Efficient and Secure Authentication Scheme with Conditional Privacy-Preserving for VANETs

被引:17
作者
Xie Yong [1 ,2 ]
Wu Libing [1 ,3 ]
Zhang Yubo [1 ]
Shen Jian [4 ]
机构
[1] Wuhan Univ, Sch Comp Sci, Wuhan 430072, Peoples R China
[2] Jingdezhen Ceram Inst, Sch Informat & Engn, Jingdezhen 333403, Peoples R China
[3] Wuhan Univ, State Key Lab Software Engn, Wuhan 430072, Peoples R China
[4] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing 210044, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
VANETs; Authentication scheme; Security; Conditional privacy-preservation; Efficiency; VEHICULAR-SENSOR-NETWORKS; AD HOC NETWORKS; KEY AGREEMENT SCHEME; BATCH VERIFICATION; PROTOCOL; IDENTITY;
D O I
10.1049/cje.2016.08.027
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The goal of authentication scheme for Vehicular ad hoc networks (VANETs) is to ensure reliability and integrity of message. Due to the timeliness of traffic-related messages and the highly dynamic nature of VANETs, it still is a challenge to solve the three key issues simultaneously, i.e. security, efficiency and conditional privacy-preserving, on the design of authentication scheme for VANETs. To address this challenge, an efficient Conditional privacy-preserving authentication (CPPA) scheme is proposed in this paper. Compared with the most recent proposed CPPA schemes, our proposed scheme markedly decreases the computation costs of the message-signing phase and the message verification phase, while satisfies all security requirements of VANETs and provides conditional privacy-preserving.
引用
收藏
页码:950 / 956
页数:7
相关论文
共 24 条
[1]  
[Anonymous], INT J NETWORKS
[2]   A secure authentication scheme for VANETs with batch verification [J].
Bayat, Majid ;
Barmshoory, Mostafa ;
Rahimi, Majid ;
Aref, Mohammd Reza .
WIRELESS NETWORKS, 2015, 21 (05) :1733-1743
[3]   SPECS: Secure and privacy enhancing communications schemes for VANETs [J].
Chim, T. W. ;
Yiu, S. M. ;
Hui, Lucas C. K. ;
Li, Victor O. K. .
AD HOC NETWORKS, 2011, 9 (02) :189-203
[4]  
Freudiger J., 2007, WIN ITS
[5]   A Variable Threshold-Value Authentication Architecture for Wireless Mesh Networks [J].
Guo, Ping ;
Wang, Jin ;
Geng, Xue Hua ;
Kim, Chang Seob ;
Kim, Jeong-Uk .
JOURNAL OF INTERNET TECHNOLOGY, 2014, 15 (06) :929-935
[6]   A tutorial survey on vehicular ad hoc networks [J].
Hartenstein, Hannes ;
Laberteaux, Kenneth P. .
IEEE COMMUNICATIONS MAGAZINE, 2008, 46 (06) :164-171
[7]  
He D., 2016, IEEE SYSTEM J, V21, P1
[8]   One-to-many authentication for access control in mobile pay-TV systems [J].
He, Debiao ;
Kumar, Neeraj ;
Shen, Han ;
Lee, Jong-Hyouk .
SCIENCE CHINA-INFORMATION SCIENCES, 2016, 59 (05)
[9]   A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks [J].
He, Debiao ;
Kumar, Neeraj ;
Chilamkurti, Naveen .
INFORMATION SCIENCES, 2015, 321 :263-277
[10]   Authentication Protocol for an Ambient Assisted Living System [J].
He, Debiao ;
Zeadally, Sherali .
IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (01) :71-77