Efficient Conditional Anonymity With Message Integrity and Authentication in a Vehicular Ad-Hoc Network

被引:60
作者
Alazzawi, Murtadha A. [1 ,2 ]
Lu, Hongwei [1 ]
Yassin, Ali A. [3 ]
Chen, Kai [1 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan 430074, Hubei, Peoples R China
[2] Imam Al Kadhum Coll IKC, Dept Comp Tech Engn, Baghdad 10001, Iraq
[3] Univ Basrah, Educ Coll Pure Sci, Comp Sci Dept, Basrah 61004, Iraq
基金
中国国家自然科学基金;
关键词
VANET; elliptic curve; anonymity; authentication; revocation; pseudonym; PSEUDONYMOUS AUTHENTICATION; BATCH VERIFICATION; ELLIPTIC-CURVES; PRIVACY; SCHEME; SECURE; PROTOCOL; VANET;
D O I
10.1109/ACCESS.2019.2919973
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Vehicles in a vehicular ad-hoc network (VANET) broadcast beacons giving safety-related and traffic information. In an open-access environment, this means that the VANET is susceptible to security and privacy issues. In this paper, we propose a new pseudo-identity-based scheme for conditional anonymity with integrity and authentication in a VANET. The proposed scheme uses a pseudonym in the joining process with the road-side unit (RSU) to protect the real identity even from the RSU, in case it is compromised. All previous identity-based schemes have been prone to insider attackers, and have not met the revocation process. Our scheme resolves these drawbacks as the vehicle signs the beacon with a signature obtained from the RSU. Our scheme satisfies the requirements for security and privacy, and especially the requirements for message integrity and authentication, privacy preservation, non-repudiation, traceability, and revocation. In addition, it provides conditional anonymity to guarantee the protection of an honest vehicle's real identity, unless malicious activities are detected. It is also resistant to common attacks such as modification, replay, impersonation, and man-in-the-middle (MITM) attacks. Although the numerous existing schemes have used a bilinear pairing operation, our scheme does not depend on this due to the complex operations involved, which cause significant computation overhead. Furthermore, it does not have a certification revocation list, giving rise to significant costs due to storage and inefficient communication. Our analysis demonstrates that our scheme can satisfy the security and privacy requirements of a VANET more effectively than previous schemes. We also compare our scheme with the recently proposed schemes in terms of communication and computation and demonstrate its cost-efficiency and appropriateness in working with the VANET. Meanwhile, the computation costs of the beacon signing and verification in our scheme are reduced by 49.9% and 33.3%, respectively.
引用
收藏
页码:71424 / 71435
页数:12
相关论文
共 31 条
  • [1] [Anonymous], INT J NETW SECUR
  • [2] [Anonymous], 2016, REPORTED ROAD CASUAL
  • [3] A lightweight authentication and privacy-preserving scheme for VANETs using TESLA and Bloom Filters
    Bao, Shihan
    Hathal, Waleed
    Cruickshank, Haitham
    Sun, Zhili
    Asuquo, Phillip
    Lei, Ao
    [J]. ICT EXPRESS, 2018, 4 (04): : 221 - 227
  • [4] A secure authentication scheme for VANETs with batch verification
    Bayat, Majid
    Barmshoory, Mostafa
    Rahimi, Majid
    Aref, Mohammd Reza
    [J]. WIRELESS NETWORKS, 2015, 21 (05) : 1733 - 1743
  • [5] SPECS: Secure and privacy enhancing communications schemes for VANETs
    Chim, T. W.
    Yiu, S. M.
    Hui, Lucas C. K.
    Li, Victor O. K.
    [J]. AD HOC NETWORKS, 2011, 9 (02) : 189 - 203
  • [6] SPACF: A Secure Privacy-Preserving Authentication Scheme for VANET With Cuckoo Filter
    Cui, Jie
    Zhang, Jing
    Zhong, Hong
    Xu, Yan
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (11) : 10283 - 10295
  • [7] VANET security surveys
    Engoulou, Richard Gilles
    Bellaiche, Martine
    Pierre, Samuel
    Quintero, Alejandro
    [J]. COMPUTER COMMUNICATIONS, 2014, 44 : 1 - 13
  • [8] VANet security challenges and solutions: A survey
    Hasrouny, Hamssa
    Samhat, Abed Ellatif
    Bassil, Carole
    Laouiti, Anis
    [J]. VEHICULAR COMMUNICATIONS, 2017, 7 : 7 - 20
  • [9] An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks
    He, Debiao
    Zeadally, Sherali
    Xu, Baowen
    Huang, Xinyi
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (12) : 2681 - 2691
  • [10] b-SPECS plus : Batch Verification for Secure Pseudonymous Authentication in VANET
    Horng, Shi-Jinn
    Tzeng, Shiang-Feng
    Pan, Yi
    Fan, Pingzhi
    Wang, Xian
    Li, Tianrui
    Khan, Muhammad Khurram
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (11) : 1860 - 1875