Enhancing Security and Privacy for Identity-Based Batch Verification Scheme in VANETs

被引:186
|
作者
Tzeng, Shiang-Feng [1 ]
Horng, Shi-Jinn [1 ,2 ]
Li, Tianrui [2 ]
Wang, Xian [2 ]
Huang, Po-Hsian [3 ]
Khan, Muhammad Khurram [4 ]
机构
[1] Natl Taiwan Univ Sci & Technol, Dept Comp Sci & Informat Engn, Taipei 106, Taiwan
[2] Southwest Jiaotong Univ, Sch Informat Sci & Technol, Chengdu 610031, Peoples R China
[3] Jen Teh Jr Coll Med Nursing & Management, Miaoli 35564, Taiwan
[4] King Saud Univ, Ctr Excellence Informat Assurance, Riyadh 11451, Saudi Arabia
关键词
Authentication; batch verification; privacy; traceability; vehicular ad hoc network (VANET); AD HOC NETWORKS; VEHICULAR-SENSOR-NETWORKS; AUTHENTICATION SCHEME; SIGNATURES; PROTOCOL;
D O I
10.1109/TVT.2015.2406877
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Vehicular ad hoc networks (VANETs) can significantly improve traffic safety and efficiency. The basic idea is to allow vehicles to send traffic information to roadside units (RSUs) or other vehicles. Vehicles have to be prevented from some attacks on their privacy and misuse of their private data. For this reason, security and privacy preservation issues are important prerequisites for VANETs. The identity-based batch verification (IBV) scheme has been recently proposed to make VANETs more secure and efficient for practical use. In this paper, we point out that the current IBV scheme has some security risks. We introduce an improved scheme that can satisfy the security and privacy desired by vehicles. The proposed IBV scheme provides the provable security in the random oracle model. In addition, the batch verification of the proposed scheme needs only a small constant number of pairing and point multiplication computations, independent of the number of messages. We show the efficiency advantages of the proposed scheme through performance evaluations in terms of computation delay and transmission overhead. Moreover, the extensive simulation is conducted to verify the efficiency and applicability of the proposed scheme in the real-world road environment and vehicular traffic.
引用
收藏
页码:3235 / 3248
页数:14
相关论文
共 50 条
  • [41] Anonymous Identity-Based Key Scheme in Application of Privacy Protection
    Shen, Changjiang
    Yang, Lan
    Zhou, Chuansheng
    PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON EDUCATION, SPORTS, ARTS AND MANAGEMENT ENGINEERING (ICESAME 2017), 2017, 123 : 1529 - 1535
  • [42] A Security-Enhanced Identity-Based Batch Provable Data Possession Scheme for Big Data Storage
    Zhao, Jining
    Xu, Chunxiang
    Chen, Kefei
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (09): : 4576 - 4598
  • [43] An identity-based authentication scheme for safety messages in WAVE-enabled VANETs
    Biswas, Subir
    Misic, Jelena
    Misic, Vojislav
    INTERNATIONAL JOURNAL OF PARALLEL EMERGENT AND DISTRIBUTED SYSTEMS, 2012, 27 (06) : 541 - 562
  • [44] A secure access control scheme with batch verification for VANETs
    Wang, Tao
    Kang, Li
    Duan, Jiang
    COMPUTER COMMUNICATIONS, 2023, 205 : 79 - 86
  • [45] Messages Classification and Dynamic Batch Verification Scheme for VANETs
    Ferng, Huei-Wen
    Chen, Jia-Ying
    Lotfolahi, MohammadAmin
    Tseng, Ying-Tsu
    Zhang, Si-Yuan
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2021, 20 (03) : 1156 - 1172
  • [46] Identity-based Group User Data Integrity Verification Scheme
    Yuan Y.-L.
    Zhang J.-B.
    Xu W.-S.
    Li Z.
    Ruan Jian Xue Bao/Journal of Software, 2022, 33 (12): : 4758 - 4770
  • [47] Identity-Based Threshold Group Signature Scheme of Blockchain Verification
    Wang, Lipeng
    Hu, Mingsheng
    Jia, Zhijuan
    Cheng, Yage
    Fu, Junjun
    Wang, Yubo
    Gong, Bei
    TRUSTED COMPUTING AND INFORMATION SECURITY, CTCIS 2019, 2020, 1149 : 144 - 158
  • [48] Secure and Pairing-Free Identity-Based Batch Verification Scheme in Vehicle Ad-Hoc Networks
    Hu, Xiaoming
    Wang, Jian
    Xu, Huajie
    Liu, Yan
    Zhang, Xiaojun
    INTELLIGENT COMPUTING METHODOLOGIES, ICIC 2016, PT III, 2016, 9773 : 11 - 20
  • [49] A Bilinear Mapping Based Ring Signature Scheme with Batch Verification for Applications in VANETs
    Negi, Lalit
    Kumar, Devender
    WIRELESS PERSONAL COMMUNICATIONS, 2024, 134 (04) : 1987 - 2011
  • [50] On the Security of an Identity-Based Proxy Signature Scheme in the Standard Model
    Sun, Ying
    Yu, Yong
    Zhang, Xiaosong
    Chai, Jiwen
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (03) : 721 - 723