DOI QR코드

DOI QR Code

A Probabilistic Approach for Robust Anonymous Authentication Protocol in VANETs

차량 네트워크에서 강한 익명성이 지원되는 인증 프로토콜을 위한 확률론적 접근방식

  • Kim, Tae-Yeon (Department of Computer Science & Information Communication, Seonam University) ;
  • An, Do-Sik (Division of Computer Science & Engineering(CAIIT), Chonbuk National University) ;
  • Cho, Gi-Hwan (Division of Computer Science & Engineering(CAIIT), Chonbuk National University)
  • Received : 2013.06.20
  • Accepted : 2013.07.31
  • Published : 2013.10.31

Abstract

VANET(Vehicular Ad-hoc Network) is getting attention as an application to improve driver safety through inter-vehicle communication. For activation of VANET, privacy-preserving mutual authentication has to be guaranteed. In previous works, authors proposed various group-based authentication protocols. However, risks on ID exposure due to repeated use of group key and RSU(Road Side Unit) DoS attack were not considered. In this paper, we propose a probabilistic approach for robust anonymous authentication protocol. We evaluated our proposed method in a sets of criteria in VANET and verified it is an efficient solution for enhancing privacy.

차량애드혹네트워크(VANET: Vehicular Ad-hoc Network)는 차량 간 통신을 통하여 운전자의 안전을 향상시키는 응용으로 많은 관심을 받고 있다. 이러한 VANET의 활성화를 위해서는 프라이버시가 보장되는 상호 인증이 보장되어야 한다. 기존 연구에서는 그룹 기반 인증 프로토콜들이 제안되었다. 그러나 키 그룹의 반복사용으로 인한 ID노출과 RSU(Road side Unit)의 DoS의 공격 위험에 대한 문제가 고려되지 않았다. 본 논문에서는 강한 익명성이 지원되는 인증 프로토콜을 위한 확률론적 접근방식을 제안한다. VANET 환경에서 제안된 구조를 몇 가지의 조건 하에서 성능을 평가하여 제안한 구조가 프라이버시를 향상시키는데 더 효율적인 방식임을 밝힌다.

Keywords

References

  1. Y. Hao, T. Han, and Y. Cheng, "A cooperative message authentication protocol in VANETs," in Proceeding of GLOBECOM, Anaheim, CA, pp. 5562-5566, 2012.
  2. J. Chen and J. Wu, "Cooperative anonymity authentication in vehicular networks," in Proceeding of IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, Macau, pp. 1018-1023, 2009.
  3. R. Lu et al, "ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications," in Proceeding of INFOCOM, Phoenix, AZ, pp. 1903-1911, 2008.
  4. Z. Tan, "A privacy-preserving mutual authentication protocol for vehicle Ad Hoc networks," Journal of Convergence Information Technology, vol. 5, no. 7, pp. 180-186, Sep. 2010.
  5. Y. Xi et al, "Probabilistic adaptive anonymous authentication in vehicular networks," Journal of Computer Science and Technology, vol. 23, no. 6, pp. 916-928, Nov. 2008. https://doi.org/10.1007/s11390-008-9194-z
  6. B. Mishra, S. K. Panigrahy, D. Jena, and S. K. Jena, "A secure and efficient message authentication protocol for VANETs with privacy preservation," in Proceeding of World Congress on Information and communication Technologies, Mumbai, pp. 880-885, 2011.
  7. W. Hu, K. Xue, P. Hong, and C. Wu, "ATCS: A novel anonymous and traceable communication scheme for vehicular Ad Hoc networks," International Journal of Network Security, vol. 13, no. 2, pp. 71-78, Sep. 2011.
  8. Z. Ma, F. Kargl, and M. Weber, "Pseudonym-on-demand: a new pseudonym refill strategy for vehicular communications," in Proceeding of IEEE 68th Conference on Vehicular Technology Conference, Calgary, BC, pp. 1-5, 2008.
  9. R. L. Rivest, A. Shamir, and A. Tauman, "How to leak a secret," Lecture notes in Computer Science, pp. 552-565, 2001.