A new provable hierarchical anonymous certificateless authentication protocol with aggregate verification in ADS-B systems

被引:21
作者
Asari, Amirhossein [1 ]
Alagheband, Mahdi R. [2 ]
Bayat, Majid [3 ]
Asaar, Maryam Rajabzadeh [1 ]
机构
[1] IAU, Dept Elect & Comp Engn, Sci & Res Branch, Tehran, Iran
[2] Ryerson Univ, Cybersecur Res Lab CRL, Toronto, ON, Canada
[3] Shahed Univ, Dept Elect & Comp Engn, Tehran, Iran
关键词
Digital signature; Certificateless aggregate signature; Random oracle model; Privacy-preserving; Surveillance-broadcast systems; SIGNATURE SCHEME; EFFICIENT; SECURE; INTERNET;
D O I
10.1016/j.comnet.2020.107599
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Automatic Dependent Surveillance-Broadcast (ADS-B) technology is a new solution for communication among aircraft and ground controller stations. In this new surveillance technology, critical messages (e.g., the location of aircraft) are achieved by navigation satellites, and then an on-board equipment multicasts the unencrypted messages twice per second to the others. The former ADS-B protocols suffer from weak authentication protocols with a few security vulnerabilities and privacy issues including key-escrow problem, user profiling, time consuming verification processes, and difficulties with certificate management. In this paper, we propose a new hierarchical authentication protocol used Certificateless Public Key Cryptography (CL-PKC) technique to avoid using Public Key Infrastructure (PKI) certificate management and solve the key-escrow concern in Identity-based Public Key Cryptography (ID-PKC). Further, unlike many of certificateless schemes, our proposed scheme is secure against malicious-but-passive Key Generation Center (KGC). We prove that our scheme preserves conditional privacy, which means that distinct identities map to varied pseudonyms. The security and privacy features of our scheme are provably modeled under the widely-accepted random oracle model by computational Diffie-Hellman (CDH) assumption against adaptive chosen-message attack. Finally, we show that the time needed to aggregate verification of 50 messages reduced by 84% and 48% compared to those of Yang et al.'s and He et al.'s schemes respectively.
引用
收藏
页数:11
相关论文
共 48 条
[1]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[2]  
Angelilli M, 2017, IEEE RAD CONF, P1681, DOI 10.1109/RADAR.2017.7944477
[3]  
[Anonymous], 2002, RFC 3279
[4]  
Boneh D, 2003, LECT NOTES COMPUT SC, V2656, P416
[5]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[6]   Cryptanalysis and improvement of a certificateless aggregate signature scheme [J].
Cheng, Lin ;
Wen, Qiaoyan ;
Jin, Zhengping ;
Zhang, Hua ;
Zhou, Liming .
INFORMATION SCIENCES, 2015, 295 :337-346
[7]   ADS-B, Friend or Foe: ADS-B Message Authentication for NextGen Aircraft [J].
Cook, Emily .
2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, :1256-1261
[8]   A new provably secure certificateless signature scheme for Internet of Things [J].
Du, Hongzhen ;
Wen, Qiaoyan ;
Zhang, Shanshan ;
Gao, Mingchu .
AD HOC NETWORKS, 2020, 100
[9]   Privacy-Preserving Schemes for Ad Hoc Social Networks: A Survey [J].
Ferrag, Mohamed Amine ;
Maglaras, Leandros ;
Ahmim, Ahmed .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (04) :3015-3045
[10]   An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks [J].
Gope, Prosanta ;
Hwang, Tzonelih .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 62 :1-8