A lightweight authentication and privacy-preserving scheme for VANETs using TESLA and Bloom Filters

被引:22
作者
Bao, Shihan [1 ]
Hathal, Waleed [1 ]
Cruickshank, Haitham [1 ]
Sun, Zhili [1 ]
Asuquo, Phillip [1 ]
Lei, Ao [1 ]
机构
[1] Univ Surrey, ICS, Guildford, Surrey, England
来源
ICT EXPRESS | 2018年 / 4卷 / 04期
基金
英国工程与自然科学研究理事会;
关键词
Bloom Filters; Authentication; Privacy; VANETs; TESLA;
D O I
10.1016/j.icte.2017.12.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In Vehicular Ad hoc Networks (VANETs), broadcasted beacon messages are critical as most safety applications rely on them. However, the design of a secure broadcast authentication faces many security and privacy challenges as vehicles are vulnerable to active attacks and the revealing of location. In this paper, we propose a lightweight authentication scheme using Timed Efficient Stream Loss-Tolerant Authentication (TESLA) scheme and Bloom Filters that not only prevents active attacks but also adds a privacy-preserving feature to make the scheme have better performance. Simulation results indicate the scheme outperforms the existing schemes in terms of verification time and the level of anonymity. (C) 2017 The Korean Institute of Communications and Information Sciences (KICS). Publishing Services by Elsevier B.V.
引用
收藏
页码:221 / 227
页数:7
相关论文
共 14 条
[1]  
[Anonymous], 2009, PROC 6 ANN IEEE COMM
[2]   A Pseudonym Management System to Achieve Anonymity in Vehicular Ad Hoc Networks [J].
Artail, Hassan ;
Abbani, Noor .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (01) :106-119
[3]   SPACE/TIME TRADE/OFFS IN HASH CODING WITH ALLOWABLE ERRORS [J].
BLOOM, BH .
COMMUNICATIONS OF THE ACM, 1970, 13 (07) :422-&
[4]   TEAM: Trust-Extended Authentication Mechanism for Vehicular Ad Hoc Networks [J].
Chuang, Ming-Chin ;
Lee, Jeng-Farn .
IEEE SYSTEMS JOURNAL, 2014, 8 (03) :749-758
[5]  
Eckhoff D., 2010, Proceedings 2010 IEEE Vehicular Networking Conference (VNC 2010), P174, DOI 10.1109/VNC.2010.5698239
[6]   SlotSwap: Strong and Affordable Location Privacy in Intelligent Transportation Systems [J].
Eckhoff, David ;
German, Reinhard ;
Sommer, Christoph ;
Dressler, Falko ;
Gansen, Tobias .
IEEE COMMUNICATIONS MAGAZINE, 2011, 49 (11) :126-133
[7]  
Freudiger J, 2007, P ASS COMP MACH WORK
[8]   Achieving Guaranteed Anonymity in GPS Traces via Uncertainty-Aware Path Cloaking [J].
Hoh, Baik ;
Gruteser, Marco ;
Xiong, Hui ;
Alrabady, Ansaf .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2010, 9 (08) :1089-1107
[9]   Dedicated Short-Range Communications (DSRC) Standards in the United States [J].
Kenney, John B. .
PROCEEDINGS OF THE IEEE, 2011, 99 (07) :1162-1182
[10]   PBA: Prediction-Based Authentication for Vehicle-to-Vehicle Communications [J].
Lyu, Chen ;
Gu, Dawu ;
Zeng, Yunze ;
Mohapatra, Prasant .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (01) :71-83