A secure access control scheme with batch verification for VANETs

被引:2
|
作者
Wang, Tao [1 ]
Kang, Li [2 ,3 ]
Duan, Jiang [2 ,3 ]
机构
[1] 30 Inst CETC, 8 Chuangye Rd, Chengdu, Peoples R China
[2] Southwestern Univ Finance & Econ, Blockchain Res Ctr China, 555 Liutai Ave, Chengdu, Peoples R China
[3] Chengdu Everimaging Sci & Technol Co Ltd, 35-F Taifeng Int Plaza, Chengdu, Peoples R China
关键词
Batch verification; Security; Vehicular ad hoc networks (VANETs); EFFICIENT AUTHENTICATION SCHEME; AD-HOC NETWORKS; COMMUNICATION;
D O I
10.1016/j.comcom.2023.04.017
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
When an onboard unit (OBU) moves into the area of a roadside unit (RSU), authentication occurs. In areas with heavy traffic, e.g., intersections, an RSU may receive thousands of requests in a short period . Verifying each request separately can lead to wasted resources and cause RSU service bottlenecks. Because these requests have stringent real-time requirements, if they are not processed in time, vehicles may not be able to change their driving status and could encounter large-scale congestion or even dangerous areas. To improve efficiency, this study investigated a secure access control scheme with batch verification for vehicular ad hoc networks . The proposed method requires only two bilinear pairing operations to verify n requests, which is the same number for a single verification. Through a performance analysis, it was confirmed that the proposed scheme has a lower computation cost and the least communication overhead among existing schemes. Furthermore, extensive simulations demonstrated that the scheme has the lowest processing delay, and as the number of batch verifications increases, its processing delay growth range also diminishes. A detailed security analysis shows that the scheme achieves collusion resistance, signature unforgeability, and replaying resistance.
引用
收藏
页码:79 / 86
页数:8
相关论文
共 50 条
  • [1] A secure authentication scheme for VANETs with batch verification
    Bayat, Majid
    Barmshoory, Mostafa
    Rahimi, Majid
    Aref, Mohammd Reza
    WIRELESS NETWORKS, 2015, 21 (05) : 1733 - 1743
  • [2] A secure authentication scheme for VANETs with batch verification
    Majid Bayat
    Mostafa Barmshoory
    Majid Rahimi
    Mohammd Reza Aref
    Wireless Networks, 2015, 21 : 1733 - 1743
  • [3] Messages Classification and Dynamic Batch Verification Scheme for VANETs
    Ferng, Huei-Wen
    Chen, Jia-Ying
    Lotfolahi, MohammadAmin
    Tseng, Ying-Tsu
    Zhang, Si-Yuan
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2021, 20 (03) : 1156 - 1172
  • [4] Cryptanalysis and Improvement of Batch Verification Certificateless Signature Scheme for VANETs
    Li, Jiguo
    Zhang, Yichen
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 111 (02) : 1255 - 1269
  • [5] Cryptanalysis and Improvement of Batch Verification Certificateless Signature Scheme for VANETs
    Jiguo Li
    Yichen Zhang
    Wireless Personal Communications, 2020, 111 : 1255 - 1269
  • [6] BASRAC: An efficient batch authentication scheme with rule-based access control for VANETs
    Chen, Shuyi
    Liu, Yali
    Ning, Jianting
    Zhu, Xiuping
    VEHICULAR COMMUNICATIONS, 2023, 40
  • [7] A Fault-Tolerant Batch Verification Scheme for Cloud Assisted VANETs
    Dai, Fei-fei
    Luo, Ming-xing
    Zhang, Yuan-fei
    Zhang, Lei
    Sun, Yin-xia
    2ND INTERNATIONAL CONFERENCE ON APPLIED MECHANICS, ELECTRONICS AND MECHATRONICS ENGINEERING (AMEME), 2017, : 337 - 342
  • [8] Certificateless Signature Scheme With Batch Verification for Secure and Privacy-Preserving V2V Communications in VANETs
    Wu, Qian
    Zhang, Lei
    Yang, Yafang
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2025, 22 (02) : 1448 - 1459
  • [9] Secure batch verification protocol for RSA signature scheme
    Jia, ZP
    Li, QC
    Li, ZC
    CHINESE JOURNAL OF ELECTRONICS, 2005, 14 (01): : 54 - 57
  • [10] Secure Certificateless Signature Scheme Supporting Batch Verification
    Fan, Chun-I
    Ho, Pei-Hsiu
    Huang, Jheng-Jia
    Tseng, Yi-Fan
    2013 EIGHTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2013, : 8 - 11