Skip to main content

A VANET Anonymous Authentication Mechanism for Multi-level Application Scenarios

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11066))

Abstract

Vehicular Ad-hoc Network (VANET) is a rapid developing application of the Internet of Things, which has totally difference with the conventional traffic network. On one hand, a VANET needs to provide end-to-end verification that has been widely concerned by researchers. On the other hand, the privacy is also very important in a VANET. Because of the openness of VANETs, conventional security measures do not effectively guarantee vehicle’s privacy. In other words, there is an urgent requirement for new security schemes to guarantee vehicular privacy in VANETs. Therefore, ensuring anonymity and authentication is a double requirement in VANETs. The both requirements seem contradictory but have to coexist. However, effective technology is few in literature and the existing anonymous authentication schemes cannot provide reverse trace mechanism when anonymity abuse happens. At the same time, these existing researches are limited to the application layer without considering the particularity of the perception layer and network layer. Without the support of the lower layer, the upper layer cannot achieve real security. Our aim is to build a lightweight anonymous authentication security system under the privacy preserving which considers the limitation of bottom layer devices and anonymity abuse problem.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Cheng, W., Cheng, X., Song, M., Chen, B., Zhao, W.W.: On the design and deployment of RFID assisted navigation systems for VANETs. IEEE Trans. Parallel Distrib. Syst. 23, 1267–1274 (2012)

    Article  Google Scholar 

  2. Mojtaba, A., Wan, H.H., Mazdak, Z., Sasan, K., Eghbal, G.: Implementation and evaluation of lightweight encryption algorithms suitable for RFID. J. Next Gener. Inf. Technol. 4, 65–77 (2013)

    Article  Google Scholar 

  3. Sun, X., Lin, X., Ho, P.H.: Secure vehicular communications based on group signature and id-based signature scheme. In: IEEE International Conference on Communications, pp. 1539–1545. IEEE Press, New York (2007)

    Google Scholar 

  4. Guo, J., Baugh, J.P., Wang, S.: A group signature based secure and privacy-preserving vehicular communication framework. In: Mobile Networking for Vehicular Environments, pp. 103–108 (2007)

    Google Scholar 

  5. Calandriello, G., Papadimitratos, P., Hubaux, J.P., Lioy, A.: Efficient and robust pseudonymous authentication in VANET. In: International Workshop on Vehicular Ad Hoc Networks, Vanet 2007, Montréal, Québec, Canada, September, pp. 19–28 (2007)

    Google Scholar 

  6. Sun, J., Zhang, C., Zhang, Y., Fang, Y.: An identity-based security system for user privacy in vehicular ad hoc networks. IEEE Trans. Parallel Distrib. Syst. 21, 1227–1239 (2010)

    Article  Google Scholar 

  7. Li, J., Lu, H., Guizani, M.: ACPN: a novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs. IEEE Trans. Parallel Distrib. Syst. 26, 938–948 (2015)

    Article  Google Scholar 

  8. Bevish, J.Y.: An efficient authentication scheme for VANET using Cha Cheon’s ID based signatures. Indian J. Appl. Res. 4, 106–109 (2014)

    Google Scholar 

  9. He, D., Zeadally, S., Xu, B., Huang, X.: An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans. Inf. Forensics Secur. 10, 2681–2691 (2015)

    Article  Google Scholar 

  10. Wang, X., Li, S., Zhao, S., Xia, Z., Bai, L.: A vehicular ad hoc network privacy protection scheme without a trusted third party. Int. J. Distrib. Sens. Netw. 13, 1–10 (2017)

    Google Scholar 

  11. He, D.B., Zeadally, S., Xu, B.W., Huang, X.Y.: An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans. Inf. Forensic Secur. 10, 2681–2691 (2015)

    Article  Google Scholar 

  12. Chim, T.W., Yiu, S.M., Hui, L.C.K., Li, V.O.K.: VSPN: VANET-based secure and privacy-preserving navigation. IEEE Trans. Comput. 63, 510–524 (2014)

    Article  MathSciNet  Google Scholar 

  13. Berg, E.V.D., Zhang, T., Pietrowicz, S.: Blend-in: a privacy-enhancing certificate-selection method for vehicular communication. IEEE Trans. Veh. Technol. 58, 5190–5199 (2009)

    Article  Google Scholar 

  14. Chen, J., Xu, H., Zhu, L.: Query-aware location privacy model based on p-sensitive and k-anonymity for road networks. Internet Things 2012, 157–165 (2012)

    Article  Google Scholar 

  15. Caballero-Gil, C., Molina-Gil, J., Hernandez-Serrano, J., Leon, O., Soriano-Ibanez, M.: Providing k-anonymity and revocation in ubiquitous VANETs. Ad Hoc Netw. 36, 482–494 (2016)

    Article  Google Scholar 

  16. Wang, M.Z., Liu, D., Zhu, L.H., Xu, Y.J., Wang, F.: LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication. Computing 98, 685–708 (2016)

    Article  MathSciNet  Google Scholar 

  17. Wang, F., Xu, Y.J., Zhang, H.W., Zhang, Y.J., Zhu, L.H.: 2FLIP: a two-factor lightweight privacy-preserving authentication scheme for VANET. IEEE Trans. Veh. Technol. 65, 896–911 (2016)

    Article  Google Scholar 

  18. Tzeng, S.F., Horng, S.J., Li, T.R., Wang, X., Huang, P.H., Khan, M.K.: Enhancing security and privacy for identity-based batch verification scheme in VANETs. IEEE Trans. Veh. Technol. 66, 3235–3248 (2017)

    Article  Google Scholar 

  19. Vijayakumar, P., Chang, V., Deborah, L.J., Balusamy, B., Shynu, P.G.: Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks. Futur. Gener. Comp. Syst. 78, 943–955 (2018)

    Article  Google Scholar 

  20. Montgomery, P.L.: Modular multiplication without trial division. Math. Comput. 44, 519–521 (1985)

    Article  MathSciNet  Google Scholar 

  21. Chao, W., Xiang-yong, S., Zhi-hua, N.: The research of the promotion for ECDSA algorithm based on Montgomery-form ECC. J. Commun. 31, 9–13 (2010)

    Google Scholar 

  22. Pathak, V., Yao, D., Iftode, L.: Securing location aware services over VANET using geographical secure path routing. In: IEEE International Conference on Vehicular Electronics and Safety, pp. 346–353. IEEE Press, New York (2010)

    Google Scholar 

  23. Chao, W., Guang-yue, H., Huan-guo, Z.: Lightweight security architecture design for wireless sensor network. J. Commun. 33, 30–35 (2012)

    Google Scholar 

  24. Simmons G.J.: The prisoners’ problem and the subliminal channel. In: Chaum D. (ed.) Advances in Cryptology. Springer, Boston (1984). https://doi.org/10.1007/978-1-4684-4730-9_5

  25. Wang, H., Li, B., Yu, W.: Montgomery algorithm on elliptic curves over finite fields of character three. J. Commun. 29, 25–28 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaoliang Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, X., Jiang, J., Wang, B., Xia, Z. (2018). A VANET Anonymous Authentication Mechanism for Multi-level Application Scenarios. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11066. Springer, Cham. https://doi.org/10.1007/978-3-030-00015-8_61

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00015-8_61

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00014-1

  • Online ISBN: 978-3-030-00015-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics