Skip to main content
Log in

Efficient Privacy-Preserving Anonymous Authentication Protocol for Vehicular Ad-Hoc Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Vehicular ad-hoc network (VANET) has been considered as one of the most promising wireless sensor technologies, which could enhance driving convenience and traffic efficiency through real-time information interaction. Nevertheless, emerging security issues (e.g., confidentiality, integrity, identity privacy, message authentication) will hinder the widespread deployment of VANETs. To address these issues, in this paper, we propose an efficient privacy-preserving anonymous authentication protocol for VANETs. We first design an identity-based signature algorithm, and exploit it with an account information of a vehicle to propose our anonymous authentication protocol. The protocol enables each vehicle to anonymously send an authenticated message to nearby roadside units (RSUs) in a confidential way, and efficiently check the feedback information from nearby RSUs. Simultaneously, the protocol achieves key-exchange functionality, which could produce a session key for later secure communication between vehicles and RSUs. Finally, we give the security analysis of the proposed protocol and conduct a comprehensive performance evaluation, the results demonstrate its feasibility in the secure deployment of VANETs.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Din, S., Paul, A., & Rehman, A. (2019). 5G-enabled hierarchical architecture for software-defined intelligent transportation system. Computer Networks, 150, 81–89.

    Article  Google Scholar 

  2. Naik, G., Choudhury, B., & Park, J. M. (2019). IEEE 802.11 bd & 5G NR V2X: Evolution of radio access technologies for V2X communications. IEEE Access. https://doi.org/10.1109/ACCESS.2019.2919489.

    Article  Google Scholar 

  3. Khelifi, H., Luo, S., Nour, B., Moungla, H., Faheem, Y., Hussain, R., & Ksentini, A. (2020). Named data networking in vehicular ad hoc networks: State-of-the-art and challenges. IEEE Communications Surveys & Tutorials, 22(1), 320–351.

    Article  Google Scholar 

  4. He, D., Zeadally, S., Xu, B., & Huang, X. (2015). An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Transactions on Information Forensics & Security, 10(12), 2681–2691.

    Article  Google Scholar 

  5. Chim, T., Yiu, S., Hui, L., & Li, V. (2011). SPECS: Secure and privacy enhancing communications schemes for VANETs. Ad Hoc Networks, 9(2), 189–203.

    Article  Google Scholar 

  6. Wang, F., Xu, Y., Zhang, H., Zhang, Y., & Zhu, L. (2016). 2FLIP: A two-factor lightweight privacy-preserving authentication scheme for VANET. IEEE Transactions on Vehicular Technology, 65(2), 896–911.

    Article  Google Scholar 

  7. Wang, S., & Yao, N. (2019). A RSU-aided distributed trust framework for pseudonym-enabled privacy preservation in VANETs. Wireless Networks, 25(3), 1099–1115.

    Article  Google Scholar 

  8. Zhang, L., Hu, C., Wu, Q., Domingo-Ferrer, J., & Qin, B. (2016). Privacy-preserving vehicular communication authentication with hierarchical aggregation and fast response. IEEE Transactions on Computers, 65(8), 2562–2574.

    Article  MathSciNet  Google Scholar 

  9. Asaar, M., Salmasizadeh, M., Susilo, W., & Majidi, A. (2018). A secure and efficient authentication technique for vehicular ad-hoc networks. IEEE Transactions on Vehicular Technology, 67(6), 5409–5423.

    Article  Google Scholar 

  10. Dimitrakopoulos, G., & Demestichas, P. (2010). Intelligent transportation systems. IEEE Vehicular Technology Magazine, 5(1), 77–84.

    Article  Google Scholar 

  11. Jaballah, W. B., Conti, M., Mosbah, M., & Palazzi, C. E. (2014). Fast and secure multihop broadcast solutions for intervehicular communication. IEEE Transactions on Intelligent Transportation Systems, 15(1), 433–450.

    Article  Google Scholar 

  12. Manivannan, D., Moni, S. S., & Zeadally, S. (2020). Secure authentication and privacy-preserving techniques in vehicular ad-hoc networks (VANETs). Vehicular Communications, 25, 100247.

    Article  Google Scholar 

  13. Azees, M., Vijayakumar, P., & Deborah, L. (2016). Comprehensive survey on security services in vehicular ad-hoc networks. Iet Intelligent Transport Systems, 10(6), 379–388.

    Article  Google Scholar 

  14. Zhang, X., Wang, H., & Xu, C. (2019). Identity-based key-exposure resilient cloud storage public auditing scheme from lattices. Information Sciences, 472, 223–234.

    Article  Google Scholar 

  15. Zhang, X., Xu, C., Wang, H., Zhang, Y., & Wang, S. (2019). FS-PEKS: Lattice-based forward secure public-key encryption with keyword search for cloud-assisted Industrial Internet of Things. IEEE Transactions on Dependable and Secure Computing. https://doi.org/10.1109/TDSC.2019.2914117.

    Article  Google Scholar 

  16. Karuppiah, M., Das, A., Li, X., Kumari, S., & Niranchana, R. (2018). Secure remote user mutual authentication scheme with key agreement for cloud environment. Mobile Networks & Applications, 11, 1–17.

    Google Scholar 

  17. He, D., Kumar, N., & Chilamkurti, N. (2015). “A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Information Sciences, 321(1), 263–277.

    Article  Google Scholar 

  18. Cui, J., Zhang, J., Zhong, H., & Xu, Y. (2017). SPACF: A secure privacy-preserving authentication scheme for VANET with cuckoo filter. IEEE Transactions on Vehicular Technology, 66(11), 10283–10295.

    Article  Google Scholar 

  19. Ali, I., Hassan, A., & Li, F. (2019). Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A survey. Vehicular Communications, 16, 45–61.

    Article  Google Scholar 

  20. Liu, Y., He, Z., Zhao, S., & Wang, L. (2016). An efficient anonymous authentication protocol using batch operations for VANETs. Multimedia Tools Applications, 75(24), 17689–17709.

    Article  Google Scholar 

  21. Raya, M., & Hubaux, J. P. (2007). Securing vehicular ad hoc networks. IEEE International Conference on Pervasive Computing and Applications, 15, 39–68.

    Google Scholar 

  22. Ming, Y., & Shen, X. (2018). PCPA: A practical certificateless conditional privacy-preserving authentication scheme for vehicular ad-hoc networks. Sensors. https://doi.org/10.3390/s18051573.

    Article  Google Scholar 

  23. Shao, J., Lin, X., Lu, R., & Zuo, C. (2016). A threshold anonymous authentication protocol for VANETs. IEEE Transactions on Vehicular Technology, 65(3), 1711–1720.

    Article  Google Scholar 

  24. Xie, Y., Wu, L., Shen, J., & Alelaiwi, A. (2017). EIAS-CP: New efficient identity-based authentication scheme with conditional privacy-preserving for VANETs. Telecommunication Systems, 65(2), 229–240.

    Article  Google Scholar 

  25. Li, J., Choo, K. R., Zhang, W., Kumari, S., Rodrigues, J. J. P. C., Khan, M. K., & Hogrefe, D. (2018). EPA-CPPA: An efficient, provably-secure and anonymous conditional privacy-preserving authentication scheme for vehicular ad hoc networks. Vehicular Communications, 13, 104–113.

    Article  Google Scholar 

  26. Zhang, J., Cui, J., Zhong, H., Chen, Z., & Liu, L. (2019). PACRT: Chinese remainder theorem based conditional privacy-preserving authentication scheme in vehicular Ad-hoc networks. IEEE Transactions on Dependable and Secure Computing. https://doi.org/10.1109/TDSC.2019.2904274.

    Article  Google Scholar 

  27. Lo, N., & Tsai, J. (2016). An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings. IEEE Transactions on Intelligent Transportation Systems, 17(5), 1319–1328.

    Article  Google Scholar 

  28. Mandal, S., Mohanty, S., & Majhi, B. (2018). Cryptanalysis and enhancement of an anonymous self-certified key exchange protocol. Wireless Personal Communications, 99(2), 863–891.

    Article  Google Scholar 

  29. Chatterjee, U., Govindan, V., Sadhukhan, R., Mukhopadhyay, D., Chakraborty, R. S., Mahata, D., & Prabhu, M. M. (2018). Building PUF based authentication and key exchange protocol for IoT without explicit CRPs in verifier database. IEEE Transactions on Dependable & Secure Computing, 16, 424–437.

    Article  Google Scholar 

  30. Chen, Y., Yuan, J., & Zhang, Y. (2020). An improved password-authenticated key exchange protocol for VANET. Vehicular Communications, 27(7), 100286.

    Google Scholar 

  31. Azees, M., Vijayakumar, P., & Deboarh, L. J. (2017). EAAP: Efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad-hoc networks. IEEE Transactions on Intelligent Transportation Systems, 18(9), 2467–2476.

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported in part by the National Key Research and Development Program of China under Grant 2017YFB0802000, in part by the National Natural Science Foundation of China under Grant 61902327 and Grant 61872060, in part by the China Postdoctoral Science Foundation under Grant 2020M681316, in part by the Youth Scientific and Technology Innovation Team Project of SWPU under Grant 2019CXTD05, in part by the Chengdu Key R & D project under Grant 2021-YF05-00965-SN.

Author information

Authors and Affiliations

Authors

Contributions

XZ, WW and LM developed the idea of the study, participated in its design and coordination and helped to draft the paper. WW, CH and HF contributed to the acquisition and interpretation of data. CX provided critical review and substantially revised the paper. All authors read and approved the final paper.

Corresponding authors

Correspondence to Xiaojun Zhang or Wenchen Wang.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, X., Wang, W., Mu, L. et al. Efficient Privacy-Preserving Anonymous Authentication Protocol for Vehicular Ad-Hoc Networks. Wireless Pers Commun 120, 3171–3187 (2021). https://doi.org/10.1007/s11277-021-08605-x

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-08605-x

Keywords

Navigation