Skip to main content
Log in

Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

The incorporation of electronics by embedding the relevant sensors in the physical devices in home and office, vehicles of all types, buildings in the smart cities and in all possible spheres of life form a network of devices termed as internet of things (IoT). It is being realized that vehicular ad-hoc networks (VANETs) which are responsible for the reliable and secure communication among vehicles is a primary area of research in IoT and hence ensuring security in this area is essential. Thus, this work introduces a novel approach to improve the existing authentication support to VANETs. In this proposed framework, first an anonymous authentication approach for preserving the privacy is proposed which not only performs the vehicle user’s anonymous authentication but preserves the message integrity of the transmitting messages as well. Although many anonymous authentication schemes have been proposed in VANETs until now, the existing schemes suffer from a high computation cost during the signature and certificate verification process which leads to delayed authentication. Consequently, the vehicles and roadside units (RSUs) cannot authenticate more number of vehicles per second in VANETs. Second, an efficient anonymous group key distribution protocol is proposed in this paper for securely distributing the group key to the group of vehicles in the communication range of an RSU. The RSUs can send location based information to the group of vehicles in a secure manner using this group key. Experimental analysis portrays that the results of this new privacy preserving anonymous authentication and key management schemes are promising and efficient with regard to signature verification cost and computational cost in comparison with the existing schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Sun, X., Lin, X., Ho, P.H.: Secure vehicular communications based on group signature and ID-based signature scheme. In: Proceedings of IEEE International Conference on Communications, pp. 1539–1545 (2007)

  2. Zhu, H., Lu, R., Lin, X., Shen, X.: Security in service-oriented vehicular networks service-oriented broadband wireless network architecture. IEEE Wirel. Commun. 16, 16–22 (2009)

    Google Scholar 

  3. He, D., Zeadally, S., Xu, B., Huang, X.: An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad-hoc networks. IEEE Trans. Inf. Forensics Secur. 10(12), 1681–2691 (2015)

    Article  Google Scholar 

  4. He, D., Wang, D.: Robust biometrics-based authentication scheme for multi-server environment. IEEE Syst. J. 9(3), 816–823 (2015)

    Article  Google Scholar 

  5. Gupta, B.B., Agrawal, D.P., Yamaguchi, S.: Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global Publisher, Hershey (2016)

    Book  Google Scholar 

  6. Tewari, A., Gupta, B.B.: Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags. J. Supercomput (2016). doi:10.1007/s11227-016-1849-x

  7. Guo, P., Wang, J., Li, B., Lee, S.: A variable threshold-value authentication architecture for wireless mesh networks. J. Internet Technol. 15(6), 929–936 (2014)

    Google Scholar 

  8. Chhabra, M., Gupta, B.B.: An efficient scheme to prevent DDoS flooding attacks in mobile ad-hoc network (MANET). Res. J. Appl. Sci. Eng. Technol. 7(10), 2033–2039 (2014)

    Google Scholar 

  9. Chhabra, M., Gupta, B.B.: A novel solution to handle DDOS attack in MANET. J. Inf Secur 4(3), 165–179 (2013)

    Google Scholar 

  10. Raya, M., Hubaux, J.P.: Securing vehicular ad hoc networks. J. Comput. Secur. 15, 39–68 (2007)

    Article  Google Scholar 

  11. Ye, F., Roy, S., Wang, H.: Efficient data dissemination in vehicular ad hoc networks. IEEE J. Sel. Areas Commun. 30(4), 769–779 (2012)

    Article  Google Scholar 

  12. Zhang, C., Lu, R., Lin, X., Ho, P.H., Shen, X.: An efficient identity-based batch verification scheme for vehicular sensor networks. In: Proceedings of IEEE INFOCOM, pp. 816–824 (2008)

  13. Shim, K.: CPAS: an efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Trans. Veh. Technol. 61, 1874–1883 (2012)

    Article  Google Scholar 

  14. Horng, S., Tzeng, S., Pan, Y., Fan, P.: b-SPECS+: batch verification for secure pseudonymous authentication in VANET. IEEE Trans. Inf. Forensics Secur. 8, 1860–1875 (2013)

    Article  Google Scholar 

  15. Liu, J., Yuen, T., Au, M., Susilo, W.: Improvements on an authentication scheme for vehicular sensor networks. Expert Syst. Appl. 41, 2559–2564 (2014)

    Article  Google Scholar 

  16. Bayat, M., Barmshoory, M., Rahimi, M., Aref, M.: A secure authentication scheme for VANETs with batch verification. Wirel. Netw. 21, 1733–1743 (2015)

    Article  Google Scholar 

  17. Mao, Y., Sun, Y., Wu, M., Liu, K.J.R.: JET: dynamic join-exit tree amortization and scheduling for contributory key management. IEEE/ACM Trans. Netw. 14, 1128–1140 (2006)

    Article  Google Scholar 

  18. Steiner, M., Tsudik, G., Waidner, M.: CLIQUES: a new approach to group key agreement. In: Proceedings of 18th International Conference on Distributed Computing Systems, pp. 380–387 (1998)

  19. Lu, R., Lin, X., Liang, X., Shen, X.: A dynamic privacy-preserving key management scheme for location-based services in VANET. IEEE Trans. Intell. Transp. Syst. 13, 127–139 (2012)

    Article  Google Scholar 

  20. Du, X., Wang, Y., Ge, J., Wang, Y.: ID-based authenticated two round multi-party key agreement. Cryptology ePrint Archive: Report 2003/247

  21. Xiaozhuo, G., Zhenhuan, C., Yongming, W.: How to get group key efficiently in mobile ad hoc networks? In: Proceedings of IEEE Military Communications Conference, pp. 1009–1014 (2015)

  22. Teng, J.K., Wu, C.K.: A provable authenticated certificateless group key agreement with constant rounds. J. Commun. Netw. 14, 104–110 (2012)

    Article  Google Scholar 

  23. Lin, X., Sun, X., Ho, P.-H., Shen, X.: GSIS: a secure and privacy preserving protocol for vehicular communications. IEEE Trans. Veh. Technol. 56, 3442–3456 (2007)

    Article  Google Scholar 

  24. Sampigethava, K., Li, M., Huang, L., Poovendran, R.: AMOEBA: robust location privacy scheme for VANET. IEEE J. Sel. Areas Commun. 25(8), 1569–1589 (2007)

    Article  Google Scholar 

  25. Mao, Y., Sun, Y., Wu, M., Liu, K.J.R.: JET: dynamic join-exit tree amortization and scheduling for contributory key management. IEEE/ACM Trans. Netw. 14(5), 1128–1140 (2006)

    Article  Google Scholar 

  26. Vijayakumar, P., Azees, M., Kannan, A., Jegatha Deborah, L.: Dual authentication and key management techniques for secure data transmission in vehicular ad-hoc networks. IEEE Trans. Intell. Transp. Syst. 17(4), 1015–1028 (2016)

    Article  Google Scholar 

  27. Vijayakumar, P., Bose, S., Kannan, A., Deborah, L.J.: Computation and communication efficient key distribution protocol for secure multicast communication. In: KSII Transactions on Internet and Information Systems, vol. 7, no. 4, pp. 878-894 (2013)

  28. Vijayakumar, P., Bose, S., Kannan, A.: Rotation based secure multicast key management for batch rekeying operations. Netw. Sci. 1(1), 39–47 (2012)

    Article  Google Scholar 

  29. Vijayakumar, P., Naresh, R., Deborah, J.L., Islam, S.K.H.: An efficient group key agreement protocol for secure P2P communication. J. Secur. Commun. Netw. doi:10.1002/sec.1578

  30. Vijayakumar, P., Naresh, R., Islam, S.K. Deborah, L.J.: An effective key distribution for secure internet pay-TV using access key hierarchies. J. Secur. Commun. Netw. doi:10.1002/sec.1680

  31. Mortazavi, K.: An efficient distributed group key management using hierarchical approach with Diffie-Hellman and symmetric algorithm: DHSA. IEEE Int. Symp. Comput. Netw. Distrib. Syst. Febr. 23–24, 49–54 (2011)

    Google Scholar 

  32. Zhang, Y., Liu, W., Lou, W., Fang, Y.: Securing mobile ad hoc networks with certificateless public keys. In: IEEE Transactions on Dependable and Secure Computing, vol. 3, no. 4, pp. 386–399 (2006)

  33. Wu, D., Zhou, C.: Fault-tolerant and scalable key management for smart grid. IEEE Trans. Smart Grid 2(2), 371–378 (2011)

    Article  Google Scholar 

  34. Xia, J., Wang, Y.: Secure key distribution for the smart grid. IEEE Trans. Smart Grid 3(3), 1437–1443 (2012)

    Article  Google Scholar 

  35. Park, J.H., Kim, M., Kwon, D.: Security weakness in the smart grid key distribution proposed by Xia and Wang. IEEE Trans. Smart Grid 4(3), 1613–1614 (2013)

    Article  Google Scholar 

  36. Zhou, J., Ou, Y.H.: Key tree and Chinese remainder theorem based group key distribution scheme. J. Chin. Inst. Eng. 32(7), 967–974 (2009)

    Article  Google Scholar 

  37. Vijayakumar, P., Bose, S., Kannan, A.: Centralized key distribution protocol using the greatest common divisor method. Comput. Math. Appl. 65(9), 1360–1368 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  38. Chang, V.: Towards achieving data security with the cloud computing adoption framework. Ad Hoc Netw. 35, 65–82 (2015)

    Article  Google Scholar 

  39. Chang, V., Kuo, Y.-H., Ramachandran, M.: Cloud computing adoption framework: a security framework for business clouds. Future Gener. Comput. Syst. 57, 24–41 (2016)

    Article  Google Scholar 

  40. Chang, V., Wills, G.: A model to compare cloud and non-cloud storage of Big Data. Future Gener. Comput. Syst. 57, 56–76 (2016)

    Article  Google Scholar 

  41. Boneh, D. Franklin, M.: Identity-based encryption from the Weil pairing. In: Proceedings of Crypto 2001, Vol. 2139. Lecture Notes in Computer Science, pp. 213–229 (2001)

  42. Lu, R., Lin, X., Luan, T.-H.: Pseudonym changing at social spots: an effective strategy for location privacy in VANET. IEEE Trans. Veh. Technol. 61, 86–96 (2011)

    Google Scholar 

  43. Pairing-based cryptography [PBC] library. http://crypto.stanford.edu/pbc/

  44. Cygwin: linux environment emulator for windows. http://www.cygwin.com/

  45. Wang, Y.: Password protected smart card and memory stick authentication against off-line dictionary attacks. In: Security, I., Research, P. (eds.) Berlin, pp. 489–500. Springer, Germany (2012)

    Google Scholar 

  46. Tsai, J.-L., Lo, N.-W.: Secure anonymous key distribution scheme for smart grid. IEEE Trans. Smart Grid 7(2), 906–914 (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pandi Vijayakumar.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Vijayakumar, P., Azees, M., Chang, V. et al. Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks. Cluster Comput 20, 2439–2450 (2017). https://doi.org/10.1007/s10586-017-0848-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-017-0848-x

Keywords

Navigation