یک طرح بهبود یافته احراز اصالت، با حفظ گمنامی مشروط در شبکه‌های اقتضایی بین خودرویی

نویسندگان

1 دانشجوی دکترا، دانشگاه قم، قم، ایران

2 کارشناسی ارشد، دانشکده علوم کامپیوتر، دانشگاه تهران، تهران، ایران

3 استادیار، دانشگاه جامع امام حسین(ع)، تهران، ایران

چکیده

شبکه‌های اقتضایی بین خودرویی (VANET) می‌توانند در ارتباط میان وسایل نقلیه و مدیریت ترافیک بهبود مناسبی ایجاد کنند. احراز اصالت پیام‌های منتشر شده توسط خودرو‌ها، از مهم‌ترین مسائل پیش‌رو در شبکه‌های VANET می‌باشد، زیرا ارسال پیام‌های اشتباه می‌تواند باعث بروز تصادفات و تغییر الگوی ترافیکی شبکه گردد. طرح‌های بسیار زیادی برای احراز اصالت در شبکه‌های VANET ارائه شده‌اند که هر کدام دارای مزایا و معایبی می‌باشند، اما معرفی یک طرح احراز اصالت امن و کارآمد در شبکه‌های VANET از مسائل باز تحقیقاتی بوده و مهم‌ترین چالش در این شبکه‌ها به شمار می‌آید.
در این مقاله ابتدا به معرفی انواع روش‌های احراز اصالت در شبکه‌های VANET می‌پردازیم و سپس طرح ارائه شده توسط لی و لای را مورد تجزیه و تحلیل قرار می‌دهیم و سه سناریوی حمله به این طرح را معرفی می‌کنیم که امکان جعل امضای کاربر را به مهاجم می‌دهد. در ادامه یک طرح بهبودیافته از طرح لی و لای را پیشنهاد می‌دهیم که دارای ملزومات امنیتی و کارآیی مناسبی می‌باشد سپس آن را شبیه سازی کرده و در پایان نتایج شبیه‌سازی طرح پیشنهادی خود را ارائه خواهیم کرد.

کلیدواژه‌ها


عنوان مقاله [English]

An Improved Authentication Scheme with Conditional Privacy Preserving in VANETs

نویسندگان [English]

  • Seyed Mortaza Pour Naghi 1
  • Mostafa Barmashoori 2
  • Mahmoud Ghardeshi 3
1 PhD student, Qom University, Qom, Iran
2 Master's degree, Faculty of Computer Science, University of Tehran, Tehran, Iran
3 Assistant Professor, Imam Hossein University, Tehran, Iran
چکیده [English]

Vehicular Ad-hoc Networks (VANETs) can improve the communication between vehicles and
traffic management to control appropriate. Authentication of messages which is issued by each vehicle
is the most important problem in VANETs, because the wrong messages can cause crashes and change
the traffic patterns of network. Many authentication schemes have been proposed in VANETs, each of
which has advantages and disadvantages. In this paper first we introduce, a brief overview of these
schemes. Then we analyse an authentication scheme for VANETs which introduced by Lee and Lai
and introduce three scenarios that show their scheme is vulnerable to forgery attack. These attacks
motivated us to design a novel and secure TPD based authentication scheme satisfying all security
requirements in VANETs. Moreover, we introduce a simulation and comparison expressing the
efficiency and performance of the proposed scheme.

کلیدواژه‌ها [English]

  • VANET
  • conditional privacy preserving authentication
  • bilinear pairing
  • pseudo dentity
[1]     D .Antolino Rivas, et al., “Security on VANETs: Privacy misbehaving nodes false information and secure data aggregation,” Journal of Network and Computer Applications, vol. 34, no. 6, pp.       1942-1955, 2011.
[2]     A. Menezes, “An introduction to pairing-based cryptography,” 1991.           Online: http://www. math.uwaterloo.ca /ajmeneze/publications/pairings. Pdf (retrieved: January 2012). 
[3]     D. Hankerson, V. Scott,  and  J.  M.  Alfred, “Guide to elliptic curve cryptography,” Springer, 2004.
[4]     I. Blake, et al., “ Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series), Cambridge University Press, 2005.
[5]     H. Xiong, et al., “Anonymous Authentication Protocols for Vehicular Ad Hoc Networks: An Overview,” Applied Cryptography and Network Security, 2012.
[6]     A. Wasef, Y. Jian, and X. Shen, “An Efficient Distributed Certificate Service Scheme for Vehicular Networks,” IEEE Transaction on Vehicular Technology, vol. 59, no. 2 , P. 553, 2010.
[7]     R. Lu, et al., “ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications,” INFOCOM 2008. The 27th Conference on Computer Communications IEEE, 2008.
[8]     D. Boneh, B. Lynn, and H. Shacham, “short signature from the weil pairing,” In proceedings of Asiacrypt, p. 2248, pp. 514-532, 2001.
[9]     X. Sun, L. Xiaodong, and H. Pin-Han, “Secure vehicular communications based on group signature and ID-based signature scheme,” Communications, 2007, ICC'07, IEEE International Conference on, IEEE, 2007.
[10]   H. Xiong, Z. Qin, and F. Li, “Identity-based Ring Signature Scheme based on quadratic residues,” High Technology Letters, vol. 15, no. 1, pp.        94-100, 2011.
[11]   H. Xiong, C. Zhong, and L. Fagen, “Efficient and multi-level privacy-preserving communication protocol for VANET,” Computers & Electrical Engineering vol. 38, no. 3, pp. 573-581, 2012.
[12]   C. Zhang, et al., “RAISE: an efficient RSU-aided message authentication scheme in vehicular communication networks,” Communications, 2008. ICC'08, IEEE International Conference on, IEEE, 2008.
[13]   C. Zhang, H. Pin-Han, and T. Janos, “On batch verification with group testing for vehicular communications,” Wireless Networks, vol. 17, no. 8, pp. 1851-1865, 2011.
[14]   Lee, Cheng-Chi, and L. Yan-Ming, “Toward a secure batch verification with group testing for VANET,” Wireless Networks, pp. 1-9, 2013.
[15]   H. Haj Salem, J. Chrisoulakis, M. Papageorgiou, N. Elloumi, and P. Papadakos, “The use of METACOR tool for integrated urban and interurban trac control,” Evaluation in corridor peripherique, Paris, Vehicle Navigation and Information Systems Conference, Proceedings, pp. 645-650, 1994. 
[16]   K. Nagel and A. Schleicher, “Microscopic traffic modeling on parallel high performance computers,” Parallel Computing, vol. 20, no. 1, pp. 125-146, 1994.
[17]   S. Krau, “Microscopic modeling of trac Investigation of collision free vehicle dynamics,” Ph. D. thesis, Universitat zu Koln, 1998.
[18]    M. Treiber, A. Hennecke, and D. Helbing, “Congested trac states in empirical observations and microscopic simulations,”  Phys. Rev. E 62, 2000. 18051824.doi:10.1103/PhysRevE.62.1805. Figure 9: Box chart of simulation time.
[19]   F. Bai, N. Sadagopan, and A. Helmy, “The fimportantg framework for analyzing the Impact of Mobility on Performance Of Routing protocols for Adhoc Networks,” Ad Hoc Networks vol. 1,        pp. 383-403, 2003. Doi: 10.1016/S1570-8705(03)00040-4.
[20]   N. Aschenbruck, et al., “Bonnmotion: a mobility scenario generation and analysis tool,” Proceedings of the 3rd International ICST Conference on Simulation Tools and Techniques, ICST (Institute for Computer Sciences, Social Informatics and Telecommunications Engineering), 2010.
[21]   A. K. Saha and B. J. David, "Modeling mobility for vehicular ad-hoc networks,” Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks, ACM, 2004.
[22]   R. Mangharam, et al., “GrooveSim: a   topography-accurate simulator for geographic routing in vehicular networks,” Proceedings of the 2nd ACMinternational workshop on Vehicular ad hoc networks, ACM, 2005.
[23]   M. Feeley, H. Norman, and R. Suprio, “ealistic mobility for mobile ad hoc network simulation,” Ad-Hoc, Mobile, and Wireless Networks, Springer Berlin Heidelberg, pp.         324-329, 2004.
[24]   A. Mahajan, et al., “Evaluation of mobility models for vehicular ad-hoc network simulations,” IEEE International Workshop on Next Generation Wireless Networks (WoNGeN), 2006.
[25]   Zimmermann, Hans-Martin, G. Ingo,  and R. Christian, “A voronoi-based mobility model for urban environments,” Wireless Conference 2005-Next Generation Wireless and Mobile Communications and Services (European Wireless), 11th European, VDE, 2005.
[26]   J. Miller and E. Horowitz, “A free real-time freeway trac simulator,” in: Intelligent Transportation Systems Conference, ITSC2007. IEEE, pp.18-23, 2007. 
[27]   J. Härri, et al., “Vanet Mobi Sim: generating realistic mobility patterns for VANETs,” Proceedings of the 3rd international workshop on Vehicular ad hoc networks, ACM, 2006.
[28]   Krajzewicz, Daniel, and R. Christian, “Simulation of urban mobility (SUMO),” Centre for Applied Informatics (ZAIK) and the Institute of Transport Research at the German Aerospace Centre,  2007.
[29]   Karnadi, K. Feliz, H. M. Zhi, and L. Kun-chan “Rapid generation of realistic mobility models for VANET,” Wireless Communications and Networking Conference, WCNC 2007, IEEE, 2007.
[30] K. Fall and K. Varadhan, Ns Notes and Documents 2011. URL:http://www.isi.edu/nsnam/ns/ns-documentation.html.IEEE Std 1609.2-2013 (Revision of IEEE Std 1609.2-2006) (2013)