Chameleon Hashing for Secure and Privacy-Preserving Vehicular Communications

被引:47
作者
Guo, Song [1 ]
Zeng, Deze [1 ]
Xiang, Yang [2 ]
机构
[1] Univ Aizu, Sch Comp Sci & Engn, Aizu Wakamatsu, Fukushima, Japan
[2] Deakin Univ, Sch Informat Technol, Geelong, Vic 3217, Australia
关键词
Security and privacy; ecliptic curve based chameleon hashing; authentication protocol design; MESSAGE AUTHENTICATION SCHEME;
D O I
10.1109/TPDS.2013.277
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Many services and applications in vehicular ad-hoc networks (VANETs) require preserving and secure data communications. To improve driving safety and comfort, the traffic-related status information will be broadcasted regularly and shared among drivers. Without the security and privacy guarantees, attackers could track their interested vehicles by collecting and analyzing their traffic messages. Hence, anonymous message authentication is an essential requirement of VANETs. On the other hand, when a vehicle is involved in a dispute event of warning message, the certificate authority should be able to recover the real identity of this vehicle. To deal with this issue, we propose a new privacy-preserving authentication protocol with authority traceability using elliptic curve based chameleon hashing. Compared with existing schemes, our approach possesses the following features: 1) mutual and anonymous authentication for both vehicle-to-vehicle and vehicle-to-roadside communications, 2) vehicle unlinkability, 3) authority tracking capability, and 4) high computational efficiency. We also demonstrate the merits of our proposed scheme through security analysis and extensive performance evaluation.
引用
收藏
页码:2794 / 2803
页数:10
相关论文
共 30 条
[1]  
An-Ni Shen, 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC), P2543, DOI 10.1109/WCNC.2012.6214227
[2]  
[Anonymous], TEL 2007 ITST 07 INT
[3]  
[Anonymous], ELLIPTIC CURVES CRYP
[4]  
[Anonymous], EFFICIENT IMPLEMENTA
[5]  
[Anonymous], 2009, PROC 6 ANN IEEE COMM
[6]  
[Anonymous], 2011, PROC 17 ANN INT C MO
[7]  
Ateniese G, 2004, LECT NOTES COMPUT SC, V3110, P164
[8]  
Biswas S, 2010, AD HOC SENS WIREL NE, V10, P177
[9]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[10]  
CHAUM D, 1991, LECT NOTES COMPUT SC, V547, P257