Abstract
The incorporation of electronics by embedding the relevant sensors in the physical devices in home and office, vehicles of all types, buildings in the smart cities and in all possible spheres of life form a network of devices termed as internet of things (IoT). It is being realized that vehicular ad-hoc networks (VANETs) which are responsible for the reliable and secure communication among vehicles is a primary area of research in IoT and hence ensuring security in this area is essential. Thus, this work introduces a novel approach to improve the existing authentication support to VANETs. In this proposed framework, first an anonymous authentication approach for preserving the privacy is proposed which not only performs the vehicle user’s anonymous authentication but preserves the message integrity of the transmitting messages as well. Although many anonymous authentication schemes have been proposed in VANETs until now, the existing schemes suffer from a high computation cost during the signature and certificate verification process which leads to delayed authentication. Consequently, the vehicles and roadside units (RSUs) cannot authenticate more number of vehicles per second in VANETs. Second, an efficient anonymous group key distribution protocol is proposed in this paper for securely distributing the group key to the group of vehicles in the communication range of an RSU. The RSUs can send location based information to the group of vehicles in a secure manner using this group key. Experimental analysis portrays that the results of this new privacy preserving anonymous authentication and key management schemes are promising and efficient with regard to signature verification cost and computational cost in comparison with the existing schemes.
Similar content being viewed by others
References
Sun, X., Lin, X., Ho, P.H.: Secure vehicular communications based on group signature and ID-based signature scheme. In: Proceedings of IEEE International Conference on Communications, pp. 1539–1545 (2007)
Zhu, H., Lu, R., Lin, X., Shen, X.: Security in service-oriented vehicular networks service-oriented broadband wireless network architecture. IEEE Wirel. Commun. 16, 16–22 (2009)
He, D., Zeadally, S., Xu, B., Huang, X.: An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad-hoc networks. IEEE Trans. Inf. Forensics Secur. 10(12), 1681–2691 (2015)
He, D., Wang, D.: Robust biometrics-based authentication scheme for multi-server environment. IEEE Syst. J. 9(3), 816–823 (2015)
Gupta, B.B., Agrawal, D.P., Yamaguchi, S.: Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global Publisher, Hershey (2016)
Tewari, A., Gupta, B.B.: Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags. J. Supercomput (2016). doi:10.1007/s11227-016-1849-x
Guo, P., Wang, J., Li, B., Lee, S.: A variable threshold-value authentication architecture for wireless mesh networks. J. Internet Technol. 15(6), 929–936 (2014)
Chhabra, M., Gupta, B.B.: An efficient scheme to prevent DDoS flooding attacks in mobile ad-hoc network (MANET). Res. J. Appl. Sci. Eng. Technol. 7(10), 2033–2039 (2014)
Chhabra, M., Gupta, B.B.: A novel solution to handle DDOS attack in MANET. J. Inf Secur 4(3), 165–179 (2013)
Raya, M., Hubaux, J.P.: Securing vehicular ad hoc networks. J. Comput. Secur. 15, 39–68 (2007)
Ye, F., Roy, S., Wang, H.: Efficient data dissemination in vehicular ad hoc networks. IEEE J. Sel. Areas Commun. 30(4), 769–779 (2012)
Zhang, C., Lu, R., Lin, X., Ho, P.H., Shen, X.: An efficient identity-based batch verification scheme for vehicular sensor networks. In: Proceedings of IEEE INFOCOM, pp. 816–824 (2008)
Shim, K.: CPAS: an efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Trans. Veh. Technol. 61, 1874–1883 (2012)
Horng, S., Tzeng, S., Pan, Y., Fan, P.: b-SPECS+: batch verification for secure pseudonymous authentication in VANET. IEEE Trans. Inf. Forensics Secur. 8, 1860–1875 (2013)
Liu, J., Yuen, T., Au, M., Susilo, W.: Improvements on an authentication scheme for vehicular sensor networks. Expert Syst. Appl. 41, 2559–2564 (2014)
Bayat, M., Barmshoory, M., Rahimi, M., Aref, M.: A secure authentication scheme for VANETs with batch verification. Wirel. Netw. 21, 1733–1743 (2015)
Mao, Y., Sun, Y., Wu, M., Liu, K.J.R.: JET: dynamic join-exit tree amortization and scheduling for contributory key management. IEEE/ACM Trans. Netw. 14, 1128–1140 (2006)
Steiner, M., Tsudik, G., Waidner, M.: CLIQUES: a new approach to group key agreement. In: Proceedings of 18th International Conference on Distributed Computing Systems, pp. 380–387 (1998)
Lu, R., Lin, X., Liang, X., Shen, X.: A dynamic privacy-preserving key management scheme for location-based services in VANET. IEEE Trans. Intell. Transp. Syst. 13, 127–139 (2012)
Du, X., Wang, Y., Ge, J., Wang, Y.: ID-based authenticated two round multi-party key agreement. Cryptology ePrint Archive: Report 2003/247
Xiaozhuo, G., Zhenhuan, C., Yongming, W.: How to get group key efficiently in mobile ad hoc networks? In: Proceedings of IEEE Military Communications Conference, pp. 1009–1014 (2015)
Teng, J.K., Wu, C.K.: A provable authenticated certificateless group key agreement with constant rounds. J. Commun. Netw. 14, 104–110 (2012)
Lin, X., Sun, X., Ho, P.-H., Shen, X.: GSIS: a secure and privacy preserving protocol for vehicular communications. IEEE Trans. Veh. Technol. 56, 3442–3456 (2007)
Sampigethava, K., Li, M., Huang, L., Poovendran, R.: AMOEBA: robust location privacy scheme for VANET. IEEE J. Sel. Areas Commun. 25(8), 1569–1589 (2007)
Mao, Y., Sun, Y., Wu, M., Liu, K.J.R.: JET: dynamic join-exit tree amortization and scheduling for contributory key management. IEEE/ACM Trans. Netw. 14(5), 1128–1140 (2006)
Vijayakumar, P., Azees, M., Kannan, A., Jegatha Deborah, L.: Dual authentication and key management techniques for secure data transmission in vehicular ad-hoc networks. IEEE Trans. Intell. Transp. Syst. 17(4), 1015–1028 (2016)
Vijayakumar, P., Bose, S., Kannan, A., Deborah, L.J.: Computation and communication efficient key distribution protocol for secure multicast communication. In: KSII Transactions on Internet and Information Systems, vol. 7, no. 4, pp. 878-894 (2013)
Vijayakumar, P., Bose, S., Kannan, A.: Rotation based secure multicast key management for batch rekeying operations. Netw. Sci. 1(1), 39–47 (2012)
Vijayakumar, P., Naresh, R., Deborah, J.L., Islam, S.K.H.: An efficient group key agreement protocol for secure P2P communication. J. Secur. Commun. Netw. doi:10.1002/sec.1578
Vijayakumar, P., Naresh, R., Islam, S.K. Deborah, L.J.: An effective key distribution for secure internet pay-TV using access key hierarchies. J. Secur. Commun. Netw. doi:10.1002/sec.1680
Mortazavi, K.: An efficient distributed group key management using hierarchical approach with Diffie-Hellman and symmetric algorithm: DHSA. IEEE Int. Symp. Comput. Netw. Distrib. Syst. Febr. 23–24, 49–54 (2011)
Zhang, Y., Liu, W., Lou, W., Fang, Y.: Securing mobile ad hoc networks with certificateless public keys. In: IEEE Transactions on Dependable and Secure Computing, vol. 3, no. 4, pp. 386–399 (2006)
Wu, D., Zhou, C.: Fault-tolerant and scalable key management for smart grid. IEEE Trans. Smart Grid 2(2), 371–378 (2011)
Xia, J., Wang, Y.: Secure key distribution for the smart grid. IEEE Trans. Smart Grid 3(3), 1437–1443 (2012)
Park, J.H., Kim, M., Kwon, D.: Security weakness in the smart grid key distribution proposed by Xia and Wang. IEEE Trans. Smart Grid 4(3), 1613–1614 (2013)
Zhou, J., Ou, Y.H.: Key tree and Chinese remainder theorem based group key distribution scheme. J. Chin. Inst. Eng. 32(7), 967–974 (2009)
Vijayakumar, P., Bose, S., Kannan, A.: Centralized key distribution protocol using the greatest common divisor method. Comput. Math. Appl. 65(9), 1360–1368 (2013)
Chang, V.: Towards achieving data security with the cloud computing adoption framework. Ad Hoc Netw. 35, 65–82 (2015)
Chang, V., Kuo, Y.-H., Ramachandran, M.: Cloud computing adoption framework: a security framework for business clouds. Future Gener. Comput. Syst. 57, 24–41 (2016)
Chang, V., Wills, G.: A model to compare cloud and non-cloud storage of Big Data. Future Gener. Comput. Syst. 57, 56–76 (2016)
Boneh, D. Franklin, M.: Identity-based encryption from the Weil pairing. In: Proceedings of Crypto 2001, Vol. 2139. Lecture Notes in Computer Science, pp. 213–229 (2001)
Lu, R., Lin, X., Luan, T.-H.: Pseudonym changing at social spots: an effective strategy for location privacy in VANET. IEEE Trans. Veh. Technol. 61, 86–96 (2011)
Pairing-based cryptography [PBC] library. http://crypto.stanford.edu/pbc/
Cygwin: linux environment emulator for windows. http://www.cygwin.com/
Wang, Y.: Password protected smart card and memory stick authentication against off-line dictionary attacks. In: Security, I., Research, P. (eds.) Berlin, pp. 489–500. Springer, Germany (2012)
Tsai, J.-L., Lo, N.-W.: Secure anonymous key distribution scheme for smart grid. IEEE Trans. Smart Grid 7(2), 906–914 (2016)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Vijayakumar, P., Azees, M., Chang, V. et al. Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks. Cluster Comput 20, 2439–2450 (2017). https://doi.org/10.1007/s10586-017-0848-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-017-0848-x