An Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETs

被引:85
作者
Cui, Jie [1 ,2 ,3 ]
Wu, Di [1 ,2 ,3 ]
Zhang, Jing [1 ,2 ,3 ]
Xu, Yan [1 ,2 ,3 ]
Zhong, Hong [1 ,2 ,3 ]
机构
[1] Anhui Univ, Sch Comp Sci & Technol, Hefei 230039, Anhui, Peoples R China
[2] Anhui Univ, Inst Phys Sci & Informat Technol, Hefei 230039, Anhui, Peoples R China
[3] Anhui Univ, Anhui Engn Lab IoT Secur Technol, Hefei 230039, Anhui, Peoples R China
基金
中国国家自然科学基金;
关键词
Certificateless signature; self-healing key distribution; semitrusted authority; VANETs; PRIVACY-PRESERVING AUTHENTICATION; CERTIFICATELESS AGGREGATE SIGNATURE; HEALING KEY DISTRIBUTION; MESSAGE AUTHENTICATION; SECURE; PROTOCOL;
D O I
10.1109/TVT.2019.2896018
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the development of intelligent transportation systems, vehicular ad hoc networks (VANETs) are widely used in safety driving, and so on. However, existing signature schemes, such as pseudonym-and group-based schemes, have certain problems, such as the need for a certificate distribution and certificate revocation lists (CRLs). With such schemes, the vehicle needs to store a valid certificate generated by the management center. Simultaneously, the receiver needs to check the CRLs prior to message authentication. CRLs require large amounts of storage space and computational and communication resources. In addition, many such schemes are built on a trusted authority and do not meet real-world needs. Thus, we propose an efficient authentication scheme based on semitrusted authority in VANETs. In this scheme, we combine the self-healing key distribution method with a certificateless signature in a semitrusted authority environment, such that the receivers do not require to query the CRLs. Therefore, the vehicles do not have to store the CRLs, thereby saving storage space and communication resources. This also reduces the computational costs and improves the efficiency of the message authentication. Since the proposed scheme is built on a semitrusted authority, it is a more realistic approach.
引用
收藏
页码:2972 / 2986
页数:15
相关论文
共 39 条
[1]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[2]  
[Anonymous], 2011, P 3 INT C ADV SYST S, DOI DOI 10.1109/TSMC.2016.2631479
[3]  
[Anonymous], SENSORS
[4]  
[Anonymous], 2003, MULTIPRECISION INTEG
[5]  
[Anonymous], NETWORKS
[6]  
[Anonymous], DEFINITIONS BOUNDS S
[7]   Design of self-healing key distribution schemes [J].
Blundo, C ;
D'Arco, P ;
De Santis, A ;
Listo, M .
DESIGNS CODES AND CRYPTOGRAPHY, 2004, 32 (1-3) :15-44
[8]  
Calandriello G, 2007, VANET'07: PROCEEDINGS OF THE FOURTH ACM INTERNATIONAL WORKSHOP ON VEHICULAR AD HOC NETWORKS, P19
[9]   Routing in Internet of Vehicles: A Review [J].
Cheng, JiuJun ;
Cheng, JunLu ;
Zhou, MengChu ;
Liu, FuQiang ;
Gao, ShangCe ;
Liu, Cong .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2015, 16 (05) :2339-2352
[10]  
Cseh C, 1998, IEEE VTC P, P2095, DOI 10.1109/VETEC.1998.686127