A Lightweight Authentication with Dynamic Batch-Based Group Key Management Using LSTM in VANET

被引:4
作者
Shen, Xieyang [1 ,2 ]
Huang, Chuanhe [1 ,2 ]
Pu, Wenxin [1 ,2 ]
Wang, Danxin [1 ,2 ]
机构
[1] Wuhan Univ, Sch Comp Sci, Wuhan, Peoples R China
[2] Collaborat Innovat Ctr Geospatial Technol, Wuhan, Peoples R China
关键词
PRIVACY; VERIFICATION; SCHEME; SECURE;
D O I
10.1155/2022/9779670
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to its complexity and mobility, VANET (vehicle ad hoc network) security has long plagued the development of the IoT industry. It is still a big challenge for users to decide the trustworthiness of an anonymous message or the preservation of personal information. Group signature is widely used in VANET anonymous authentication, but the existing solutions suffer from high computation costs in certificate revocation list (CRL) checking and signature verification process. In our scheme, we develop a lightweight protocol based on hashing functions and group keys, which escapes from the heavy computation cost. Then, we propose a dynamic batch-based group key distribution process, which is based on long short-term memory (LSTM) neural network to predict traffic flow and calculate the weight to determine the right time for key update. In this way, our method will significantly reduce computation delay and communication overhead. The security and performance analyses show that our scheme is more efficient in terms of authentication speed while keeping conditional privacy in VANET.
引用
收藏
页数:11
相关论文
共 28 条
  • [1] EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks
    Azees, Maria
    Vijayakumar, Pandi
    Deboarh, Lazarus Jegatha
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2017, 18 (09) : 2467 - 2476
  • [2] A secure authentication scheme for VANETs with batch verification
    Bayat, Majid
    Barmshoory, Mostafa
    Rahimi, Majid
    Aref, Mohammd Reza
    [J]. WIRELESS NETWORKS, 2015, 21 (05) : 1733 - 1743
  • [3] Short group signatures
    Boneh, D
    Boyen, X
    Shacham, H
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 : 41 - 55
  • [4] Calandriello G, 2007, VANET'07: PROCEEDINGS OF THE FOURTH ACM INTERNATIONAL WORKSHOP ON VEHICULAR AD HOC NETWORKS, P19
  • [5] CHAUM D, 1991, LECT NOTES COMPUT SC, V547, P257
  • [6] Delgrossi L., 2012, VEHICLE SAFETY COMMU
  • [7] Gradient Shielding: Towards Understanding Vulnerability of Deep Neural Networks
    Gu, Zhaoquan
    Hu, Weixiong
    Zhang, Chuanjing
    Lu, Hui
    Yin, Lihua
    Wang, Le
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (02): : 921 - 932
  • [8] Efficient Rendezvous for Heterogeneous Interference in Cognitive Radio Networks
    Gu, Zhaoquan
    Shen, Tong
    Wang, Yuexuan
    Lau, Francis C. M.
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2020, 19 (01) : 91 - 105
  • [9] Challenges and research directions for Internet of Things
    Hammoudi, Sarra
    Aliouat, Zibouda
    Harous, Saad
    [J]. TELECOMMUNICATION SYSTEMS, 2018, 67 (02) : 367 - 385
  • [10] A Distributed Key Management Framework with Cooperative Message Authentication in VANETs
    Hao, Yong
    Cheng, Yu
    Zhou, Chi
    Song, Wei
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2011, 29 (03) : 616 - 629