An Efficient and Secure Anonymous Authentication Scheme for VANETs Based on the Framework of Group Signatures

被引:31
作者
Yue, Xiaohan [1 ]
Chen, Bing [1 ]
Wang, Xibo [1 ]
Duan, Yong [1 ]
Gao, Mingchao [2 ]
He, Yuan [1 ]
机构
[1] Shenyang Univ Technol, Sch Informat Sci & Engn, Shenyang 110870, Liaoning, Peoples R China
[2] Jilin Acad Agr Sci, Crops Resources Res Inst, Changchun 130033, Jilin, Peoples R China
关键词
Vehicular ad hoc networks; anonymous authentication; forward security; non-frameability; group signatures; PRIVACY; SYSTEM; ENCRYPTION; PROTOCOL; TREE;
D O I
10.1109/ACCESS.2018.2876126
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Vehicular ad hoc networks (VANETs) have stimulated interests in both academic and industry settings. Once deployed, they would bring a new driving experience to drivers. However, in an open-access environment, privacy is one of the greatest challenges, as drivers want to keep their personal information protected. Therefore, many authentication protocols have been proposed as solutions to the privacy issue. In most of the existing protocols, to prevent the revoked entity from generating a valid authentication information, the verifiers must frequently download the revocation list from one or more remote authorities to keep the list up-to-date, which greatly increases the workload of the remote authority. In this paper, to cope with such challenging concerns, based on the idea of group signatures, we propose a novel authentication protocol scheme by using the complete sub-tree method to achieve membership revocation, which ensures forward security. In our scheme, the verifiers can verify the authentication information by getting the latest epoch t without having to obtain the latest revocation list. In the aspect of security, the proposed protocol is featured with forward security, CCA2-anonymity, unforgeability, non-frameability, and traceability. In addition, our scheme adopts a decentralized group model, so that the whole domain of VANETs is divided into sub-Rregions and any vehicle has to update its non-revoked token periodically from the regional group manager who manages the region where the vehicle stays.
引用
收藏
页码:62584 / 62600
页数:17
相关论文
共 56 条
[1]  
[Anonymous], 1991, Proceedings of Advances in Cryptology
[2]  
[Anonymous], 2009, PROC 6 ANN IEEE COMM
[3]  
[Anonymous], P INT WORKSH THEOR A
[4]   A survey of local/cooperative-based malicious information detection techniques in VANETs [J].
Arshad, Muhammad ;
Ullah, Zahid ;
Ahmad, Naveed ;
Khalid, Muhammad ;
Criuckshank, Haithiam ;
Cao, Yue .
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2018,
[5]  
Ateniese G, 2000, LECT NOTES COMPUT SC, V1880, P255
[6]   Constant-Size Dynamic k-Times Anonymous Authentication [J].
Au, Man Ho ;
Susilo, Willy ;
Mu, Yi ;
Chow, Sherman S. M. .
IEEE SYSTEMS JOURNAL, 2013, 7 (02) :249-261
[7]   EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks [J].
Azees, Maria ;
Vijayakumar, Pandi ;
Deboarh, Lazarus Jegatha .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2017, 18 (09) :2467-2476
[8]  
Blum J., 2004, IT Professional, V6, P24, DOI 10.1109/MITP.2004.1265539
[9]   Short group signatures [J].
Boneh, D ;
Boyen, X ;
Shacham, H .
ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 :41-55
[10]  
Calandriello G, 2007, VANET'07: PROCEEDINGS OF THE FOURTH ACM INTERNATIONAL WORKSHOP ON VEHICULAR AD HOC NETWORKS, P19