Browse > Article
http://dx.doi.org/10.3837/tiis.2019.12.021

Research on Identity-based Batch Anonymous Authentication Scheme for VANET  

Song, Cheng (School of Computer Science and Technology, Henan Polytechnic University)
Gu, Xinan (School of Computer Science and Technology, Henan Polytechnic University)
Wang, Lei (School of Computer Science and Technology, Henan Polytechnic University)
Liu, Zhizhong (School of Computer Science and Technology, Henan Polytechnic University)
Ping, Yuan (School of Information Engineering, Xuchang University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.13, no.12, 2019 , pp. 6175-6189 More about this Journal
Abstract
To slove the security and efficiency problem of anonymous authentication in vehicular ad-hoc network (VANET), we adopt the bilinear pairing theory to propose an identity-based batch anonymous authentication scheme for VANET. The tamper-proof device in the on-board unit and the trusted authority jointly realize the anonymity of vehicle identity and the signature of messages, which further enhances the security of this scheme, as well as reduces the overhead of trusted authority. Batch authentication can improve the efficiency of anonymous authentication for VANET. Security and efficiency analyses demonstrate that this scheme not only satisfies such security properties as anonymity, non-forgeability and non-repudiation, but also has advantage in time and space complexity. Simulation results show that this scheme can achieve good performance in real-time VANET communication.
Keywords
VANET; identity-based; anonymous authentication; random oracle model;
Citations & Related Records
연도 인용수 순위
  • Reference
1 R G Engoulou, M Bellaiche, S Pierre and A Quintero, "VANET security surveys," Computer Communications ,vol.44, pp. 1-13, 2014.   DOI
2 X Liu, Z Fang, L Shi. "Securing Vehicular Ad Hoc Networks," International Conference on Pervasive Computing & Applications, July.2007.
3 D He, S Zeadally, B Xu and X Huang, "An Efficient Identity-Based Conditional Privacy Preserving Authentication Scheme for Vehicular Ad Hoc Networks," IEEE Transactions on Information Forensics & Security, vol. 10, no. 12, pp. 2681-2691, Dec. 2015.   DOI
4 J K Liu, T H Yuen, M H Au and W Susilo. "Improvements on an authentication scheme for vehicular sensor networks," Expert Systems with Applications, vol. 41, no. 5, pp. 2559-2564, April. 2014.   DOI
5 J Whitefield, L Chen, T Giannetsos, S Schneider and H Treharne, "Privacy-enhanced capabilities for VANETs using direct anonymous attestation," Vehicular Networking Conference, pp. 123-130, Feb. 2018.
6 Y Wang, H Zhong, Y Xu, J Cui and F Guo. "Efficient extensible conditional privacy preserving authentication scheme supporting batch verification for VANETs," International Journal of Network Security, vol. 9, no. 18, pp. 5460-5471, 2016.
7 C L Chen, J Shin, Y T Tsai, A Castiglione and F Palmieri, "Securing Information Exchange in VANETs by Using Pairing-Based Cryptography," International Journal of Foundations of Computer Science, vol. 28, no. 6, pp. 781-797, 2017.   DOI
8 C Zhang, R Lu, X Lin, P H Ho and X Shen, "An Efficient Identity-based Batch Verification Scheme for Vehicular Sensor Networks," in Proc. of IEEE INFOCOM 2008-The 27th Conference on Computer Communications, pp. 246-250, 2008.
9 M Raya, J P Hubaux, "The security of vehicular ad hoc networks," in Proc. of the 3rd ACM workshop on Security of ad hoc and sensor networks, pp. 11-21, Nov. 2005.
10 X Lin, X Sun, P H Ho and X Shen, "GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications," IEEE Transactions on Vehicular Technology, vol. 56, no. 6, pp. 3442-3456, Nov. 2007.   DOI
11 C Zhang, P H Ho and J Tapolcai, "On batch verification with group testing for vehicular communications," Wireless Networks, vol. 17, no. 8, pp. 1851-1865, Nov. 2011.   DOI
12 J Sun, C Zhang, Y Zhang and Y Fang, "An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks," IEEE Transactions on Parallel & Distributed Systems, vol. 21, no. 9, pp. 1227-1239, Jan. 2010.   DOI
13 C C Lee, Y M Lai. "Toward a secure batch verification with group testing for VANET," Wireless Networks, vol. 19, no. 6, pp. 1441-1449, Jan. 2013.   DOI
14 M Bayat, M Barmshoory, M Rahimi and M R Aref, "A secure authentication scheme for VANETs with batch verification," Wireless Networks, vol. 21, no. 5, pp. 1-11, Dec. 2014.   DOI
15 Y Liu, Z He, S Zhao and L Wang, "An efficient anonymous authentication protocol using batch operations for VANETs," Multimedia Tools & Applications, vol. 75, no. 24, pp. 17689-17709 , Jun. 2016.   DOI
16 F Brezing, A Weng, "Elliptic Curves Suitable for Pairing Based Cryptography," Designs Codes & Cryptography, vol. 37, no. 1, pp. 133-141, Oct. 2005.   DOI
17 M Azees, P Vijayakumar and L J Deboarh, "EAAP: Efficient Anonymous Authentication With Conditional Privacy Preserving Scheme for Vehicular AdHoc Networks," IEEE Transactionson Intelligent Transportation Systems, vol. 18, no. 9, pp. 1-10, Feb. 2017.   DOI
18 P Vijayakumara, V Changb, L J Deboraha, B Balusamy and P G Shynu, "Computationally Efficient Privacy Preserving Anonymous Mutual and Batch Authentication Schemes for Vehicular Ad Hoc Networks," Future Generation Computer Systems, vol 78, pp. 943-955, Jan. 2018.   DOI
19 S H Islam, M S Obaidat, P Vijayakumar, E Abdulhay, F Li and M K C Reddy, "A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs," Future Generation Computer Systems, vol 84, pp. 216-227, July. 2018.   DOI
20 A Shamir, "Identity-Based Cryptosystems and Signature Schemes," in Proc. of Workshop on the theory and application of cryptographic techniques, vol.196, no. 2, pp. 47-53, Aug. 1984.
21 L Chen, J Malone-Lee, "Improved identity-based signcryption," in Proc. of International Workshop on Public Key Cryptography, pp. 362-379, Jan. 2005.
22 Z Tong, H Lu, M Haenggi and C Poellabaure, "A Stochastic Geometry Approach to theModeling of DSRC for Vehicular Safety Communication," IEEE Trans-actions on Intelligent Transportation Systems, vol. 17, no. 5, pp. 1448-1458, Feb. 2016.   DOI