EIAS-CP: new efficient identity-based authentication scheme with conditional privacy-preserving for VANETs
- 331 Downloads
In VANETs, vehicles broadcast traffic-related messages periodically according to Dedicated Short Range Communication protocol. To ensure the reliability and integrity of messages, authentication schemes are involved in VANETs. As traffic-related messages are time-sensitive, they must be verified and processed timely, or it may cause inestimable harm to the traffic system. However, the OBUs and the RSUs are limited in computation ability and cannot afford vast messages’ verification. Recently, some identity-based authentication schemes using bilinear pairing have been proposed to improve the efficiency of message verification for VANETs. Nevertheless, the bilinear pairing is not suited for VANETs due to its complex operations. The design of an efficient and secure authentication scheme with low computation cost for VANETs still is a rewarding challenge. To settle this challenge, a new efficient identity-based authentication scheme is proposed in this paper. The proposed scheme ensures reliability and integrity of messages and provides conditional privacy-preserving. Compared with the most recent proposed authentication schemes for VANETs, the computation costs of the message signing and verification in the proposed scheme reduce by 88 and 93 % respectively, while security analysis demonstrates that our proposed scheme satisfies all security and privacy requirements for VANETs.
KeywordsVANETs Authentication cost Conditional privacy-preserving Elliptic curve cryptosystem
The authors extend their appreciation to the Deanship of Scientific Research at King Saud University, Riyadh, Saudi Arabia for funding this work through the research group project No RGP-VPP-318.
- 6.Zhu, H., Lin, X., Lu, R., Ho, P. H., & Shen, X. (2008). AEMA: An aggregated emergency message authentication scheme for enhancing the security of vehicular ad hoc networks. In 2008 IEEE International Conference on Communications (pp. 1436–1440).Google Scholar
- 8.Jiang, Q., Khan, M. K., Lu, X., Ma, J., & He, D. (2016). A privacy preserving three-factor authentication protocol for e-Health clouds. The Journal of Supercomputing, 1-24.Google Scholar
- 10.Freudiger, J., Raya, M., Félegyházi, M., & Papadimitratos, P. (2007). Mix-zones for location privacy in vehicular networks.Google Scholar
- 11.Lu, R., Lin, X., Zhu, H., Ho, P. H., & Shen, X. (2008). ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications. In The 27th conference on computer communications (INFOCOM 2008).Google Scholar
- 12.Zhang, C., Lin, X., Lu, R., & Ho, P. H. (2008, May). RAISE: an efficient RSU-aided message authentication scheme in vehicular communication networks. In 2008 IEEE international conference on communications (pp. 1451–1457).Google Scholar
- 13.Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In Proceedings of CRYPTO’ (Vol. 84).Google Scholar
- 14.Zhang, C., Lu, R., Lin, X., Ho, P. H., & Shen, X. (2008). An efficient identity-based batch verification scheme for vehicular sensor networks. In The 27th conference on computer communications (INFOCOM 2008).Google Scholar
- 21.Jianhong, Z., Min, X., & Liying, L. (2014). On the security of a secure batch verification with group testing for VANET. International Journal of Network Security, 16(5), 351–358.Google Scholar
- 23.Miller, V. S. (1985). Use of elliptic curves in cryptography. In Proceedings of CRYPTO’85 (pp. 417-426).Google Scholar
- 25.Hankerson, D., Menezes, A. J., & Vanstone, S. (2006). Guide to elliptic curve cryptography. New York: Springer.Google Scholar
- 26.Chen, J., Mamun, M. S. I., & Miyaji, A. (2015). An efficient batch verification system and its effect in a real time VANET environment. Security and Communication Networks, 8(2), 298–310.Google Scholar
- 27.Pointcheval, D., & Stern, J. (1996). Security proofs for signature schemes. In Proceedings of EUROCRYPT’96 (pp. 387–398).Google Scholar
- 28.MIRACL library on Certivox.com. https://www.certivox.com/miracl
- 30.He, D., Kumar, N., Wang, H., Wang, L., Choo K., Vinel A., A provably-secure cross-domainhandshake scheme with symptoms-matching for mobile healthcare social network. IEEE Transactions on Dependable and Secure Computing. doi: 10.1109/TDSC.2016.2596286.
- 32.He, D., Kumar, N., Shen, H., & Lee, J. H. (2015). One-to-many authentication for access control in mobile pay-TV systems. Science China Information Sciences, 1–14. doi: 10.1007/s11432-015-5469-5.
- 34.He, D., Zeadally, S., Kumar, N., & Lee, J. H. (2016). Anonymous authentication for wireless body area networks with provable security. IEEE Systems Journal. doi: 10.1109/JSYST.2016.2544805.