Privacy-preserving authentication scheme for on-road on-demand refilling of pseudonym in VANET

被引:21
作者
Benarous, Leila [1 ]
Kadri, Benamar [2 ]
Bitam, Salim [3 ]
Mellouk, Abdelhamid [4 ]
机构
[1] Univ Abou Bekr Belkaid Tlemcen, Fac Sci, Dept Comp Sci, STIC Lab, Tilimsen, Algeria
[2] Univ Abou Bekr Belkaid Tlemcen, Fac Technol, Dept Telecommun, STIC Lab, Tilimsen, Algeria
[3] Univ Biskra, Dept Comp Sci, LESIA Lab, Biskra, Algeria
[4] Univ Paris Est Creteil, Dept Networks & Telecom, LISSI Lab, Creteil, France
关键词
AVISPA; anonymously authenticate; BAN logic; on-demand pseudonym refilling; privacy-preserving scheme; SPAN; SECURITY; CLOUD;
D O I
10.1002/dac.4087
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Privacy in Vehicular Ad Hoc Networks (VANET) is fundamental because the user's safety may be threatened by the identity and the real-time spatiotemporal data exchanged on the network. This issue is commonly addressed by the use of certified temporal pseudonyms and their updating strategies to ensure the user's unlinkability and anonymity. IEEE 1609.2 Standard specified the process of certifying pseudonym along with certificates structure. However, the communication procedure between the certifying authority and the requesting vehicle was not defined. In this paper, a new privacy-preserving solution for pseudonym on-road on-demand refilling is proposed where the vehicle anonymously authenticates itself to the regional authority subsidiary of the central trusted authority to request a new pseudonyms pool. The authentication method has two phases, the first one uses anonymous tickets, and the second one is a challenge-based authentication. The anonymous tickets are certificates that do not include the identity of the user. Instead, it contains a reference number and the certifying authority signature. The challenge authentication is identity-less to preserve the privacy, yet it is used to prevent the misuse of tickets and the impersonation of its owner. Our proposed scheme is analyzed by the use of Burrows, Abadi and Needham (BAN) logic to demonstrate its correctness. It is also specified and checked by using the Security Protocol ANimator (SPAN) and the Automated Validation of Internet Security Protocols and Applications (AVISPA) tools. The logical demonstration proved that this privacy-preserving authentication is assured. The SPAN and AVISPA tools illustrated that it is resilient to security attacks.
引用
收藏
页数:19
相关论文
共 32 条
[1]   Efficient and secure business model for content centric network using elliptic curve cryptography [J].
Adhikari, Sharmistha ;
Ray, Sangram ;
Biswas, Gosta P. ;
Obaidat, Mohammad S. .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (01)
[2]  
Alexiou N., 2013, Proceedings of the 2nd ACM workshop on hot topics on wireless network security and privacy, P19
[3]   An anonymous and robust multi-server authentication protocol using multiple registration servers [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Obaidat, Mohammad S. ;
Biswas, G. P. ;
Hsiao, Kuei-Fang .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (18)
[4]  
[Anonymous], 2010, PROC IEEE WIRELESS C
[5]  
[Anonymous], THESIS
[6]  
Avispa Team, 2006, HLPSL TUT
[7]  
Benaissa K, PERS IND MOB RAD COM, P1
[8]  
Benarous L, 7 IEEE INT C SMART C
[9]  
Benarous L, 2017, SIGNAL PROC SEC TEC, P371, DOI 10.1007/978-3-319-47301-7_15
[10]  
Benarous L, 2017, 2017 SEVENTH INTERNATIONAL CONFERENCE ON EMERGING SECURITY TECHNOLOGIES (EST), P1, DOI 10.1109/EST.2017.8090390