bertino, E., Cheng, R., Prabhakar, S.: Location privacy in moving-object environments. Trans. Data Priv. 2(1), 21–46 (2009)

    MathSciNet  Google Scholar 

  13. Lin, X., Sun, X., Ho, P.H., Shen, X.: GSIS: a secure and privacy-preserving protocol for vehicular communications. IEEE Trans. Veh. Technol. 56(6), 3442–3456 (2007)

    Article  Google Scholar 

  14. Lu, R., Lin, X., Zhu, H., Ho, P.H., Shen, X.: ECPP: efficient conditional privacy preservation protocol for secure vehicular communications. In: Proceedings of IEEE Conference on Computer Communications, pp. 1229–1237 (2008)

    Google Scholar 

  15. Mohanty, S., Jena, D., Panigrahy, S.: A Secure RSU-Aided Aggregation and Batch-Verification Scheme for Vehicular Networks (2012)

    Google Scholar 

  16. Papadimitratos, P., Hubaux, J.: Report on the “secure vehicular communications: results and challenges ahead” workshop. IEEE Commun. Mag. 12(2), 53–64 (2008)

    Article  Google Scholar 

  17. Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129–140. Springer, Heidelberg (1992). https://doi.org/10.1007/3-540-46766-1_9

    Chapter  Google Scholar 

  18. Rajput, U., Abbas, F., Oh, H.: A hierarchical privacy preserving pseudonymous authentication protocol for VANET. IEEE Access 4, 7770–7784 (2016)

    Article  Google Scholar 

  19. Raya, M., Hubaux, J.P.: Securing vehicular ad hoc networks. J. Comput. Secur. 15, 39–68 (2007)

    Article  Google Scholar 

  20. Raya, M., Jungels, D., Papadimitratos, P., Aad, I., Hubaux, J.P.: Certificate revocation in vehicular networks. Laboratory for Computer Communications and Applications (LCA) School of Computer and Communication Sciences, EPFL (2006)

    Google Scholar 

  21. Shim, K.A.: CPAS: an efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Trans. Veh. Technol. 61, 1874–1883 (2012)

    Article  Google Scholar 

  22. Squicciarini, A., Lin, D., Mancarella, A.: PAIM: peer-based automobile identity management in vehicular ad-hoc network. In: 2011 IEEE 35th Annual Computer Software and Applications Conference (COMPSAC), pp. 263–272. IEEE (2011)

    Google Scholar 

  23. Sun, J., Zhang, C., Zhang, Y., Fang, Y.: An identity-based security system for user privacy in vehicular ad hoc networks. IEEE Trans. Parallel Distrib. Syst. 21(9), 1227–1239 (2010)

    Article  Google Scholar 

  24. Tan, Z.: A lightweight conditional privacy-preserving authentication and access control scheme for pervasive computing environments. J. Netw. Comput. Appl. 35(6), 1839–1846 (2012)

    Article  Google Scholar 

  25. Wang, F., Xu, Y., Zhang, H., Zhang, Y., Zhu, L.: 2FLIP: a two-factor lightweight privacy-preserving authentication scheme for VANET. IEEE Trans. Veh. Technol. 65(2), 896–911 (2016)

    Article  Google Scholar 

  26. Wang, Y., Zhong, H., Xu, Y., Cui, J.: ECPB: efficient conditional privacy-preserving authentication scheme supporting batch verification for VANETs. IJ Netw. Secur. 18(2), 374–382 (2016)

    Google Scholar 

  27. Whyte, W., Weimerskirch, A., Kumar, V., Hehn, T.: A security credential management system for V2V communications. In: 2013 IEEE Vehicular Networking Conference (VNC), pp. 1–8. IEEE (2013)

    Google Scholar 

  28. Yeh, L., Chen, Y., Huang, J.: PAACP: a portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks. Comput. Commun. 34(3), 447–456 (2011)

    Article  Google Scholar 

  29. Zeng, S., Huang, Y., Liu, X.: Privacy-preserving communication for VANETs with conditionally anonymous ring signature. Int. J. Netw. Secur. 17(2), 135–141 (2015)

    Google Scholar 

  30. Zhang, C., Ho, P.H., Tapolcai, J.: On batch verification with group testing for vehicular communications. Wirel. Netw. 17(8), 1851–1865 (2011)

    Article  Google Scholar 

Download references

Acknowledgement

This work is partially supported by National Science Foundation under the project DGE-1433659.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dan Lin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kang, J., Elmehdwi, Y., Lin, D. (2018). SLIM: Secure and Lightweight Identity Management in VANETs with Minimum Infrastructure Reliance. In: Lin, X., Ghorbani, A., Ren, K., Zhu, S., Zhang, A. (eds) Security and Privacy in Communication Networks. SecureComm 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 238. Springer, Cham. https://doi.org/10.1007/978-3-319-78813-5_45

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-78813-5_45

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-78812-8

  • Online ISBN: 978-3-319-78813-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics