A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs

被引:131
作者
Islam, S. K. Hafizul [1 ]
Obaidat, Mohammad S. [2 ]
Vijayakumar, Pandi [3 ]
Abdulhay, Enas [4 ]
Li, Fagen [5 ]
Reddy, M. Krishna Chaitanya [6 ]
机构
[1] Indian Inst Informat Technol Kalyani, Dept Comp Sci & Engn, Kalyani 741235, W Bengal, India
[2] Fordham Univ, Dept Comp & Informat Sci, Bronx, NY 10458 USA
[3] Univ Coll Engn, Dept Comp Sci & Engn, Melpakkam 604001, Tamil Nadu, India
[4] Jordan Univ Sci & Technol, Dept Biomed Engn, Irbid, Jordan
[5] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Sichuan, Peoples R China
[6] LatentView Analyt Pvt Ltd, Madras 600113, Tamil Nadu, India
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2018年 / 84卷
关键词
VANET; Group-key; Conditional privacy; Road-side-unit; On-board-unit; Hash function; BATCH VERIFICATION; SCHEME; SECURE;
D O I
10.1016/j.future.2017.07.002
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the rapid growth of information and communication technology (ICT) and Internet of things (IoT), the concept of smart-city is recently introduced by the government of many countries to improve the living environment of urban people. In city areas, the numbers of vehicles are increased exponentially day-by-day. Therefore, it is very difficult to control and manage the city traffic caused by tens of thousands vehicles. The Vehicular Ad-hoc Network (VANET) is used to communicate with the vehicles to give alert for weather conditions, road defects, traffic conditions, etc. and the conditions of the vehicle including location, speed, traffic status, etc. Therefore, the traffic efficiency and safety of the vehicles can be improved with the help of VANET. To serve this purpose, in the literature, many conditional privacy preserving authentication (CPPA) protocols based on CA-PKC (certificate authority-based public key cryptography), and ID-PKC (identity-based public key cryptography) have been put forwarded. In addition, some of these CPPA protocols use elliptic curve or bilinear-pairing for their implementation. The computation cost for bilinear-pairing and elliptic curve is very high compared to the cryptographic general hash function. Therefore, all the earlier protocols suffer from the heavy computational burden and some security weaknesses as well. Therefore, bilinear-pairing-free, robust and efficient CPPA with group-key agreement protocol for VANETs is essential. This paper presents a password-based conditional privacy preserving authentication and group-key generation (PW-CPPA-GKA) protocol for VANETs. Our protocol offers group-key generation, user leaving, user join, and password change facilities. Our protocol is lightweight in terms computation and communication since it can be designed without bilinear-pairing and elliptic curve. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:216 / 227
页数:12
相关论文
共 34 条
[1]   A secure authentication scheme for VANETs with batch verification [J].
Bayat, Majid ;
Barmshoory, Mostafa ;
Rahimi, Majid ;
Aref, Mohammd Reza .
WIRELESS NETWORKS, 2015, 21 (05) :1733-1743
[2]   Cloud computing adoption framework: A security framework for business clouds [J].
Chang, Victor ;
Kuo, Yen -Hung ;
Ramachandran, Muthu .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 57 :24-41
[3]   The Business Intelligence as a Service in the Cloud [J].
Chang, Victor .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 37 :512-534
[4]   SPECS: Secure and privacy enhancing communications schemes for VANETs [J].
Chim, T. W. ;
Yiu, S. M. ;
Hui, Lucas C. K. ;
Li, Victor O. K. .
AD HOC NETWORKS, 2011, 9 (02) :189-203
[5]  
Freudiger J., 2007, WIN ITS
[6]  
Gamage C, 2006, 2006 SECURECOMM AND WORKSHOPS, P257
[7]   Detecting misbehaviors in VANET with integrated root-cause analysis [J].
Ghosh, Mainak ;
Varghese, Anitha ;
Gupta, Arobinda ;
Kherani, Arzad A. ;
Muthaiah, Skanda N. .
AD HOC NETWORKS, 2010, 8 (07) :778-790
[8]   Anonymous Authentication for Wireless Body Area Networks With Provable Security [J].
He, Debiao ;
Zeadally, Sherali ;
Kumar, Neeraj ;
Lee, Jong-Hyouk .
IEEE SYSTEMS JOURNAL, 2017, 11 (04) :2590-2601
[9]   One-to-many authentication for access control in mobile pay-TV systems [J].
He, Debiao ;
Kumar, Neeraj ;
Shen, Han ;
Lee, Jong-Hyouk .
SCIENCE CHINA-INFORMATION SCIENCES, 2016, 59 (05)
[10]   An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks [J].
He, Debiao ;
Zeadally, Sherali ;
Xu, Baowen ;
Huang, Xinyi .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (12) :2681-2691