XIE Yong, WU Libing, ZHANG Yubo, SHEN Jian. Efficient and Secure Authentication Scheme with Conditional Privacy-Preserving for VANETs[J]. Chinese Journal of Electronics, 2016, 25(5): 950-956. doi: 10.1049/cje.2016.08.027
Citation: XIE Yong, WU Libing, ZHANG Yubo, SHEN Jian. Efficient and Secure Authentication Scheme with Conditional Privacy-Preserving for VANETs[J]. Chinese Journal of Electronics, 2016, 25(5): 950-956. doi: 10.1049/cje.2016.08.027

Efficient and Secure Authentication Scheme with Conditional Privacy-Preserving for VANETs

doi: 10.1049/cje.2016.08.027
Funds:  This work is supported by the National Natural Science Foundation of China (No.61272112, No.61472287, No.61300237, No.61402339, No.61572370, No.U1536204), the Science and Technology Support Program of Hubei Province (No.2013BAA004), the Priority Academic Program Development (PAPD) of Jiangsu Higher Education Institutions, and the Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology (CICAEET).
More Information
  • Corresponding author: WU Libing (corresponding author) was born in 1972. He received the B.S. and M.S. degrees from Central China Normal University, Wuhan, China, in 1994 and 2001, respectively, and the Ph.D. degree from Wuhan University, Wuhan, in 2006, all in computer science. He is currently a professor with the Department of Computer Science, Wuhan University. His research interests include wireless sensor networks, network management, and distributed computing. (Email:wu@whu.edu.cn)
  • Received Date: 2015-09-14
  • Rev Recd Date: 2016-02-25
  • Publish Date: 2016-09-10
  • The goal of authentication scheme for Vehicular ad hoc networks (VANETs) is to ensure reliability and integrity of message. Due to the timeliness of traffic-related messages and the highly dynamic nature of VANETs, it still is a challenge to solve the three key issues simultaneously, i.e. security, efficiency and conditional privacy-preserving, on the design of authentication scheme for VANETs. To address this challenge, an efficient Conditional privacy-preserving authentication (CPPA) scheme is proposed in this paper. Compared with the most recent proposed CPPA schemes, our proposed scheme markedly decreases the computation costs of the message-signing phase and the message verification phase, while satisfies all security requirements of VANETs and provides conditional privacy-preserving.
  • loading
  • M.S. Kakkasageri and S.S. Manvi, "Information management in vehicular ad hoc networks:A review", Journal of Network and Computer Applications, Vol.39, pp.334-350, 2014.
    H. Hartenstein and K.P. Laberteaux, "A tutorial survey on vehicular ad hoc networks", IEEE Communications Magazine, Vol.46, No.6, pp.164-171,2008.
    D.B. He, N. Kumar and N. Chilamkurti, "A secure temporalcredential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks", Information Sciences, Vol.321, pp.263-277, 2015.
    J. Li, H. Lu and M. Guizani, "ACPN:A novel authentication framework with conditional privacy-preservation and nonrepudiation for VANETs", IEEE Transactions on Parallel and Distributed Systems, Vol.26, No.4, pp.938-948, 2015.
    M. Bayat, M. Barmshoory, M. Rahimi, et al., "A secure authentication scheme for VANETs with batch verification", Wireless networks, Vol.21, No.5, pp.1733-1743, 2015.
    D. He, S. Zeadally, N. Kumar, et al., "One-to-many authentication for access control in mobile pay-TV systems", Science China Information Sciences, Vol.59, No.5, pp.1-14, 2016.
    M. Raya and J.P. Hubaux, "Securing vehicular ad hoc networks", Journal of Computer Security, Vol.15, No.1, pp.39-68, 2007.
    J. Freudiger, M. Raya, Z. Felegyha, et al., "Mix-zones for location privacy in vehicular networks", Proc. of ACM Workshop on Wireless Networking for Intelligent Transportation Systems, Vancouver, CA, pp.1-7, 2007.
    R. Lu, X. Lin, H. Zhu, et al., "ECPP:Efficient conditional privacy preservation protocol for secure vehicular communications", Proc. of IEEE INFOCOM08, Phoenix, AZ, pp.1903-1911, 2008.
    C. Zhang, X. Lin, R. Lu, et al., "RAISE:An efficient RSU-aided message authentication scheme in vehicular communication networks", Proc. of IEEE ICC'08, Beijing, China, pp.1451-1457, 2008.
    C. Zhang, R. Lu, X. Lin, et al., "An efficient identity-based batch verification scheme for vehicular sensor networks", Proc. of IEEE INFOCOM08, Phoenix, AZ, pp.816-824, 2008.
    C.C. Lee and Y.M. Lai, "Toward a secure batch verification with group testing for VANET", Wireless Networks, Vol.19, No.6, pp.1441-1449, 2013.
    T.W. Chim, S.M. Yiu, L.C.K. Hui, et al., "SPECS:Secure and privacy enhancing communications schemes for VANETs", Ad Hoc Networks, Vol.9, No.2, pp.189-203, 2011.
    S.J. Horng, S.F. Tzeng, Y. Pan, et al., "b-SPECS+:Batch verification for secure pseudonymous authentication in VANET", IEEE Transactions on Information Forensics and Security, Vol.8, No.11, pp.1860-1875, 2013.
    J.L. Huang, L.Y. Yeh and H.Y. Chien, "ABAKA:An anonymous batch authenticated and key agreement scheme for valueadded services in vehicular ad hoc networks", IEEE Transactions on Vehicular Technology, Vol.60, No.1, pp.248-262, 2011.
    K.A. Shim, "An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks", IEEE Transactions on Vehicular Technology, Vol.61, No.4, pp.1874-1883, 2012.
    J.K. Liu, T.H. Yuen, M.H. Au, et al., "Improvements on an authentication scheme for vehicular sensor networks", Expert Systems with Applications, Vol.41, No.5, pp.2559-2564, 2014.
    C. Zhang, P.H. Ho and J. Tapolcai, "On batch verification with group testing for vehicular communications", Wireless Networks, Vol.17, No.8, pp.1851-1865, 2011.
    J.H. Zhang, M. Xu and L.Y. Liu, "On the security of a secure batch verification with group testing for VANET", International Journal of Network Security, Vol.16, No.4, pp.313-3320, 2014.
    D. He, S. Zeadally, N. Kumar, et al., "Anonymous authentication for wireless body area networks with provable security", IEEE System Journal, Vol.21, No.1, pp.1-12, 2016.
    K.A. Shim, "An ID-based aggregate signature scheme with constant pairing computations", Journal of Systems and Software, Vol.83, No.10, pp.1873-1880, 2010.
    J. Shen, H. Tan, J. Wang, et al., "A novel routing protocol providing good transmission reliability in underwater sensor networks", Journal of Internet Technology, Vol.16, No.1, pp.171-178, 2015.
    D. He and S. Zeadally, "Authentication protocol for ambient assisted living system", IEEE Communications Magazine, Vol.53, No.1, pp.71-77, 2015.
    P.Guo, J. Wang, B. Li, et al., "A variable threshold-value authentication architecture for wireless mesh networks", Journal of Internet Technology, Vol.15, No.6, pp.929-936, 2014.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (203) PDF downloads(883) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return