Skip to main content

An Efficient Privacy-Preserving Authentication Scheme Based on Shamir Secret Sharing for VANETs

  • Conference paper
  • First Online:
Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2023)

Abstract

As the technology of mobile communication and Internet of Things by leaps and bounds, Vehicular Ad-hoc Networks (VANETs), a new type of intelligent transport system, have drawn a lot of interest from industry and academia. It is expected that vehicle-to-everything (V2X) communication will provide users with ultra-reliable and available transmission, especially in the case of safety-critical and autonomous applications. However, due to the open nature of the wireless communication environment, traffic-related messages in VANETs are vulnerable to interception and tampering by attackers, compromising the safety of drivers and traffic. Consequently, ensuring the conditional anonymity of vehicle users is crucial for protecting the privacy of users and enabling secure communication. In this paper, we propose a novel privacy-preserving authentication scheme for VANETs. Efficient anonymous authentication and flexible pseudonym change are achieved by combining the ECC-based certificateless signature mechanism with the Shamir secret sharing mechanism. Upon analysis of security and performance, the proposed scheme appears to provide security and anonymity for vehicles and has a high level of efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Lee, J.K., Jeong, Y.S., Park, J.H.: s-ITSF: a service based intelligent transportation system framework for smart accident management. Hum.-Centric Comput. Inf. Sci. 5(1), 1–9 (2015). https://doi.org/10.1186/s13673-015-0054-x

    Article  Google Scholar 

  2. Wei, L., Cui, J., Xu, Y., Cheng, J., Zhong, H.: Secure and lightweight conditional privacy-preserving authentication for securing traffic emergency messages in VANETs. IEEE Trans. Inf. Forensics Secur. 16, 1681–1695 (2021)

    Article  Google Scholar 

  3. He, D., Zeadally, S., Xu, B., Huang, X.: An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans. Inf. Forensics Secur. 10(12), 2681–2691 (2015)

    Article  Google Scholar 

  4. Mahmood, A., Zhang, W.E., Sheng, Q.Z., Siddiqui, S.A., Aljubairy, A.: Trust management for software-defined heterogeneous vehicular ad hoc networks. In: Mahmood, Z. (ed.) Security, Privacy and Trust in the IoT Environment, pp. 203–226. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-18075-1_10

    Chapter  Google Scholar 

  5. Huang, D., Misra, S., Verma, M., Xue, G.: PACP: an efficient pseudonymous authentication-based conditional privacy protocol for VANETs. IEEE Trans. Intell. Transp. Syst. 12(3), 736–746 (2011)

    Article  Google Scholar 

  6. Wang, Y., Ding, Y., Wu, Q., Wei, Y., Qin, B., Wang, H.: Privacy preserving cloud-based road condition monitoring with source authentication in VANETs. IEEE Trans. Inf. Forensics Secur. 14(7), 1779–1790 (2019)

    Article  Google Scholar 

  7. Freudiger, J., Raya, M., Félegyházi, M., Papadimitratos, P., Hubaux, J.-P.: Mix-zones for location privacy in vehicular networks. In: Proceedings of the 1st ACM International Workshop on Wireless Networking for Intelligent Transportation Systems (WiN-ITS), pp. 1–7. ACM, Vancouver, Canada (2007)

    Google Scholar 

  8. Lu, R., Lin, X., Luan, T.H., Liang, X., Shen, X.: Pseudonym changing at social spots: an effective strategy for location privacy in VANETs. IEEE Trans. Veh. Technol. 61(1), 86–96 (2012)

    Article  Google Scholar 

  9. Wang, S., Yao, N., Gong, N., Gao, Z.: A trigger-based pseudonym exchange scheme for location privacy preserving in VANETs. Peer-to-Peer Netw. Appl. 11, 548–560 (2018)

    Article  Google Scholar 

  10. Boualouache, A., Moussaoui, S.: Urban pseudonym changing strategy for location privacy in VANETS. Int. J. Ad Hoc Ubiquitous Comput. 24(1–2), 49–64 (2017)

    Article  Google Scholar 

  11. Li, X., et al.: PAPU: pseudonym swap with provable unlinkability based on differential privacy in VANETs. IEEE Internet Things J. 7(12), 11789–11802 (2020)

    Article  Google Scholar 

  12. Doumiati, S., Choikani, T.A., Artail, H.: LPS for LBS: location-privacy scheme for location-based services. In: Proceedings of the 11th IEEE International Conference on Computer Systems and Applications, 449–456. Doha, Qatar (2014)

    Google Scholar 

  13. Mei, Y., Jiang, G., Zhang, W., Cui, Y.: A collaboratively hidden location privacy scheme for VANETs. Int. J. Distrib. Sens. Netw. 10(3), 473151 (2014)

    Article  Google Scholar 

  14. Chen, Y., Liu, H., Wang, B., Sonompil, B., Ping, Y., Zhang, Z.: A threshold hybrid encryption method for integrity audit without trusted center. J. Cloud Comput. 10(1), 1–14 (2021). https://doi.org/10.1186/s13677-020-00222-6

    Article  Google Scholar 

  15. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  16. Wang, S., Yao, N.: LIAP: a local identity-based anonymous message authentication protocol in VANETs. Comput. Commun. 112, 154–164 (2017)

    Article  Google Scholar 

  17. Liu, J., Yu, Y., Zhao, Y., Jia, J., Wang, S.: An efficient privacy preserving batch authentication scheme with deterable function for VANETs. In: Au, M.H., et al. (eds.) NSS 2018. LNCS, vol. 11058, pp. 288–303. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-02744-5_22

    Chapter  Google Scholar 

  18. Liu, F., Wang, Q.: IBRS: an efficient identity-based batch verification scheme for VANETs based on ring signature. arXiv preprint arXiv:1909.13223 (2019)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tianhan Gao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Qi, J., Gao, T., Zhao, C. (2023). An Efficient Privacy-Preserving Authentication Scheme Based on Shamir Secret Sharing for VANETs. In: Barolli, L. (eds) Innovative Mobile and Internet Services in Ubiquitous Computing . IMIS 2023. Lecture Notes on Data Engineering and Communications Technologies, vol 177. Springer, Cham. https://doi.org/10.1007/978-3-031-35836-4_16

Download citation

Publish with us

Policies and ethics