Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks

被引:90
作者
Vijayakumar, Pandi [1 ]
Azees, Maria [1 ]
Chang, Victor [2 ]
Deborah, Jegatha [1 ]
Balusamy, Balamurugan [3 ]
机构
[1] Univ Coll Engn Tindivanam, Dept Comp Sci & Engn, Melpakkam 604001, Tamil Nadu, India
[2] Xian Jiaotong Liverpool Univ, Int Business Sch Suzhou, Suzhou 215123, Peoples R China
[3] VIT Univ, Sch Informat Technol & Engn, Vellore 632014, Tamil Nadu, India
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2017年 / 20卷 / 03期
关键词
Anonymous authentication; Privacy; Key distribution; Computational cost; Integrity; Anonymous signature; Group key; DISTRIBUTION PROTOCOL; BATCH VERIFICATION; SECURE; SCHEME; MANAGEMENT; CLOUD; TREE;
D O I
10.1007/s10586-017-0848-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The incorporation of electronics by embedding the relevant sensors in the physical devices in home and office, vehicles of all types, buildings in the smart cities and in all possible spheres of life form a network of devices termed as internet of things (IoT). It is being realized that vehicular ad-hoc networks (VANETs) which are responsible for the reliable and secure communication among vehicles is a primary area of research in IoT and hence ensuring security in this area is essential. Thus, this work introduces a novel approach to improve the existing authentication support to VANETs. In this proposed framework, first an anonymous authentication approach for preserving the privacy is proposed which not only performs the vehicle user's anonymous authentication but preserves the message integrity of the transmitting messages as well. Although many anonymous authentication schemes have been proposed in VANETs until now, the existing schemes suffer from a high computation cost during the signature and certificate verification process which leads to delayed authentication. Consequently, the vehicles and roadside units (RSUs) cannot authenticate more number of vehicles per second in VANETs. Second, an efficient anonymous group key distribution protocol is proposed in this paper for securely distributing the group key to the group of vehicles in the communication range of an RSU. The RSUs can send location based information to the group of vehicles in a secure manner using this group key. Experimental analysis portrays that the results of this new privacy preserving anonymous authentication and key management schemes are promising and efficient with regard to signature verification cost and computational cost in comparison with the existing schemes.
引用
收藏
页码:2439 / 2450
页数:12
相关论文
共 43 条
  • [1] A secure authentication scheme for VANETs with batch verification
    Bayat, Majid
    Barmshoory, Mostafa
    Rahimi, Majid
    Aref, Mohammd Reza
    [J]. WIRELESS NETWORKS, 2015, 21 (05) : 1733 - 1743
  • [2] Identity-based encryption from the Weil pairing
    Boneh, D
    Franklin, M
    [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
  • [3] A model to compare cloud and non-cloud storage of Big Data
    Chang, Victor
    Wills, Gary
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 57 : 56 - 76
  • [4] Cloud computing adoption framework: A security framework for business clouds
    Chang, Victor
    Kuo, Yen -Hung
    Ramachandran, Muthu
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 57 : 24 - 41
  • [5] Towards a Big Data system disaster recovery in a Private Cloud
    Chang, Victor
    [J]. AD HOC NETWORKS, 2015, 35 : 65 - 82
  • [6] Chhabra M., 2014, Res. J. Appl. Sci., Eng. Technol., V7, P2033
  • [7] Chhabra M., 2013, SciRes Journal of Information Security, V4, P165, DOI 10.4236/jis.2013.43019
  • [8] Du X., 2003247 CRYPT EPRINT
  • [9] Gu XZ, 2015, IEEE MILIT COMMUN C, P1009, DOI 10.1109/MILCOM.2015.7357577
  • [10] A Variable Threshold-Value Authentication Architecture for Wireless Mesh Networks
    Guo, Ping
    Wang, Jin
    Geng, Xue Hua
    Kim, Chang Seob
    Kim, Jeong-Uk
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2014, 15 (06): : 929 - 935