TEAM: Trust-Extended Authentication Mechanism for Vehicular Ad Hoc Networks

被引:123
作者
Chuang, Ming-Chin [1 ]
Lee, Jeng-Farn [2 ]
机构
[1] Acad Sinica, Res Ctr Informat Technol Innovat, Taipei 115, Taiwan
[2] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chiayi 621, Taiwan
来源
IEEE SYSTEMS JOURNAL | 2014年 / 8卷 / 03期
关键词
Authentication; decentralized; lightweight; trust-extended; vehicular ad hoc networks (VANETs); SECURITY ENHANCEMENT; EFFICIENT; DISSEMINATION; PRIVACY; SCHEME;
D O I
10.1109/JSYST.2012.2231792
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security of vehicular ad hoc networks (VANETs) has been receiving a significant amount of attention in the field of wireless mobile networking because VANETs are vulnerable to malicious attacks. A number of secure authentication schemes based on asymmetric cryptography have been proposed to prevent such attacks. However, these schemes are not suitable for highly dynamic environments such as VANETs, because they cannot efficiently cope with the authentication procedure. Hence, this still calls for an efficient authentication scheme for VANETs. In this paper, we propose a decentralized lightweight authentication scheme called trust-extended authentication mechanism (TEAM) for vehicle-to-vehicle communication networks. TEAM adopts the concept of transitive trust relationships to improve the performance of the authentication procedure and only needs a few storage spaces. Moreover, TEAM satisfies the following security requirements: anonymity, location privacy, mutual authentication, forgery attack resistance, modification attack resistance, replay attack resistance, no clock synchronization problem, no verification table, fast error detection, perfect forward secrecy, man-in-the-middle attack resistance, and session key agreement.
引用
收藏
页码:749 / 758
页数:10
相关论文
共 25 条
[1]  
[Anonymous], 2010, PROCEEDING IEEE WIRE
[2]  
[Anonymous], P ACM HOTMOBILE 2008
[3]   Security enhancement on an improvement on two remote user authentication schemes using smart cards [J].
Chen, Tien-Ho ;
Hsiang, Han-Cheng ;
Shih, Wei-Kuan .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING-THEORY METHODS AND APPLICATIONS, 2011, 27 (04) :377-380
[4]  
Freudiger J., 2007, WIN ITS
[5]  
Guettel G, 2008, LECT NOTES COMPUT SC, V5019, P106, DOI 10.1007/978-3-540-79966-5_8
[6]   The security and privacy of smart vehicles [J].
Hubaux, JP ;
Capkun, S ;
Luo, J .
IEEE SECURITY & PRIVACY, 2004, 2 (03) :49-55
[7]  
Karnadi F.K., 2007, IEEE WIRELESS COMMUN, P2506, DOI DOI 10.1109/WCNC.2007.467
[8]   Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme' [J].
Khan, Muhammad Khurram ;
Kim, Soo-Kyun ;
Alghathbar, Khaled .
COMPUTER COMMUNICATIONS, 2011, 34 (03) :305-309
[9]   A secure dynamic ID based remote user authentication scheme for multi-server environment using smart cards [J].
Lee, Cheng-Chi ;
Lin, Tsung-Hung ;
Chang, Rui-Xiang .
EXPERT SYSTEMS WITH APPLICATIONS, 2011, 38 (11) :13863-13870
[10]   An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards [J].
Li, Xiong ;
Xiong, Yongping ;
Ma, Jian ;
Wang, Wendong .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (02) :763-769