Browse > Article
http://dx.doi.org/10.13089/JKIISC.2018.28.3.563

An Anonymous Authentication in the Hierarchy for VANET  

Bae, Kyungjin (Graduate School of Information Security, Korea University)
Lee, Youngkyung (Graduate School of Information Security, Korea University)
Kim, Jonghyun (Graduate School of Information Security, Korea University)
Lee, Dong Hoon (Graduate School of Information Security, Korea University)
Abstract
In order to support secure communication in VANET(Vehicular Ad hoc Network), messages exchanged between vehicles or between vehicle and infrastructure must be authenticated. In this paper, we propose a hierarchical anonymous authentication system for VANET. The proposed system model reduces the overhead of PKG, which is a problem of previous system, by generating private keys hierarchically, thereby enhancing practicality. We also propose a two-level hierarchical identity-based signature(TLHIBS) scheme without pairings so that improve efficiency. The proposed scheme protects the privacy of the vehicle by satisfying conditional privacy and supports batch verification so that efficiently verifies multiple signatures. Finally, The security of the proposed scheme is proved in the random oracle model by reducing the discrete logarithm problem(DLP) whereas the security proof of the previous ID-based signatures for VANET was incomplete.
Keywords
VANET; authentication; conditional privacy; IBS; pairing-free;
Citations & Related Records
연도 인용수 순위
  • Reference
1 M. Bellare, J.A. Garay, and T. Rabin, "Fast batch verification for modular exponentiation and digital signatures," In International Conference on the Theory and Applications of Cryptographic Techniques, pp. 236-250, May 1998.
2 J.K. Liu, T.H. Yuen, M.H. Au, and W. Susilo, "Improvements on an authentication scheme for vehicular sensor networks," Expert Systems with Applications, vol. 41, no. 5, pp. 2559-2564, Apr. 2014.   DOI
3 N.W. Lo and J.L. Tsai, "An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings," IEEE Transactions on Intelligent Transportation Systems, vol. 17, no. 5, pp. 1319-1328, May 2016.   DOI
4 J. Camenisch, S. Hohenberger, and M.O. Pedersen, "Batch verification of short signatures," J. Cryptology, vol. 25, no. 4, pp. 723-747, 2012.   DOI
5 C. Zhang, R. Lu, X. Lin, P.H. Ho, and X. Shen, "An efficient identitybased batch verification scheme for vehicular sensor networks," Proceeding of IEEE INFOCOM, pp. 246-250, 2008.
6 M. Raya and J.P. Hubaux, "Securing vehicular ad hoc networks," J. Comput. Security, vol. 15, no. 1, pp. 39-68, 2007.   DOI
7 X. Lin, X. Sun, P.H. Ho, and X. Shen, "GSIS: A secure and privacypreserving protocol for vehicular communications," IEEE Transactions on Vehicular Technology, vol. 56, no. 6, pp. 3442-3456, Nov. 2007.   DOI
8 K.A. Shim, "CPAS: An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks," IEEE Transactions on Vehicular Technology, vol. 61, no. 4, pp. 1874-1883, May 2012.   DOI
9 S.F. Tzeng, S.J. Horng, T. Li, X. Wang, P.H. Huang, and M.K. Khan, "Enhancing security and privacy for identity-based batch verification scheme in VANETs," IEEE Transactions on Vehicular Technology vol. 66, no. 4, pp. 3235-3248, Apr. 2017.   DOI
10 S. Chatterjee, C. Kamath, and V. Kumar, "Galindo-Garcia identity-based signature revisited," International Conference on Information Security and Cryptology, 2012.
11 R. Anderson and M.G. Kuhn, "Tamper resistance-a cautionary note," Proceedings of the second Usenix workshop on electronic commerce, vol. 2, pp. 1-11, 1996.
12 S. Ravi, A. Raghunathan, and S. Chakradhar, "Tamper resistance mechanisms for secure embedded systems," In VLSI Design, 2004. Proceedings. 17th International Conference on, pp. 605-611, 2004.
13 Y. Wang, H. Zhong, Y. Xu, J. Cui, and F. Guo, "Efficient extensible conditional privacy-preserving authentication scheme supporting batch verification for VANETs," Security and Communication Networks, vol. 9, no. 18, pp. 5460-5471, 2016.   DOI
14 D. He, N. Kumar, KKR. Choo, and W. Wu, "Efficient hierarchical identity-based signature with batch verification for automatic dependent surveillance-broadcast system," IEEE Transactions on Information Forensics and Security, vol. 12, no. 2, pp. 454-464, Feb. 2017.   DOI
15 Dedicated Short Range Communications (DSRC). [Online]. Available: http://www.standards.its.dot.gov/Documents/advisories/dsrc_advisory.htm