DOI QR코드

DOI QR Code

차량 네트워크에서 강한 익명성이 지원되는 인증 프로토콜을 위한 확률론적 접근방식

A Probabilistic Approach for Robust Anonymous Authentication Protocol in VANETs

  • Kim, Tae-Yeon (Department of Computer Science & Information Communication, Seonam University) ;
  • An, Do-Sik (Division of Computer Science & Engineering(CAIIT), Chonbuk National University) ;
  • Cho, Gi-Hwan (Division of Computer Science & Engineering(CAIIT), Chonbuk National University)
  • 투고 : 2013.06.20
  • 심사 : 2013.07.31
  • 발행 : 2013.10.31

초록

차량애드혹네트워크(VANET: Vehicular Ad-hoc Network)는 차량 간 통신을 통하여 운전자의 안전을 향상시키는 응용으로 많은 관심을 받고 있다. 이러한 VANET의 활성화를 위해서는 프라이버시가 보장되는 상호 인증이 보장되어야 한다. 기존 연구에서는 그룹 기반 인증 프로토콜들이 제안되었다. 그러나 키 그룹의 반복사용으로 인한 ID노출과 RSU(Road side Unit)의 DoS의 공격 위험에 대한 문제가 고려되지 않았다. 본 논문에서는 강한 익명성이 지원되는 인증 프로토콜을 위한 확률론적 접근방식을 제안한다. VANET 환경에서 제안된 구조를 몇 가지의 조건 하에서 성능을 평가하여 제안한 구조가 프라이버시를 향상시키는데 더 효율적인 방식임을 밝힌다.

VANET(Vehicular Ad-hoc Network) is getting attention as an application to improve driver safety through inter-vehicle communication. For activation of VANET, privacy-preserving mutual authentication has to be guaranteed. In previous works, authors proposed various group-based authentication protocols. However, risks on ID exposure due to repeated use of group key and RSU(Road Side Unit) DoS attack were not considered. In this paper, we propose a probabilistic approach for robust anonymous authentication protocol. We evaluated our proposed method in a sets of criteria in VANET and verified it is an efficient solution for enhancing privacy.

키워드

참고문헌

  1. Y. Hao, T. Han, and Y. Cheng, "A cooperative message authentication protocol in VANETs," in Proceeding of GLOBECOM, Anaheim, CA, pp. 5562-5566, 2012.
  2. J. Chen and J. Wu, "Cooperative anonymity authentication in vehicular networks," in Proceeding of IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, Macau, pp. 1018-1023, 2009.
  3. R. Lu et al, "ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications," in Proceeding of INFOCOM, Phoenix, AZ, pp. 1903-1911, 2008.
  4. Z. Tan, "A privacy-preserving mutual authentication protocol for vehicle Ad Hoc networks," Journal of Convergence Information Technology, vol. 5, no. 7, pp. 180-186, Sep. 2010.
  5. Y. Xi et al, "Probabilistic adaptive anonymous authentication in vehicular networks," Journal of Computer Science and Technology, vol. 23, no. 6, pp. 916-928, Nov. 2008. https://doi.org/10.1007/s11390-008-9194-z
  6. B. Mishra, S. K. Panigrahy, D. Jena, and S. K. Jena, "A secure and efficient message authentication protocol for VANETs with privacy preservation," in Proceeding of World Congress on Information and communication Technologies, Mumbai, pp. 880-885, 2011.
  7. W. Hu, K. Xue, P. Hong, and C. Wu, "ATCS: A novel anonymous and traceable communication scheme for vehicular Ad Hoc networks," International Journal of Network Security, vol. 13, no. 2, pp. 71-78, Sep. 2011.
  8. Z. Ma, F. Kargl, and M. Weber, "Pseudonym-on-demand: a new pseudonym refill strategy for vehicular communications," in Proceeding of IEEE 68th Conference on Vehicular Technology Conference, Calgary, BC, pp. 1-5, 2008.
  9. R. L. Rivest, A. Shamir, and A. Tauman, "How to leak a secret," Lecture notes in Computer Science, pp. 552-565, 2001.