Skip to main content

An Authentication Scheme for Car-Home Connectivity Services in Vehicular Ad-Hoc Networks

  • Conference paper
  • First Online:
Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2021)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 279))

  • 842 Accesses

Abstract

With the rapid development of technology, the Internet of Things (IoT) has been associated with various fields, such as smart home networks, intelligent traffic system (ITS), and so on. Vehicular ad-hoc networks (VANETs) can provide value-added services by roadside units (RSUs) for vehicles. Car-home connectivity can be defined as allowing drivers and passengers to remotely control smart appliances in the smart home while driving. The communication process between connected vehicles and smart appliances may cause personal information disclosure. To protect the security and privacy of communication, this paper proposes an authentication scheme for car-home connectivity services. The proposed scheme can protect the security and privacy of the communication process between the vehicle and the smart appliances and multiple third trusted authorities can cooperate to retrieve the identity of misbehaving users. The system analysis shows that the proposed scheme is efficient, secure, privacy-preserving, and easily deployable.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ray, P.P.: A survey on Internet of things architectures. J. King Saud Univ. Comput. Inf. Sci. 30(3), 291–319 (2016)

    Google Scholar 

  2. Al-Fuqaha, A., et al.: Internet of things: a survey on enabling technologies, protocols and applications. IEEE Commun. Surv. Tutor. 17, 1 (2015)

    Article  Google Scholar 

  3. Moser, K., Harder, J., Koo, S.G.M.: Internet of things in home automation and energy efficient smart home technologies. In: 2014 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 1260–1265 (2014)

    Google Scholar 

  4. Muhammad, M., Safdar, G.A.: Survey on existing authentication issues for cellular-assisted V2X communication. Veh. Commun. 12, 50–65 (2018)

    Google Scholar 

  5. D’Angelo, G., Castiglione, A., Palmieri, F.: A Cluster-based multidimensional approach for detecting attacks on connected vehicles. IEEE IoT J. 1 (2020)

    Google Scholar 

  6. Al-Shareeda, M.A., Anbar, M., Hasbullah, I.H., Manickam, S.: Survey of authentication and privacy schemes in vehicular ad hoc networks. IEEE Sens. J. 21(2), 2422–2433 (2021)

    Article  Google Scholar 

  7. Kukkala, V.K., Pasricha, S., Bradley, T.: SEDAN: security-aware design of time-critical automotive networks. IEEE Trans. Veh. Technol. 69(8), 9017–9030 (2020)

    Article  Google Scholar 

  8. Castiglione, A., Palmieri, F., Colace, F., Lombardi, M., Santaniello, D., D’Aniello, G.: Securing the internet of vehicles through lightweight block ciphers. Pattern Recogn. Lett. 135, 264–270 (2020)

    Article  Google Scholar 

  9. Grimm, D., Pistorius, F., Sax, E.: Network security monitoring in automotive domain. In: Arai, K., Kapoor, S., Bhatia, R. (eds.) FICC 2020. Advances in Intelligent Systems and Computing, vol. 1129, pp. 782–799. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-39445-5_57

    Chapter  Google Scholar 

  10. Hong, J., Shin, J., Lee, D.: Strategic management of next-generation connected life: focusing on smart key and car-home connectivity. Technol. Forecast. Soc. Chang. 103, 11–20 (2016)

    Article  Google Scholar 

  11. Rubio, J.E., Alcaraz, C., Lopez, J.: Recommender system for privacy-preserving solutions in smart metering. Pervasive Mob. Comput. 41, 205–218 (2017)

    Article  Google Scholar 

  12. He, D., et al.: An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans. Inf. Forensics Secur. 10(12), 2681–2691 (2015)

    Article  Google Scholar 

  13. Goldwasser, S., Micali, S.: Rackoff the knowledge complexity of interactive proof systems. SIAM J. Comput. - SIAMCOMP 18, 186–208 (1989)

    Article  Google Scholar 

  14. Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Advances in Cryptology – EUROCRYPT 1999, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, 2–6 May 1999, Proceeding. Springer, Heidelberg (1999)

    Google Scholar 

  15. Guo, N., Zhao, C., Gao, T.: An anonymous authentication scheme for edge computing-based car-home connectivity services in vehicular networks. Future Gener. Comput. Syst. 106, 659–671 (2020)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nan Guo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhao, C., Guo, N., Gao, T., Qi, J., Deng, X. (2022). An Authentication Scheme for Car-Home Connectivity Services in Vehicular Ad-Hoc Networks. In: Barolli, L., Yim, K., Chen, HC. (eds) Innovative Mobile and Internet Services in Ubiquitous Computing. IMIS 2021. Lecture Notes in Networks and Systems, vol 279. Springer, Cham. https://doi.org/10.1007/978-3-030-79728-7_6

Download citation

Publish with us

Policies and ethics