EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks

被引:363
作者
Azees, Maria [1 ]
Vijayakumar, Pandi [1 ]
Deboarh, Lazarus Jegatha [1 ]
机构
[1] Univ Coll Engn, Dept Comp Sci & Engn, Tindivanam 604001, India
关键词
Conditional privacy; vehicular ad hoc networks (VANETs); anonymous certificates; authentication; security; PROTOCOL; SECURITY;
D O I
10.1109/TITS.2016.2634623
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
Providing an efficient anonymous authentication scheme in vehicular ad hoc networks (VANETs) with low computational cost is a challenging issue. Even though, there are some existing schemes to provide anonymous authentication, the existing schemes suffer from high computational cost in the certificate and the signature verification process, which leads to high message loss. Therefore, they fail to meet the necessity of verifying hundreds of messages per second in VANETs. In our scheme, we propose an efficient anonymous authentication scheme to avoid malicious vehicles entering into the VANET. In addition, the proposed scheme offers a conditional tracking mechanism to trace the vehicles or roadside units that abuse the VANET. As a result, our scheme revokes the privacy of misbehaving vehicles to provide conditional privacy in a computationally efficient way through which the VANET entities will be anonymous to each other until they are revoked from the VANET system. Moreover, the proposed scheme is implemented and the performance analysis shows that our scheme is computationally efficient with respect to the certificate and the signature verification process by keeping conditional privacy in VANETs.
引用
收藏
页码:2467 / 2476
页数:10
相关论文
共 33 条
  • [1] Al-kahtani MohammedSaeed., 2012, Signal Processing and Communication Systems (ICSPCS), 2012 6th International Conference on, P1
  • [2] [Anonymous], 2005, Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN'05
  • [3] [Anonymous], 2011, P IEEE INT C COMM
  • [4] [Anonymous], 2006, SEC WORKSH
  • [5] [Anonymous], 2005, ADV ELLIPTIC CURVE C, DOI DOI 10.1017/CBO9780511546570
  • [6] Comprehensive survey on security services in vehicular ad-hoc networks
    Azees, Maria
    Vijayakumar, Pandi
    Deborah, Lazarus Jegatha
    [J]. IET INTELLIGENT TRANSPORT SYSTEMS, 2016, 10 (06) : 379 - 388
  • [7] Refinements of Miller's algorithm for computing the Weil/Tate pairing
    Blake, IF
    Murty, VK
    Xu, GW
    [J]. JOURNAL OF ALGORITHMS-COGNITION INFORMATICS AND LOGIC, 2006, 58 (02): : 134 - 149
  • [8] Short signatures from the Weil pairing
    Boneh, D
    Lynn, B
    Shacham, H
    [J]. JOURNAL OF CRYPTOLOGY, 2004, 17 (04) : 297 - 319
  • [9] Boneh D, 2003, LECT NOTES COMPUT SC, V2656, P416
  • [10] D2D for Intelligent Transportation Systems: A Feasibility Study
    Cheng, Xiang
    Yang, Liuqing
    Shen, Xia
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2015, 16 (04) : 1784 - 1793