A Hierarchical Privacy Preserving Pseudonymous Authentication Protocol for VANET

被引:67
作者
Rajput, Ubaidullah [1 ]
Abbas, Fizza [1 ]
Oh, Heekuck [1 ]
机构
[1] Hanyang Univ, Dept Comp Sci & Engn, Ansan 15588, South Korea
基金
新加坡国家研究基金会;
关键词
Vehicular adhoc network; authentication; privacy; pseudonyms; SECURE;
D O I
10.1109/ACCESS.2016.2620999
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Vehicular ad hoc network (VANET) is a technology that enables smart vehicles to communicate with each other and form a mobile network. VANET facilitates users with improved traffic efficiency and safety. Authenticated communication becomes one of the prime requirements of VANET. However, authentication may reveal a user's personal information such as identity or location, and therefore, the privacy of an honest user must be protected. This paper proposes an efficient and practical pseudonymous authentication protocol with conditional privacy preservation. Our protocol proposes a hierarchy of pseudonyms based on the time period of their usage. We propose the idea of primary pseudonyms with relatively longer time periods that are used to communicate with semi-trusted authorities and secondary pseudonyms with a smaller life time that are used to communicate with other vehicles. Most of the current pseudonym-based approaches are based on certificate revocation list (CRL) that causes significant communication and storage overhead or group-based approaches that are computationally expensive and suffer from group-management issues. These schemes also suffer from trust issues related to certification authority. Our protocol only expects an honest-but-curious behavior from otherwise fully trusted authorities. Our proposed protocol protects a user's privacy until the user honestly follows the protocol. In case of a malicious activity, the true identity of the user is revealed to the appropriate authorities. Our protocol does not require maintaining a CRL and the inherent mechanism assures the receiver that the message and corresponding pseudonym are safe and authentic. We thoroughly examined our protocol to show its resilience against various attacks and provide computational as well as communicational overhead analysis to show its efficiency and robustness. Furthermore, we simulated our protocol in order to analyze the network performance and the results show the feasibility of our proposed protocol in terms of end-to-end delay and packet delivery ratio.
引用
收藏
页码:7770 / 7784
页数:15
相关论文
共 50 条
[41]   A privacy-preserving authentication scheme based on Elliptic Curve Cryptography and using Quotient Filter in fog-enabled VANET [J].
Goudarzi, Shidrokh ;
Soleymani, Seyed Ahmad ;
Anisi, Mohammad Hossein ;
Azgomi, Mohammad Abdollahi ;
Movahedi, Zeinab ;
Kama, Nazri ;
Rusli, Hazlifah Mohd ;
Khan, Muhammad Khurram .
AD HOC NETWORKS, 2022, 128
[42]   Multi-TA model-based conditional privacy-preserving authentication protocol for fog-enabled VANET [J].
Kumar, Pankaj ;
Om, Hari .
VEHICULAR COMMUNICATIONS, 2024, 47
[43]   Conditional Privacy-Preserving Authentication Protocol With Dynamic Membership Updating for VANETs [J].
Xiong, Hu ;
Chen, Jinhao ;
Mei, Qian ;
Zhao, Yanan .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (03) :2089-2104
[44]   Cryptanalysis on a Portable Privacy-Preserving Authentication and Access Control Protocol in VANETs [J].
Shi-Jinn Horng ;
Shiang-Feng Tzeng ;
Xian Wang ;
Shaojie Qiao ;
Xun Gong ;
Muhammad Khurram Khan .
Wireless Personal Communications, 2014, 79 :1445-1454
[45]   Privacy-Preserving Transactions Protocol Using Mobile Agents with Mutual Authentication [J].
Han, Song ;
Potdar, Vidyasagar ;
Chang, Elizabeth ;
Dillon, Tharam .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2007, 1 (01) :35-46
[46]   An improved and provably secure privacy preserving authentication protocol for SIP [J].
Chaudhry, Shehzad Ashraf ;
Naqvi, Husnain ;
Sher, Muhammad ;
Farash, Mohammad Sabzinejad ;
ul Hassan, Mahmood .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2017, 10 (01) :1-15
[47]   An improved and provably secure privacy preserving authentication protocol for SIP [J].
Shehzad Ashraf Chaudhry ;
Husnain Naqvi ;
Muhammad Sher ;
Mohammad Sabzinejad Farash ;
Mahmood Ul Hassan .
Peer-to-Peer Networking and Applications, 2017, 10 :1-15
[48]   Efficient Conditional Privacy-Preserving Authentication Scheme Using Revocation Messages for VANET [J].
Zhong, Hong ;
Huang, Bo ;
Cui, Jie ;
Li, Jiang ;
Sha, Kewei .
2018 27TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2018,
[49]   Lightweight and Privacy-Preserving Authentication Protocol for Smart Village [J].
Panigrahi, Ranjeet Kumar ;
Kumar, Raghvendra .
INTERNET TECHNOLOGY LETTERS, 2025, 8 (05)
[50]   Lattice-Based Conditional Privacy-Preserving Authentication Protocol for the Vehicular Ad Hoc Network [J].
Li, Quanrun ;
He, Debiao ;
Yang, Zhichao ;
Xie, Qi ;
Choo, Kim-Kwang Raymond .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 71 (04) :4336-4347