Secure and efficient cache-based authentication scheme for vehicular ad-hoc networks

被引:4
作者
Kumar, Pankaj [1 ]
Om, Hari [1 ]
机构
[1] Indian Inst Technol, Dept Comp Sci & Engn, Dhanbad, Jharkhand, India
关键词
VANET; Authentication; Key agreement; Anonymity; Unlinkability; Security; PRIVACY-PRESERVING AUTHENTICATION; KEY AGREEMENT SCHEME; PROTOCOL; VANETS;
D O I
10.1007/s11276-022-03003-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the emerging Vehicular Ad-hoc Network (VANET), real-time applications have come into existence nowadays. However, because of the wireless environment used in VANET, ensuring vehicle user (V-i) authentication and securing the communication against various active and passive attacks are essential. Traditionally, such challenges have been addressed with the help of a Trusted Authority (TA). Each time Roadside Unit (RSU) needs to authenticate V-i (newly/previously visited), it has to communicate with TA. We believe that this kind of arrangement will lead to unnecessary computation and communication overheads. This article introduces a secure and efficient cache-based authentication scheme for vehicular ad-hoc networks. Our proposed scheme utilizes Elliptic Curve Cryptography and divided into two different phases. The first phase (cache miss) deals with caching of identities (pseudonyms) of newly visited V-i into at RSU. During this process RSU authenticates such V-i through TA. The second phase (cache hit) deals with authentication of any previously visited V-i based on the RSU's cache entries (without communicating with TA). Due to this arrangement, the proposed protocol requires relatively less authentication delay as compare to the traditional authentication schemes without affecting desired security and design properties. Additionally, the performance analysis section shows that our protocol may be considered for low-power practical applications of VANET due to its enhanced security and reduced computation and communication overheads.
引用
收藏
页码:2821 / 2836
页数:16
相关论文
共 48 条
  • [31] Rafaeli S., 2001, P AISB 01 S INF AG E, V2001, P33
  • [32] Security in wireless communication
    Rahman, MG
    Imai, H
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2002, 22 (02) : 213 - 228
  • [33] Securing vehicular ad hoc networks
    Raya, Maxim
    Hubaux, Jean-Pierre
    [J]. JOURNAL OF COMPUTER SECURITY, 2007, 15 (01) : 39 - 68
  • [34] Rogaway P, 2004, LECT NOTES COMPUT SC, V3017, P371
  • [35] Roy P.K., 2018, METHODOLOGIES APPL I, P153, DOI 10.1007/978-981-13-2345-4_12
  • [36] Desynchronization resistant privacy preserving user authentication protocol for location based services
    Roy, Prasanta Kumar
    Bhattacharya, Ansuman
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (06) : 3619 - 3633
  • [37] A Survey of Security Services, Attacks, and Applications for Vehicular Ad Hoc Networks (VANETs)
    Sheikh, Muhammad Sameer
    Liang, Jun
    Wang, Wensong
    [J]. SENSORS, 2019, 19 (16)
  • [38] Suárez-Albela M, 2018, 2018 GLOBAL INTERNET OF THINGS SUMMIT (GIOTS), P246
  • [39] Team T., 2006, AVISPA V1 1 USER MAN
  • [40] Secure two-factor lightweight authentication protocol using self-certified public key cryptography for multi-server 5G networks
    ul Haq, Inam
    Wang, Jian
    Zhu, Youwen
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 161