Skip to main content

Efficient Privacy Protection Authentication Scheme in Vehicle Ad Hoc Networks

  • Conference paper
  • First Online:
Cyberspace Safety and Security (CSS 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11982))

Included in the following conference series:

  • 1018 Accesses

Abstract

In this paper, a group signature-based vehicle information sharing scheme for vehicular ad hoc networks with effective privacy protection is proposed. The design goals are achieved by technologies such as distributed management, HMAC, batch signature verification and cooperative authentication. First, divide the entire network into different domains for local management. Second, HMAC is used instead of time-consuming revocation list checking, and the integrity of messages prior to bulk authentication is ensured to avoid the number of invalid messages in bulk verification. Finally, we also use the cooperative certification method to further improve the efficiency of the program. By adopting the above technology, our proposed solution can meet the verification requirements. Security and performance analysis shows that our proposed solution enables efficient group signature-based authentication while maintaining conditional privacy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Author, F.: Article title. Journal 2(5), 99–110 (2016). Zhang, C., Lu, R., Lin, X., et al: An efficient identity-based batch verification scheme for vehicular sensor networks. In: Proceedings of the 27th IEEE Conference on Computer Communications, INFOCOM 2008, pp. 246–250 (2008)

    Google Scholar 

  2. Sun, Y., Lu, R., Lin, X., et al.: An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. IEEE Trans. Veh. Technol. 59(7), 3589–3603 (2010)

    Article  Google Scholar 

  3. Zhang, L., Wu, Q., Solanas, A., et al.: A scalable robust authentication protocol for secure vehicular communications. IEEE Trans. Veh. Technol. 59(4), 1606–1617 (2010)

    Article  Google Scholar 

  4. Mershad, K., Artail, H.: A framework for secure and efficient data acquisition in vehicular Ad Hoc networks. IEEE Trans. Veh. Technol. 62(2), 535–551 (2013)

    Article  Google Scholar 

  5. Wasef, A., Shen, X.: Expedite message authentication protocol for vehicular Ad Hoc networks. IEEE Trans. Mob. Comput. 12(1), 78–89 (2013)

    Article  Google Scholar 

  6. Jiang, S., Zhu, X., Wang, L.: A conditional privacy scheme based on anonymized batch authentication in vehicular ad hoc networks. In: Proceedings of 2013 IEEE International Conference on Wireless Communications and Networking, WCNC 2013, pp. 2375–2380 (2013)

    Google Scholar 

  7. Wasef, A., Shen, X.: Efficient group signature scheme supporting batch verification for securing vehicular networks. In: 2010 IEEE International Conference on Communications, ICC 2010, pp. 1–5 (2010)

    Google Scholar 

  8. Zhang, C., Sun, X.R., Lu, P.-H.H., et al.: An efficient message authentication scheme for vehicular communications. IEEE Trans. Veh. Technol. 57(6), 3357–3368 (2008)

    Article  Google Scholar 

  9. Hao, Y., Chen, Y., Zhou, C., et al.: A distributed key management framework with cooperative message authentication in VANETs. IEEE J. Sel. Areas Commun. 29(3), 616–629 (2011)

    Article  Google Scholar 

  10. Zhu, X., Jiang, S., Wang, L., et al.: Privacy-preserving authentication based on group signature for VANETs. In: Proceedings of the 2013 IEEE Global Communications Conference, GLOBE-COM 2013, pp. 4609–4614 (2013)

    Google Scholar 

  11. Hao, Y., Cheng, Y., Ren, K.: Distributed key management with protection against RSU compromise in group signature based VANETs. In: Proceedings of IEEE GLOBECOM 2008, pp. 1–5 (2008)

    Google Scholar 

  12. Dutta, R., Mukhopadhyay, S., Collie, R.M.: Computationally secure self-healing key distribution with revocation in wireless ad hoc networks. Ad Hoc Netw. 8(6), 597–613 (2010)

    Article  Google Scholar 

  13. Schnorr, C.: Efficient signature generation by smart cards. J. Cryptol. 4(3), 161–174 (1991)

    Article  Google Scholar 

Download references

Acknowledgment

The work of this paper were supported in part by East China Jiaotong university research fund under Grant No. 14RJ02 and Jiangxi provincial department of science and technology research found under Grant No. 20122BAB201040.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lv ShanGuo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

ShanGuo, L. (2019). Efficient Privacy Protection Authentication Scheme in Vehicle Ad Hoc Networks. In: Vaidya, J., Zhang, X., Li, J. (eds) Cyberspace Safety and Security. CSS 2019. Lecture Notes in Computer Science(), vol 11982. Springer, Cham. https://doi.org/10.1007/978-3-030-37337-5_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-37337-5_23

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-37336-8

  • Online ISBN: 978-3-030-37337-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics