An Improved Authentication Scheme with Conditional Privacy Preserving in VANETs

Authors

1 PhD student, Qom University, Qom, Iran

2 Master's degree, Faculty of Computer Science, University of Tehran, Tehran, Iran

3 Assistant Professor, Imam Hossein University, Tehran, Iran

Abstract

Vehicular Ad-hoc Networks (VANETs) can improve the communication between vehicles and
traffic management to control appropriate. Authentication of messages which is issued by each vehicle
is the most important problem in VANETs, because the wrong messages can cause crashes and change
the traffic patterns of network. Many authentication schemes have been proposed in VANETs, each of
which has advantages and disadvantages. In this paper first we introduce, a brief overview of these
schemes. Then we analyse an authentication scheme for VANETs which introduced by Lee and Lai
and introduce three scenarios that show their scheme is vulnerable to forgery attack. These attacks
motivated us to design a novel and secure TPD based authentication scheme satisfying all security
requirements in VANETs. Moreover, we introduce a simulation and comparison expressing the
efficiency and performance of the proposed scheme.

Keywords


[1]     D .Antolino Rivas, et al., “Security on VANETs: Privacy misbehaving nodes false information and secure data aggregation,” Journal of Network and Computer Applications, vol. 34, no. 6, pp.       1942-1955, 2011.
[2]     A. Menezes, “An introduction to pairing-based cryptography,” 1991.           Online: http://www. math.uwaterloo.ca /ajmeneze/publications/pairings. Pdf (retrieved: January 2012). 
[3]     D. Hankerson, V. Scott,  and  J.  M.  Alfred, “Guide to elliptic curve cryptography,” Springer, 2004.
[4]     I. Blake, et al., “ Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series), Cambridge University Press, 2005.
[5]     H. Xiong, et al., “Anonymous Authentication Protocols for Vehicular Ad Hoc Networks: An Overview,” Applied Cryptography and Network Security, 2012.
[6]     A. Wasef, Y. Jian, and X. Shen, “An Efficient Distributed Certificate Service Scheme for Vehicular Networks,” IEEE Transaction on Vehicular Technology, vol. 59, no. 2 , P. 553, 2010.
[7]     R. Lu, et al., “ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications,” INFOCOM 2008. The 27th Conference on Computer Communications IEEE, 2008.
[8]     D. Boneh, B. Lynn, and H. Shacham, “short signature from the weil pairing,” In proceedings of Asiacrypt, p. 2248, pp. 514-532, 2001.
[9]     X. Sun, L. Xiaodong, and H. Pin-Han, “Secure vehicular communications based on group signature and ID-based signature scheme,” Communications, 2007, ICC'07, IEEE International Conference on, IEEE, 2007.
[10]   H. Xiong, Z. Qin, and F. Li, “Identity-based Ring Signature Scheme based on quadratic residues,” High Technology Letters, vol. 15, no. 1, pp.        94-100, 2011.
[11]   H. Xiong, C. Zhong, and L. Fagen, “Efficient and multi-level privacy-preserving communication protocol for VANET,” Computers & Electrical Engineering vol. 38, no. 3, pp. 573-581, 2012.
[12]   C. Zhang, et al., “RAISE: an efficient RSU-aided message authentication scheme in vehicular communication networks,” Communications, 2008. ICC'08, IEEE International Conference on, IEEE, 2008.
[13]   C. Zhang, H. Pin-Han, and T. Janos, “On batch verification with group testing for vehicular communications,” Wireless Networks, vol. 17, no. 8, pp. 1851-1865, 2011.
[14]   Lee, Cheng-Chi, and L. Yan-Ming, “Toward a secure batch verification with group testing for VANET,” Wireless Networks, pp. 1-9, 2013.
[15]   H. Haj Salem, J. Chrisoulakis, M. Papageorgiou, N. Elloumi, and P. Papadakos, “The use of METACOR tool for integrated urban and interurban trac control,” Evaluation in corridor peripherique, Paris, Vehicle Navigation and Information Systems Conference, Proceedings, pp. 645-650, 1994. 
[16]   K. Nagel and A. Schleicher, “Microscopic traffic modeling on parallel high performance computers,” Parallel Computing, vol. 20, no. 1, pp. 125-146, 1994.
[17]   S. Krau, “Microscopic modeling of trac Investigation of collision free vehicle dynamics,” Ph. D. thesis, Universitat zu Koln, 1998.
[18]    M. Treiber, A. Hennecke, and D. Helbing, “Congested trac states in empirical observations and microscopic simulations,”  Phys. Rev. E 62, 2000. 18051824.doi:10.1103/PhysRevE.62.1805. Figure 9: Box chart of simulation time.
[19]   F. Bai, N. Sadagopan, and A. Helmy, “The fimportantg framework for analyzing the Impact of Mobility on Performance Of Routing protocols for Adhoc Networks,” Ad Hoc Networks vol. 1,        pp. 383-403, 2003. Doi: 10.1016/S1570-8705(03)00040-4.
[20]   N. Aschenbruck, et al., “Bonnmotion: a mobility scenario generation and analysis tool,” Proceedings of the 3rd International ICST Conference on Simulation Tools and Techniques, ICST (Institute for Computer Sciences, Social Informatics and Telecommunications Engineering), 2010.
[21]   A. K. Saha and B. J. David, "Modeling mobility for vehicular ad-hoc networks,” Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks, ACM, 2004.
[22]   R. Mangharam, et al., “GrooveSim: a   topography-accurate simulator for geographic routing in vehicular networks,” Proceedings of the 2nd ACMinternational workshop on Vehicular ad hoc networks, ACM, 2005.
[23]   M. Feeley, H. Norman, and R. Suprio, “ealistic mobility for mobile ad hoc network simulation,” Ad-Hoc, Mobile, and Wireless Networks, Springer Berlin Heidelberg, pp.         324-329, 2004.
[24]   A. Mahajan, et al., “Evaluation of mobility models for vehicular ad-hoc network simulations,” IEEE International Workshop on Next Generation Wireless Networks (WoNGeN), 2006.
[25]   Zimmermann, Hans-Martin, G. Ingo,  and R. Christian, “A voronoi-based mobility model for urban environments,” Wireless Conference 2005-Next Generation Wireless and Mobile Communications and Services (European Wireless), 11th European, VDE, 2005.
[26]   J. Miller and E. Horowitz, “A free real-time freeway trac simulator,” in: Intelligent Transportation Systems Conference, ITSC2007. IEEE, pp.18-23, 2007. 
[27]   J. Härri, et al., “Vanet Mobi Sim: generating realistic mobility patterns for VANETs,” Proceedings of the 3rd international workshop on Vehicular ad hoc networks, ACM, 2006.
[28]   Krajzewicz, Daniel, and R. Christian, “Simulation of urban mobility (SUMO),” Centre for Applied Informatics (ZAIK) and the Institute of Transport Research at the German Aerospace Centre,  2007.
[29]   Karnadi, K. Feliz, H. M. Zhi, and L. Kun-chan “Rapid generation of realistic mobility models for VANET,” Wireless Communications and Networking Conference, WCNC 2007, IEEE, 2007.
[30] K. Fall and K. Varadhan, Ns Notes and Documents 2011. URL:http://www.isi.edu/nsnam/ns/ns-documentation.html.IEEE Std 1609.2-2013 (Revision of IEEE Std 1609.2-2006) (2013)
  • Receive Date: 07 December 2014
  • Revise Date: 21 June 2023
  • Accept Date: 19 September 2018
  • Publish Date: 23 July 2015