Lattice-Based Conditional Privacy-Preserving Batch Authentication Protocol for Fog-Assisted Vehicular Ad Hoc Networks

被引:0
作者
Li, Long [1 ]
Hsu, Chingfang [2 ,3 ]
Au, Man Ho [4 ]
Cui, Jianqun [1 ]
Harn, Lein [5 ]
Zhao, Zhuo [6 ]
机构
[1] Cent China Normal Univ, Comp Sch, Wuhan 430079, Peoples R China
[2] Cent China Normal Univ, Hubei Prov Key Lab Artificial Intelligence & Smar, Wuhan 430079, Peoples R China
[3] Cent China Normal Univ, Comp Sch, Wuhan 430079, Peoples R China
[4] Hong Kong Polytech Univ, Dept Comp, Hong Kong, Peoples R China
[5] Univ Missouri, Dept Comp Sci & Elect Engn, Kansas City, MO 64110 USA
[6] Cent China Normal Univ, Fac Artificial Intelligence Educ, Wuhan 430079, Peoples R China
基金
中国国家自然科学基金;
关键词
Fog-assisted; lattice; batch authentication; conditional privacy-preserving; vehicular ad hoc network (VANET); SCHEME; EFFICIENT; SECURE; VERIFICATION;
D O I
10.1109/TIFS.2024.3477305
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The vehicular ad hoc network (VANET) is a basic component of intelligent transportation systems. Due to the growing security and privacy-preserving requirements of the VANET, a lot of conditional privacy-preserving authentication (CPPA) protocols have been proposed in recent years. Unfortunately, the traditional CPPA protocols, which are based on a trusted authority (TA) and rely solely on classical mathematical problems, cannot resist quantum attacks. Moreover, these protocols do not take into account the increasingly complex traffic flow in the VANET and cannot utilize fog nodes (FNs) to assist in the TA's authentication work. In this paper, we design a lattice-based and fog-assisted conditional privacy-preserving authentication (LFCPPA) protocol to solve the above challenges. Compared to existing solutions, we have made the following improvements. First, our protocol is resistant to quantum attacks. Second, the solution supports batch processing of signature verification and mutual authentication of identity between the TA / FNs and vehicles. Third, in our design, FNs reduce the computing pressure of the TA to improve the efficiency of the system. In addition, we demonstrate the security of the protocol under the random oracle model with provable security. Finally, the efficiency and security of this scheme are better than similar solutions. Specifically, compared with the latest scheme, in terms of computational cost, our scheme is reduced by 74.47%, 85.58%, 19.69%, and 85.90% in the four stages of the protocol. Meanwhile, in terms of communication cost, our protocol reduces it by 89.98%.
引用
收藏
页码:9629 / 9642
页数:14
相关论文
共 32 条
  • [1] Bagherzandi A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P449
  • [2] A Practical Lightweight Anonymous Authentication and Key Establishment Scheme for Resource-Asymmetric Smart Environments
    Bai, Linyan
    Hsu, Chingfang
    Harn, Lein
    Cui, Jianqun
    Zhao, Zhuo
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (04) : 3535 - 3545
  • [3] Accessibility Analysis and Modeling for IoV in an Urban Scene
    Cheng, Jiujun
    Yuan, Guiyuan
    Zhou, Mengchu
    Gao, Shangce
    Liu, Cong
    Duan, Hua
    Zeng, QingTian
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (04) : 4246 - 4256
  • [4] Routing in Internet of Vehicles: A Review
    Cheng, JiuJun
    Cheng, JunLu
    Zhou, MengChu
    Liu, FuQiang
    Gao, ShangCe
    Liu, Cong
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2015, 16 (05) : 2339 - 2352
  • [5] Efficient Batch Authentication Scheme Based on Edge Computing in IIoT
    Cui, Jie
    Wang, Fengqun
    Zhang, Qingyang
    Gu, Chengjie
    Zhong, Hong
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2023, 20 (01): : 357 - 368
  • [6] Extensible Conditional Privacy Protection Authentication Scheme for Secure Vehicular Networks in a Multi-Cloud Environment
    Cui, Jie
    Zhang, Xiaoyu
    Zhong, Hong
    Zhang, Jing
    Liu, Lu
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 (15) : 1654 - 1667
  • [7] Post quantum secure conditional privacy preserving authentication for edge based vehicular communication
    Dharminder, Dharminder
    Kumari, Saru
    Kumar, Uddeshaya
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (11)
  • [8] LCPPA: Lattice-based conditional privacy preserving authentication in vehicular communication
    Dharminder, Dharminder
    Mishra, Dheerendra
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2020, 31 (02):
  • [9] Joint Task Offloading and Resource Allocation for Vehicular Edge Computing Based on V2I and V2V Modes
    Fan, Wenhao
    Su, Yi
    Liu, Jie
    Li, Shenmeng
    Huang, Wei
    Wu, Fan
    Liu, Yuan'an
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (04) : 4277 - 4292
  • [10] Gentry C, 2008, ACM S THEORY COMPUT, P197