Abstract
Intelligent Transport Systems (ITS) play a very important role to increase the safety and to decrease road congestions. These systems require secure communication between both infrastructure and vehicles.
In this paper, we construct a three-factor highly efficient privacy preserving authentication (HEPPA) protocol between vehicles and road side units (RSUs) using a telematics device enabling biometric operations, bonded to the vehicle. Broadcast messages sent by the vehicles only contain symmetric key cryptographic operations. Elliptic curve cryptographic operations are used for the key establishment and renewal between the vehicles and RSUs. Due to the clever construction of the pseudonyms, the RSU listening the broadcast messages is able to directly detect malicious behaviour and to alert the neighbouring vehicles.
Moreover, no certificate revocation lists need to be stored at the vehicles and no list of key material is required at the RSUs. The real identity of malicious behaving vehicles and corresponding drivers can be revealed by a cooperation among RSU and certificate authority (CA). Consequently, attacking an RSU will not leak privacy related information. What is more, the tamper resistant hardware in the telematics device only stores user specific and temporary key related information, so no global system security parameters.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Armstrong, L.: Dedicated short range communications (DSRC) home (2002)
Parno, B., Perrig, A.: Challenges in securing vehicular networks. Workshop on Hot Topics in Networks (HotNets-IV), pp. 1–6 (2005)
Raya, M., Hubaux, J.P.: Securing vehicular ad hoc networks. J. Comput. Secur. 15(1), 39–68 (2007)
Brown, L., Stallings, W.: User Authentication, Computer Security Principles and Practice, 2nd edn, pp. 71–105. Pearson, Upper Saddle River (2012)
Wang, F., Xu, Y., Zhang, H., Zhang, Y., Zhu, L.: 2FLIP: a two-factor lightweight privacy preserving authentication scheme for VANET. IEEE Trans. Veh. Technol. 65(2), 896–911 (2015)
Raya, M., Hubaux, J.: The security of vehicular ad hoc networks. In: 3rd ACM Workshop on Security of Ad hoc and Sensor Networks, pp. 11–21 (2005)
Braeken, A., Porambage, P.: Efficient anonym smart card based authentication scheme for multi-server. Architecture 9(9), 177–184 (2015)
Sun, Y., Lu, R., Lin, X., Shen, X.S.: An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. IEEE Trans. Veh. Technol. 59(1), 3589–3603 (2010)
Zhang, C., Lu, R., Lin, X., Ho, P., Shen, X.S.: An efficient identity based batch verification scheme for vehicular sensor networks. In: IEEE INFOCOM, pp. 246–250 (2008)
Rajput, U., Abbas, F., Eun, H., Hussain, R., Oh, H.: Two level privacy preserving pseudonymous authentication protocol for VANET. In: IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 643–650 (2015)
Lin, X., Sun, X., Ho, P.-H., Shen, X.: GSIS: a secure and privacy-preserving protocol for vehicular communications. IEEE Trans. Veh. Technol. 56(6), 3442–3456 (2007)
Zhang, L., Wu, Q., Solanas, A., Domingo, F.J.: A scalable robust authentication protocol for secure vehicular communications. IEEE Trans. Veh. Technol. 59(1), 1606–1617 (2010)
Chaum, D., Heyst, E.: Group Signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257–265. Springer, Heidelberg (1991). doi:10.1007/3-540-46416-6_22
Wu, H.-T., Hsieh, W.-S.: RSU-based message authentication for vehicular ad-hoc networks. Springer- Multimed Tools Appl. 35, 1–13 (2011)
IEEE Trial-Use Standard for Wireless Access in Vehicular Environments, IEEE Standard 1609.2 Std. (2006)
Xie, Y., Wu, L., Shen, J., Alelaiwi, A.: EIAS-CP: new efficient identity-based authentication scheme with conditional privacy-preserving for VANETs. Telecommun. Syst. pp. 1–12 (2016)
Porambage, P., Braeken, A., Schmitt, C., Gurtov, A.V., Ylianttila, M., Stiller, B.: Group key establishment for enabling secure multicast communication in wireless sensor networks deployed for IoT applications. IEEE Access 3, 1503–1511 (2015)
Studer, A., Bai, F., Bellur, B., Perrig, A.: Flexible, extensible, and efficient VANET authentication. J. Commun. Netw. 11, 589–598 (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Braeken, A., Bezzateev, S., Touhafi, A., Voloshina, N. (2017). HEPPA: Highly Efficient Privacy Preserving Authentication for ITS. In: Rak, J., Bay, J., Kotenko, I., Popyack, L., Skormin, V., Szczypiorski, K. (eds) Computer Network Security. MMM-ACNS 2017. Lecture Notes in Computer Science(), vol 10446. Springer, Cham. https://doi.org/10.1007/978-3-319-65127-9_21
Download citation
DOI: https://doi.org/10.1007/978-3-319-65127-9_21
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-65126-2
Online ISBN: 978-3-319-65127-9
eBook Packages: Computer ScienceComputer Science (R0)