A Lightweight Authentication with Dynamic Batch-Based Group Key Management Using LSTM in VANET

被引:5
作者
Shen, Xieyang [1 ,2 ]
Huang, Chuanhe [1 ,2 ]
Pu, Wenxin [1 ,2 ]
Wang, Danxin [1 ,2 ]
机构
[1] Wuhan Univ, Sch Comp Sci, Wuhan, Peoples R China
[2] Collaborat Innovat Ctr Geospatial Technol, Wuhan, Peoples R China
关键词
PRIVACY; VERIFICATION; SCHEME; SECURE;
D O I
10.1155/2022/9779670
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to its complexity and mobility, VANET (vehicle ad hoc network) security has long plagued the development of the IoT industry. It is still a big challenge for users to decide the trustworthiness of an anonymous message or the preservation of personal information. Group signature is widely used in VANET anonymous authentication, but the existing solutions suffer from high computation costs in certificate revocation list (CRL) checking and signature verification process. In our scheme, we develop a lightweight protocol based on hashing functions and group keys, which escapes from the heavy computation cost. Then, we propose a dynamic batch-based group key distribution process, which is based on long short-term memory (LSTM) neural network to predict traffic flow and calculate the weight to determine the right time for key update. In this way, our method will significantly reduce computation delay and communication overhead. The security and performance analyses show that our scheme is more efficient in terms of authentication speed while keeping conditional privacy in VANET.
引用
收藏
页数:11
相关论文
共 28 条
[1]   EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks [J].
Azees, Maria ;
Vijayakumar, Pandi ;
Deboarh, Lazarus Jegatha .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2017, 18 (09) :2467-2476
[2]   A secure authentication scheme for VANETs with batch verification [J].
Bayat, Majid ;
Barmshoory, Mostafa ;
Rahimi, Majid ;
Aref, Mohammd Reza .
WIRELESS NETWORKS, 2015, 21 (05) :1733-1743
[3]   Short group signatures [J].
Boneh, D ;
Boyen, X ;
Shacham, H .
ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 :41-55
[4]  
Calandriello G, 2007, VANET'07: PROCEEDINGS OF THE FOURTH ACM INTERNATIONAL WORKSHOP ON VEHICULAR AD HOC NETWORKS, P19
[5]  
CHAUM D, 1991, LECT NOTES COMPUT SC, V547, P257
[6]  
Delgrossi L., 2012, VEHICLE SAFETY COMMU
[7]  
Gu Z., 2021, IEEE T MOBILE COMPUT, V20, P3211
[8]   Gradient Shielding: Towards Understanding Vulnerability of Deep Neural Networks [J].
Gu, Zhaoquan ;
Hu, Weixiong ;
Zhang, Chuanjing ;
Lu, Hui ;
Yin, Lihua ;
Wang, Le .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (02) :921-932
[9]   Efficient Rendezvous for Heterogeneous Interference in Cognitive Radio Networks [J].
Gu, Zhaoquan ;
Shen, Tong ;
Wang, Yuexuan ;
Lau, Francis C. M. .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2020, 19 (01) :91-105
[10]   Challenges and research directions for Internet of Things [J].
Hammoudi, Sarra ;
Aliouat, Zibouda ;
Harous, Saad .
TELECOMMUNICATION SYSTEMS, 2018, 67 (02) :367-385