ABAKA: An Anonymous Batch Authenticated and Key Agreement Scheme for Value-Added Services in Vehicular Ad Hoc Networks

被引:193
作者
Huang, Jiun-Long [1 ]
Yeh, Lo-Yao [1 ]
Chien, Hung-Yu [2 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp Sci, Hsinchu 300, Taiwan
[2] Natl Chi Nan Univ, Dept Informat Management, Nantou 545, Taiwan
关键词
Authentication; batch verification; conditional privacy; elliptic curve cryptographic; EFFICIENT; SECURE;
D O I
10.1109/TVT.2010.2089544
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we introduce an anonymous batch authenticated and key agreement (ABAKA) scheme to authenticate multiple requests sent from different vehicles and establish different session keys for different vehicles at the same time. In vehicular ad hoc networks (VANETs), the speed of a vehicle is changed from 10 to 40 m/s (36-144 km/h); therefore, the need for efficient authentication is inevitable. Compared with the current key agreement scheme, ABAKA can efficiently authenticate multiple requests by one verification operation and negotiate a session key with each vehicle by one broadcast message. Elliptic curve cryptography is adopted to reduce the verification delay and transmission overhead. The security of ABAKA is based on the elliptic curve discrete logarithm problem, which is an unsolved NP-complete problem. To deal with the invalid request problem, which may cause the batch verification fail, a detection algorithm has been proposed. Moreover, we demonstrate the efficiency merits of ABAKA through performance evaluations in terms of verification delay, transmission overhead, and cost for rebatch verifications, respectively. Simulation results show that both the message delay and message loss rate of ABAKA are less than that of the existing elliptic curve digital signature algorithm (ECDSA)-based scheme.
引用
收藏
页码:248 / 262
页数:15
相关论文
共 26 条
  • [1] [Anonymous], 2006, IEEE STD 16092 2006, DOI DOI 10.1109/IEEESTD.2006
  • [2] [Anonymous], EFFICIENT IMPLEMENTA
  • [3] [Anonymous], 2004, GUIDE ELLIPTIC CURVE, DOI DOI 10.1007/B97644
  • [4] [Anonymous], NETWORK SIMULATOR NS
  • [5] [Anonymous], Standards For Efficient Cryptography Group (SECG)
  • [6] [Anonymous], DEDICATED SHORT RANG
  • [7] [Anonymous], 2002, RSA CryptoBytes
  • [8] Boneh D, 2003, LECT NOTES COMPUT SC, V2656, P416
  • [9] Boneh D., 2001, INT C THEORY APPL CR, V2248, P514, DOI 10.1007/3-540-45682-130
  • [10] Camenisch J, 2007, LECT NOTES COMPUT SC, V4515, P246