Browse > Article
http://dx.doi.org/10.6109/jkiice.2013.17.10.2309

A Probabilistic Approach for Robust Anonymous Authentication Protocol in VANETs  

Kim, Tae-Yeon (Department of Computer Science & Information Communication, Seonam University)
An, Do-Sik (Division of Computer Science & Engineering(CAIIT), Chonbuk National University)
Cho, Gi-Hwan (Division of Computer Science & Engineering(CAIIT), Chonbuk National University)
Abstract
VANET(Vehicular Ad-hoc Network) is getting attention as an application to improve driver safety through inter-vehicle communication. For activation of VANET, privacy-preserving mutual authentication has to be guaranteed. In previous works, authors proposed various group-based authentication protocols. However, risks on ID exposure due to repeated use of group key and RSU(Road Side Unit) DoS attack were not considered. In this paper, we propose a probabilistic approach for robust anonymous authentication protocol. We evaluated our proposed method in a sets of criteria in VANET and verified it is an efficient solution for enhancing privacy.
Keywords
Vehicular ad-hoc network; Authentication Protocol; Anonymous; Probabilistic approach;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Y. Hao, T. Han, and Y. Cheng, "A cooperative message authentication protocol in VANETs," in Proceeding of GLOBECOM, Anaheim, CA, pp. 5562-5566, 2012.
2 J. Chen and J. Wu, "Cooperative anonymity authentication in vehicular networks," in Proceeding of IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, Macau, pp. 1018-1023, 2009.
3 R. Lu et al, "ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications," in Proceeding of INFOCOM, Phoenix, AZ, pp. 1903-1911, 2008.
4 Z. Tan, "A privacy-preserving mutual authentication protocol for vehicle Ad Hoc networks," Journal of Convergence Information Technology, vol. 5, no. 7, pp. 180-186, Sep. 2010.
5 Y. Xi et al, "Probabilistic adaptive anonymous authentication in vehicular networks," Journal of Computer Science and Technology, vol. 23, no. 6, pp. 916-928, Nov. 2008.   DOI
6 B. Mishra, S. K. Panigrahy, D. Jena, and S. K. Jena, "A secure and efficient message authentication protocol for VANETs with privacy preservation," in Proceeding of World Congress on Information and communication Technologies, Mumbai, pp. 880-885, 2011.
7 W. Hu, K. Xue, P. Hong, and C. Wu, "ATCS: A novel anonymous and traceable communication scheme for vehicular Ad Hoc networks," International Journal of Network Security, vol. 13, no. 2, pp. 71-78, Sep. 2011.
8 Z. Ma, F. Kargl, and M. Weber, "Pseudonym-on-demand: a new pseudonym refill strategy for vehicular communications," in Proceeding of IEEE 68th Conference on Vehicular Technology Conference, Calgary, BC, pp. 1-5, 2008.
9 R. L. Rivest, A. Shamir, and A. Tauman, "How to leak a secret," Lecture notes in Computer Science, pp. 552-565, 2001.