Securing Information Exchange in VANETs by Using Pairing-Based Cryptography

被引:4
作者
Chen, Chin-Ling [1 ,2 ]
Shin, Jungpil [3 ]
Tsai, Yu-Ting [1 ]
Castiglione, Aniello [4 ]
Palmieri, Francesco [4 ]
机构
[1] Chaoyang Univ Technol, Dept Comp Sci & Informat Engn, Taichung 41349, Taiwan
[2] Changchun Univ Sci & Technol, Sch Informat Engn, Changchun 130600, Jilin, Peoples R China
[3] Univ Aizu, Aizu Wakamatsu, Fukushima 9658580, Japan
[4] Univ Salerno, Dept Comp Sci, I-84084 Fisciano, SA, Italy
关键词
Authentication; pairing-based cryptography; anonymity; VANET; PRIVACY-PRESERVING AUTHENTICATION; SCHEME;
D O I
10.1142/S0129054117400184
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Vehicular Ad Hoc Networks are mainly implemented to enable the interchange of huge amount of information among vehicles and between vehicles and control entities such as road side units or base stations, providing support for a comfortable and safe driving experience. However, due to the recent proliferation of cybersecurity threats, securing such a critical exchange of information becomes a fundamental prerequisite. In this paper, we propose a novel security scheme based on bilinear pairing-based cryptography to improve the security of the information exchanged in VANETs. Such scheme relies on the Elliptic Curve Discrete Logarithm Problem to provide anonymity and robust security features, and on Message Authentication Codes for verifying the vehicles' identities. The proposed solution is able to achieve mutual authentication between involved entities and prevent impersonation, replay and insider attacks, at the expense of minimum overhead so that also big-data scale communications can be safely supported in the VANET environment.
引用
收藏
页码:781 / 797
页数:17
相关论文
共 24 条
[1]   Efficient and Stable Routing Algorithm Based on User Mobility and Node Density in Urban Vehicular Network [J].
Al-Mayouf, Yusor Rafid Behar ;
Ismail, Mahamod ;
Abdullah, Nor Fadzilah ;
Wahab, Ainuddin Wahid Abdul ;
Mandi, Omar Adil ;
Khan, Suleman ;
Choo, Kim-Kwang Raymond .
PLOS ONE, 2016, 11 (11)
[2]  
[Anonymous], LNCS
[3]   Advanced formation and delivery of traffic information in intelligent transportation systems [J].
Cheng, Hsu-Yung ;
Gau, Victor ;
Huang, Chih-Wei ;
Hwang, Jenq-Neng .
EXPERT SYSTEMS WITH APPLICATIONS, 2012, 39 (09) :8356-8368
[4]   MLAS: Multiple level authentication scheme for VANETs [J].
Chim, T. W. ;
Yiu, S. M. ;
Hui, Lucas C. K. ;
Li, Victor O. K. .
AD HOC NETWORKS, 2012, 10 (07) :1445-1456
[5]   SPECS: Secure and privacy enhancing communications schemes for VANETs [J].
Chim, T. W. ;
Yiu, S. M. ;
Hui, Lucas C. K. ;
Li, Victor O. K. .
AD HOC NETWORKS, 2011, 9 (02) :189-203
[6]  
Choo K.-K.R., 2017, FUTURE GENERATION CO
[7]   A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps [J].
D'Orazio, Christian J. ;
Lu, Rongxing ;
Choo, Kim-Kwang Raymond ;
Vasilakos, Athanasios V. .
APPLIED MATHEMATICS AND COMPUTATION, 2017, 293 :523-544
[8]  
Fang H., 2017, COMPUTER CO IN PRESS
[9]   Stackelberg game based relay selection for physical layer security and energy efficiency enhancement in cognitive radio networks [J].
Fang, He ;
Xu, Li ;
Choo, Kim-Kwang Raymond .
APPLIED MATHEMATICS AND COMPUTATION, 2017, 296 :153-167
[10]  
Feng Zhang, 2010, Proceedings 2010 3rd IEEE International Conference on Broadband Network & Multimedia Technology (IC-BNMT 2010), P619, DOI 10.1109/ICBNMT.2010.5705164