This paper studies the existing problems of message authentication protocols in vehicular ad hoc
networks (VANETs) due to their significance in the future of commuting and transportation. Our contribution
has been devoted to implementing a new protocol for VANETs so that inherent security problems in past works
are resolved. Exclusive security measures have been considered for the system which protects the users against
threat of any attack. The new protocol shows a great hardness guaranteed by certificate based 80 bit security
which assures messages to remain confidential in any time. Also, new unprecedented features like V2X which
improves system performance effectively have been instantiated. The simulation results indicate that message
signature generation and verification both take place in much less time than present comparable rival protocols.
MIRZAEE Siavash, JIANG Letian *(蒋乐天)
. Fast Confidentiality-Preserving Authentication for Vehicular Ad Hoc Networks[J]. Journal of Shanghai Jiaotong University(Science), 2019
, 24(1)
: 31
-40
.
DOI: 10.1007/s12204-019-2038-x
[1] LIU J K, YUEN T H, AU M H, et al. Improvements on an authentication scheme for vehicular sensor networks[J]. Expert Systems with Applications, 2014, 41(5):2559-2564.
[2] DE FUENTES J M, GONZ′ALEZ-TABLAS A I,RIBAGORDA A. Overview of security issues in vehicularad-hoc networks [C]//Handbook of Research onMobility and Computing. [s.l.]: IGI Global, 2011: 894-911.
[3] GIORDANO S. Mobile ad hoc networks[C]//Handbook of Wireless Networks and MobileComputing. New York, USA: John Wiley & Sons,2002: 325-346.
[4] RAVI S, RAGHUNATHAN A, CHAKRADHAR S.Tamper resistance mechanisms for secure embeddedsystems [C]//Proceedings of the 17th InternationalConference on VLSI Design. [s.l.]: IEEE, 2004: 605-611.
[5] KERRY C F, GALLAGHER P D. Digital signaturestandard (DSS): FIPS 186-4 [S]. Gaithersburg, USA:The Federal Information Processing Standards Publication,2013.
[6] GOLDWASSER S, MICALI S, RIVEST R L. A digitalsignature scheme secure against adaptive chosenmessageattacks [J]. SIAM Journal on Computing,1988, 17(2): 281-308.
[7] BOLDYREVA A, GOYAL V, KUMAR V.Identity-based encryption with efficient revocation[C]//Proceedings of the 14th ACM Conference onComputer and Communications Security. [s.l.]: ACM,2008: 417-426.
[8] WASEF A, SHEN X. EDR: Efficient decentralized revocationprotocol for vehicular ad hoc networks [J].IEEE Transactions on Vehicular Technology, 2009,58(9): 5214-5224.
[9] D¨OTZER F. Privacy issues in vehicular ad hoc networks[C]//International Workshop on Privacy EnhancingTechnologies. Berlln Heldelberg, Germany:Spnnger-Verlag, 2005: 197-209.
[10] RAYA M, HUBAUX J P. Securing vehicular ad hocnetworks [J]. Journal of Computer Security, 2007,15(1): 39-68.
[11] FERGUSON N, SCHNEIER B, KOHNO T. Cryprographyengineering: Design principles and practical applications[M]. New York, USA: John Wiley & Sons,2011.
[12] ZHU H J, LU R X, SHEN X M, et al. Security inservice-oriented vehicular networks [J]. IEEE WirelessCommunications, 2009, 16(4): 16-22.
[13] LIU Y L, WANG L M, CHEN H H. Message authenticationusing proxy vehicles in vehicular ad hoc networks[J]. IEEE Transactions on Vehicular Technolology,2015, 64(8): 3697-3710.
[14] SHAMIR A. Identity-based cryptosystems and signatureschemes [C]//Advances in Cryptology, LNCS 196.Berlln Heldelberg, Germany: Spnnger-Verlag, 1985:47-53.
[15] KATZ J. Digital signatures [M]. New York, USA:Springer Science & Business Media, 2010.
[16] CHUANG M C, LEE J F. TEAM: Trust-extended authenticationmechanism for vehicular ad hoc networks[J]. IEEE Systems Journal, 2014, 8(3): 749-758.
[17] LIN X D, LI X. Achieving efficient cooperative messageauthentication in vehicular ad hoc networks [J]. IEEETransactions on Vehicular Technology, 2013, 62(7):3339-3348.
[18] ZHU X Y, JIANG S R, WANG L M, et al. Efficientprivacy-preserving authentication for vehicular ad hocnetworks [J]. IEEE Transactions on Vehicular Technology,2014, 63(2): 907-919.
[19] SHIM K A. Reconstruction of a secure authenticationscheme for vehicular ad hoc networks using a binaryauthentication tree [J]. IEEE Transactions on WirelessCommunications, 2013, 12(11): 5386-5393.
[20] HE D B, ZEADALLY S, XU B W, et al. An efficientidentity-based conditional privacy-preserving authenticationscheme for vehicular ad hoc networks [J]. IEEETransactions on Information Forensics and Security,2015, 10(12): 2681-2691.
[21] LO N W, TSAI J L. An efficient conditional privacypreservingauthentication scheme for vehicular sensornetworks without pairings [J]. IEEE Transactions onIntelligent Transportation Systems, 2016, 17(5): 1319-1328.
[22] MISHRA A. Security and quality of service in adhoc wireless networks [M]. Cambridge, UK: CambridgeUniversity Press, 2008.
[23] CHAUM D L. Untraceable electronic mail, return addresses,and digital pseudonyms [J]. Communicationsof the ACM, 1981, 24(5): 84-90.
[24] Intelligent Transportation Systems Committee. IEEEtrial-use standard for wireless access in vehicular environments:Security services for applications and managementmessages: IEEE Std 1609.2 [S]. New York,USA: IEEE Vehicular Technology Society, 2006.
[25] HOFFSTEIN J, PIPHER J C, SILVERMAN J H. Anintroduction to mathematical cryptography [M]. NewYork, USA: Springer Science & Business Media, 2008.