An Efficient Anonymous Batch Authentication Scheme Based on HMAC for VANETs

被引:203
作者
Jiang, Shunrong [1 ]
Zhu, Xiaoyan [1 ]
Wang, Liangmin [2 ,3 ]
机构
[1] Xidian Univ, Natl Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] Jiangsu Univ, Dept Internet Things, Zhenjiang 212013, Peoples R China
[3] Anhui Univ, Coinnovat Ctr Informat Supply & Assurance Technol, Hefei 230039, Peoples R China
基金
中国国家自然科学基金;
关键词
Certificate Revocation Lists (CRLs); hash message authentication code (HMAC); pseudonym; privacy-preserving authentication; vehicular ad hoc networks (VANETs); PRIVACY-PRESERVING AUTHENTICATION; PROTOCOL; SECURE;
D O I
10.1109/TITS.2016.2517603
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
In vehicular ad hoc networks (VANETs), when a vehicle receives a message, the certificate revocation list (CRL) checking process will operate before certificate and signature verification. However, large communication sources, storage space, and checking time are needed for CRLs that cause the privacy disclosure issue as well. To address these issues, in this paper, we propose an efficient anonymous batch authentication scheme (ABAH) to replace the CRL checking process by calculating the hash message authentication code (HMAC). In our scheme, we first divide the precinct into several domains, in which road-side units (RSUs) manage vehicles in a localized manner. Then, we adopt pseudonyms to achieve privacy-preserving and realize batch authentication by using an identity-based signature (IBS). Finally, we use HMAC to avoid the time-consuming CRL checking and to ensure the integrity of messages that may get loss in previous batch authentication. The security and performance analysis are carried out to demonstrate that ABAH is more efficient in terms of verification delay than the conventional authentication methods employing CRLs. Meanwhile, our solution can keep conditional privacy in VANETs.
引用
收藏
页码:2193 / 2204
页数:12
相关论文
共 33 条
  • [1] An-Ni Shen, 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC), P2543, DOI 10.1109/WCNC.2012.6214227
  • [2] [Anonymous], 2005, Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN'05
  • [3] [Anonymous], 2006, IEEE STD 16092 2006, DOI DOI 10.1109/IEEESTD.2006
  • [4] [Anonymous], EFFICIENT IMPLEMENTA
  • [5] [Anonymous], GLOB TEL C 2008 IEEE
  • [6] Ashwini N. H., 2014, INT J COMPUT TECHNOL, V1, P162
  • [7] Boneh D, 2003, LECT NOTES COMPUT SC, V2656, P416
  • [8] Identity-based encryption from the Weil pairing
    Boneh, D
    Franklin, M
    [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
  • [9] Calandriello G, 2007, VANET'07: PROCEEDINGS OF THE FOURTH ACM INTERNATIONAL WORKSHOP ON VEHICULAR AD HOC NETWORKS, P19
  • [10] Chen Q., 80211 IEEE