Skip to main content
Log in

An elliptic curve cryptography based certificate-less signature aggregation scheme for efficient authentication in vehicular ad hoc networks

  • Original Paper
  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

The main advantage of Vehicular Adhoc Networks being an inherent part of Intelligent Transportation Systems is to ensure the safety and comfort of commuters on the roads. In VANETs, due to the wide open nature of wireless communications, data transmission has been subjected to variety of security and privacy threats which causes disruptions in the network. Hence data has to be authenticated prior to communication. To address this problem enhanced elliptic curve cryptography based certificate-less signature aggregation scheme has been proposed to ensure full privacy preservation and to provide efficient security to the VANETs. Through formal and informal security analysis the proposed scheme has been tested and proven to be secure under suppositions made using Diffie-Hellman assumptions by using Random Oracle Model. The proposed scheme is implemented using MIRACL C +  + library and by using Veins Integrated Simulation Framework. The proposed scheme has been analyzed and compared with the existing standards which prove that the proposed scheme is efficient in terms of computation cost and communication costs. The major novelty of the proposed scheme is the use of aggregation and point addition which does not cause delay in verification and also reduces overhead in the road-side units by employing elliptic curve cryptography based distributed data authentication scheme. Hence, the traditional problems of certificate management and key escrow problem is solved by the proposed scheme in an efficient manner. This makes the proposed scheme to be much suitable for high volatile and resource-constrained vanet environments.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Lu, Z., Qu, G., & Liu, Z. (2018). A survey on recent advances in vehicular network security, trust, and privacy. IEEE Transactions on Intelligent Transportation Systems, 20(2), 760–776.

    Article  Google Scholar 

  2. Nidhal, M., Ben-othman, J., & Hamdi, M. (2014). Survey on VANET security challenges and possible cryptographic solutions. Vehicle Communication, 1, 53–66.

    Article  Google Scholar 

  3. Malik, N., Nanda, P., He, X., & Liu, R. P. (2020). Vehicular networks with security and trust management solutions: Proposed secured message exchange via blockchain technology. Wireless Networks, 26(6), 4207–4226.

    Article  Google Scholar 

  4. Ferrag, M. A., Maglaras, L., & A. Ah]mim,. (2017). Privacy-preserving schemes for ad hoc social networks: A survey. IEEE Communication Survev Tutoriols., 19(4), 3015–3045.

    Article  Google Scholar 

  5. Azimi, S. R., Bhatia, G., Rajkumar, R. R., & Mudalige, P. (2011). Vehicular networks for collision avoidance at intersections, SAE Int. Jorunals Passenger Cars Mechanic System, 4, 406–416.

    Article  Google Scholar 

  6. Vijayakumar, P., Azees, M., Kannan, A., & Jegatha Deborah, L. (2016). Dual authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks. IEEE Transactions on Intelligent Transportation Systems, 17(4), 1015–1028. https://doi.org/10.1109/TITS.2015.2492981

    Article  Google Scholar 

  7. Bitam, S., Mellouk, A., & Zeadally, S. (2015). VANET-cloud: A generic cloud com- puting model for vehicular ad hoc networks. IEEE Wireless Commun, 22(1), 96–102.

    Article  Google Scholar 

  8. Wang, Y., Ding, Y., Wu, Q., Wei, Y., Qin, B., & Wang, H. (2019). Privacy-preserving cloud based road condition monitoring with source authentication in VANETs. IEEE Transactions on Information Forensics and Security, 14(7), 1779–1790.

    Article  Google Scholar 

  9. Jiang, D., Taliwal, V., Meier, A., Holfelder, W., & Herrtwich, R. (2006). Design of 5.9 ghz dsrc-based vehicular safety communication. IEEE Wireless Communications, 13(5), 36–43.

    Article  Google Scholar 

  10. Li, X., Liu, T., Obaidat, M. S., Wu, F., Vijayakumar, P., & Kumar, N. (2020). A lightweight privacy-preserving authentication protocol for VANETs. IEEE Systems Journal, 14(3), 3547–3557.

    Article  Google Scholar 

  11. Ferrag, M. A., & Ahmim, A. (2017). ESSPR: An efficient secure routing scheme based on searchable encryption with vehicle proxy re-encryption for vehicular peer-to-peer social network. Telecommunication Systems, 66(3), 481–503.

    Article  Google Scholar 

  12. Wang, Y., Zhong, H., Xu, Y., Cui, J., & Wu, G. (2020). Enhanced security identity-based privacy-preserving authentication scheme supporting revocation for VANETs. IEEE Systems Journal, 14(4), 5373–5383.

    Article  Google Scholar 

  13. Eddine, M. S., Ferrag, M. A., Friha, O., & Maglaras, L. (2021). EASBF: An efficient authentication scheme over blockchain for fog computing-enabled internet of vehicles. Journal Information Security Applications., 59, 102802.

    Article  Google Scholar 

  14. Wang, Y., Zhang, W., Wang, X., Khan, M. K., & Fan, P. (2021). Efficient privacy-preserving authentication scheme with fine-grained error location for cloud-based VANET. IEEE Transactions on Vehicular Technology, 70(10), 10436–10449.

    Article  Google Scholar 

  15. Rajasoundaran, S., Kumar, S. V. N. S., Selvi, M., Sannasi Ganapathy, R., & Rakesh & Arupathraj Kannan,. (2021). Machine learning based volatile block chain construction for secure routing in decentralized military sensor networks. Wireless Networks, 27, 4513–4534. https://doi.org/10.1007/s11276-021-02748-2

    Article  Google Scholar 

  16. Vijayakumar, P., Azees, M., Kozlov, S. A., & Rodrigues, J. J. P. C. (2022). An anonymous batch authentication and key exchange protocols for 6g enabled VANETs. IEEE Transactions on Intelligent Transportation Systems, 23(2), 1630–1638.

    Article  Google Scholar 

  17. Wei, L., Cui, J., Xu, Y., Cheng, J., & Zhong, H. (2021). Secure and lightweight conditional privacy-preserving authentication for securing traffic emergency messages in VANETs. IEEE Transactions on Information Forensics and Security, 16, 1681–1695.

    Article  Google Scholar 

  18. R. Muthumeenakshi, T.R. Reshmi, K. Murugan, Extended 3PAKE authentication scheme for value-added services in VANETs. Computers & Electrical Engineering,.Volume 59, Pages 27–38, ISSN 0045–7906, https://doi.org/10.1016/j.compeleceng.2017.03.011.

  19. Kumar, P., Kumari, S., Sharma, V., Li, X., Sangaiah, A. K., & Islam, S. H. (2018). Secure CLS and CL-AS schemes designed for VANETs. The Journal of Supercomputing. https://doi.org/10.1007/s11227-018-2312-y

    Article  Google Scholar 

  20. Raya M , Hubaux JP . The security of vehicular ad hoc networks. In: Proceedings of the 3rd ACM workshop on security of ad hoc and sensor networks, Alexan- dria, VA, USA; 2005. p. 11–21.

  21. Sun, Y., Lu, R., Lin, X., Shen, X., & Su, J. (2010). An efficient pseudonomous authentication scheme with strong privacy preservation for vehicular communications. IEEE Transactions on Vehicular Technology, 59(7), 3589–3603.

    Article  Google Scholar 

  22. Lu R, Lin X, Zhu H, Ho P, Shen X. ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications. IEEE INFOCOM 2008 - the 27th conference on computer communications, Phoenix, AZ, USA; 2008. doi: https://doi.org/10.1109/INFOCOM.2008.179.

  23. Zhang C , Lin X , Lu R , Ho PH . RAISE: An efficient RSU-aided message authentication scheme in vehicular communication networks. In: Proceedings of the IEEE international conference on communications (ICC’08), Beijing, China; 2008. p. 1451–7.

  24. Raya, M., & Hubaux, J. (2007). Security vehicular ad hoc networks. Journal of Computer Security, 15(1), 39–68.

    Article  Google Scholar 

  25. De, D., Zeadally, S., Xu, B., & Huang, X. (2015). An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad-hoc networks. IEEE Transactions on Information Forensics and Security, 10(12), 2681–2691.

    Article  Google Scholar 

  26. Zhang C , Lin X , Ho PH , Shen X . An efficient identity-based batch verification scheme for vehicular sensor networks. In: Proceedings of IEEE INFOCOM’08 - the 27th conference on computer communications, Phoenix, AZ, USA; 2008. p. 816–24.

  27. Zhang, C., Ho, P. H., & Tapolcai, J. (2011). On BATCH VERIFICATION WITH GROUP TESTING FOR VEHICULAR COMMUNICATIONs. Wireless Networks, 17(8), 1851–1865.

    Article  Google Scholar 

  28. Li, J., Lu, H., & Guizani, M. (2015). ACPN: A novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs. IEEE Trans Parallel Distributions System, 24(6), 938–948.

    Article  Google Scholar 

  29. Zhang, J.-H., Xu, M., & Liu, L. (2014). On the security of a secure batch verification with group testing for VANETs. Int J Netw Secur, 16(5), 355–362.

    Google Scholar 

  30. Lo, N.-W., & Tsai, J.-L. (2016). An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings. IEEE Transactions on Intelligent Transportation Systems, 17(5), 1319–1328.

    Article  Google Scholar 

  31. Xie, Y., Wu, L., Shen, J., & Alelaiwi, A. (2017). EIAS-CP: New efficient identity-based authen- tication scheme with conditional privacy-preserving for VANETs. SPRINGER Telecommunicaton Syst, 65(2), 229–240.

    Article  Google Scholar 

  32. Lin X , Lu R . GSIS: Group signature and ID-based signature-based secure and privacy-preserving protocol. In: IEEE vehicular ad hoc network security and privacy. John Wiley & Sons Inc.; 2015. p. 21–49 . Chapter 2.

  33. Saiful, M., Mamun, I., & Miyaji, A. (2014). Secure VANET applications with a redefined group signature. 2014 twelfth annual conference on privacy, security and trust (PST) (pp. 199–206). Canada: Toronto, ON.

    Google Scholar 

  34. Ogundoyin, S. O. (2018). An autonomous lightweight conditional privacy-preserving au- thentication scheme with provable security for vehicular ad-hoc networks. International Journal of Computers and Applications. https://doi.org/10.1080/1206212X.2018.1477320

    Article  Google Scholar 

  35. Shim, K. (2012). CPAS: An efficient conditional privacy-preserving authentica- tion scheme for vehicular sensor networks. IEEE Transactions on Vehicular Technology, 61(4), 1874–1883.

    Article  Google Scholar 

  36. Shamir A (1984). Identity-based cryptosystem and signatures schemes. In: Blakley GR and Chaum D (eds) Advances in cryptology. CRYPTO 1984 LNCS 196. Berlin, Heidelberg: Springer, pp.47–53.

  37. S. S. Al-Riyami and K. G. Paterson, “Certificate-less public key cryptography,” In Proceedings of the International Conference on theory and Application of Cryptology and Information Security, pp. 452–473, Springer, Taipei, Taiwan, November 2003.

  38. Boneh, D.; Gentry, C.; Lynn, B.; Shacham, H. Aggregate and verifiably encrypted signatures from bilinear maps. In proceedings of the international conference on the theory and applications of cryptographic techniques, Warsaw, Poland, 4–8 May 2003;Springer: Berlin/Heidelberg, Germany, 2003; pp. 416–432.

  39. Cui, J., Zhang, J., Zhong, H., Shi, R., & Xu, Y. (2018). An efficient certificateless aggre- gate signature without pairings for vehicular ad hoc networks. Information Sciences, 451–452, 1–15.

    Google Scholar 

  40. Horng, S., Tzeng, S., Huang, P., Wang, X., Li, T., & Khan, M. K. (2015). An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks. Information Sciences, 317, 48–66.

    Article  MathSciNet  Google Scholar 

  41. Malhi, A. K., & Batra, S. (2015). An efficient certificateless aggregate signature scheme for vehicular ad hoc networks. Discrete Math Theor Comput Sci, DMTCS, 17(1), 317–338.

    MathSciNet  Google Scholar 

  42. Li J, Yuan H, Zhang Y. Cryptanalysis and Improvement of Certificateless Aggregate Signature With Conditional Privacy-Preserving for Vehicular Sensor Networks. IACR, Technical Report; 2016 . Eprint, [Online].

  43. Sripathi Venkata Naga, S. K., Yesuraj, R., Munuswamy, S., & Arputharaj, K. (2023). A comprehensive survey on certificate-less authentication schemes for vehicular ad hoc networks in intelligent transportation systems. Sensors., 23(5), 2682. https://doi.org/10.3390/s23052682

    Article  Google Scholar 

  44. Subramani, S., Selvi, M., Kannan, A., & Svn, S. K. (2023). Review of security methods based on classical cryptography and quantum cryptography. Cybernetics and Systems. https://doi.org/10.1080/01969722.2023.2166261

    Article  Google Scholar 

  45. Ali, I., Chen, Y., Ullah, N., Kumar, R., & He, W. (2021). An efficient and provably secure ecc-based conditional privacy-preserving authentication for vehicle-to-vehicle communication in VANETs. IEEE Transactions on Vehicular Technology, 70(2), 1278–1291.

    Article  Google Scholar 

  46. Chen, L., Cheng, Z., & Smart, N. P. (2007). Identity-based key agreement protocols from pairings. International Journal of Information Security, 6(4), 213–241.

    Article  Google Scholar 

  47. Ismaila A K, Sunday O O (2019), An improved certificate-less aggregate signature scheme without bilinear pairings for vehicular ad hoc networks. Journal of Information Security and Applications. Volume 44, , Pages 184–200, ISSN 2214–2126.

  48. S. V. N. Santhosh Kumar, M. Selvi, A. Kannan, S. Ganapathy, An energy-efficient and secured hop-by-hop authentication protocol for wireless sensor networks, Proceedings of international conference on communication and computational technologies, 2021, ISBN : 978–981–15–5076–8

  49. Santhosh Kumar, S.V.N., Palanichamy, Y., Selvi, M, Sannasi Ganapathy, Arputharaj Kannan & Sankar Pariserum Perumal, Energy efficient secured K means based unequal fuzzy clustering algorithm for efficient reprogramming in wireless sensor networks. Wireless Netw 27, 3873–3894 (2021). https://doi.org/10.1007/s11276-021-02660-9

  50. Sethuraman, P., Tamizharasan, P. S., & Arputharaj, K. (2019). Fuzzy genetic elliptic curve diffie hellman algorithm for secured communication in networks. Wireless Personal Communications, 105, 993–1007. https://doi.org/10.1007/s11277-019-06132-4

    Article  Google Scholar 

  51. Li, J., Ji, Y., Choo, K.-K. R., & Hogrefe, Di. (2019). CL-CPPA: certificate-less conditional privacy-preserving authentication protocol for the internet of vehicles. IEEE Internet of Things J, 6(6), 10332–10343.

    Article  Google Scholar 

  52. Wang, Y., Liu, Y., & Tian, Y. (2022). ISC-CPPA:Improverd-Security Certificate-less Conditional Privacy-preserving authentication Scheme With Revocation. IEEE Transactions on Vehicular Technology, 14(8), 1–11. https://doi.org/10.1109/TVT.2022.3194060

    Article  Google Scholar 

  53. Liu, Y., Wang, L., & Chen, H.-H. (2015). Message authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks. IEEE Transactions on Vehicular Technology, 64(8), 3697–3710. https://doi.org/10.1109/TVT.2014.2358633

    Article  Google Scholar 

  54. Samra Bouakkaz, Fouzi Semchedine, A certificate-less ring signature scheme with batch verification for applications in VANET, Journal of Information Security and Applications, Volume 55, 2020,102669, pp.1–14, ISSN 2214–2126, https://doi.org/10.1016/j.jisa.2020.102669.

  55. Yang, Y., Zhang, L., Zhao, Y., Choo, K.-K.R., & Zhang, Y. (2022). Privacy-preserving aggregation-authentication scheme for safety warning system in fog-cloud based VANET. IEEE Transactions on Information Forensics and Security, 17, 317–331. https://doi.org/10.1109/TIFS.2022.3140657

    Article  Google Scholar 

  56. Wang, H., Wang, L., Zhang, K., Li, J., & Luo, Y. (2022). A conditional privacy-preserving certificate-less aggregate signature scheme in the standard model for vanets. IEEE Access, 10, 15605–15618. https://doi.org/10.1109/ACCESS.2022.3147595

    Article  Google Scholar 

  57. Horng, S.-J., Tzeng, S.-F., Huang, P.-H., Wang, X., Li, T., & Khan, M. K. (Oct.2015). An efficient certificate-less aggregate signature with conditional privacy-preserving for vehicular sensor networks. Information Sciences, 317, 48–66.

    Article  MathSciNet  Google Scholar 

  58. Ismaila Adeniyi Kamil, Sunday Oyinlola Ogundoyin, An improved certificate-less aggregate signature scheme without bilinear pairings for vehicular ad hoc networks, Journal of Information Security and Applications, Volume 44, 2019, Pages 184–200, ISSN 2214–2126,

  59. Gayathri, N. B., Thumbur, G., & Rahman, M. Z. U. (2018). Efficient pairing-free Certificateless authentication scheme with batch verification for vehicular ad-hoc netwrks. IEEE Access, 6, 31808–31819.

    Article  Google Scholar 

  60. Jie Cui, Jing Zhang, Hong Zhong, Runhua Shi, Yan Xu, An efficient certificate-less aggregate signature without pairings for vehicular ad hoc networks, Information Sciences, Volumes 451–452, 2018, Pages 1–15, ISSN 0020–0255, https://doi.org/10.1016/j.ins.2018.03.060.

  61. G. Thumbur, G. S. Rao, P. V. Reddy, N. B. Gayathri, D. V. R. K. Reddy and M. Padmavathamma, "Efficient and Secure Certificate-less Aggregate Signature-Based authentication Scheme for Vehicular Ad Hoc Networks," in IEEE Internet of Things Journal, vol. 8, no. 3, pp. 1908–1920, 1 Feb.1, 2021, doi: https://doi.org/10.1109/JIOT.2020.3019304.

  62. Vallent, T. F., Hanyurwimfura, D., & Mikeka, C. (2021). Efficient certificate-less aggregate signature scheme with conditional privacy-preservation for vehicular ad hoc networks enhanced smart grid system. Sensors, 21, 2900. https://doi.org/10.3390/s21092900

    Article  Google Scholar 

  63. J. Zhang, J. Cui, H. Zhong, Z. Chen and L. Liu, "PA-CRT: Chinese remainder theorem based conditional privacy-preserving authentication scheme in vehicular Ad-Hoc networks," In IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 2, pp. 722–735, 1 March-April 2021, doi: https://doi.org/10.1109/TDSC.2019.2904274.

  64. Sunday Oyinlola Ogundoyin, Ismaila Adeniyi Kamil, “An efficient authentication scheme with strong privacy preservation for fog-assisted vehicular ad hoc networks based on blockchain and neuro-fuzzy”, Vehicular Communications, Volume 31, 2021, 100384, ISSN 2214–2096, https://doi.org/10.1016/j.vehcom.2021.100384.

  65. Han, Y., Song, W., Zhou, Z., Wang, H., & Yuan, B. (2022). eCLAS: an efficient pairing-free certificate-less aggregate signature for secure VANET communication. IEEE Systems Journal, 16(1), 1637–1648. https://doi.org/10.1109/JSYST.2021.3116029

    Article  Google Scholar 

  66. Rui Guo, Lei Xu, Xiong Li, Yinghui Zhang, Xuelei Li,”An efficient certificate-less ring signcryption scheme with conditional privacy-preserving in VANETs”, Journal of Systems Architecture, Volume 129, 2022, 102633, pp.1–14, ISSN 1383–7621, https://doi.org/10.1016/j.sysarc.2022.102633.

  67. Y. Chen and J. Chen, "CPP-CLAS: Efficient and conditional privacy-preserving certificate-less aggregate signature scheme for VANETs," In IEEE Internet of Things Journal, vol. 9, no. 12, pp. 10354–10365, 15 June15, 2022, doi: https://doi.org/10.1109/JIOT.2021.3121552.

  68. Zhou, X., Luo, M., Vijayakumar, P., Peng, C., & He, D. (2022). Efficient certificate-less conditional privacy-preserving authentication for VANETs. IEEE Transactions on Vehicular Technology, 71(7), 7863–7875. https://doi.org/10.1109/TVT.2022.3169948

    Article  Google Scholar 

  69. Zhang, L., Zhang, F., Wu, Q., & Domingo-Ferrer, J. (2010). Simulatable certificateless two-party authenticated key agreement protocol. Information Sciences, 180, 1020–1030.

    Article  MathSciNet  Google Scholar 

  70. Pointcheval, D., & Stern, J. (2000). Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13(3), 361–396.

    Article  Google Scholar 

  71. He, D., Zeadally, S., Xu, B., & Huang, X. (2015). An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Transactions on Information Forensics and Security, 10(12), 2681–2691.

    Article  Google Scholar 

  72. Malhi, A. K., & Batra, S. (2015). An efficient certificate-less aggregate signature scheme for vehicular ad hoc networks. Discrete Math Theor Comput Sci, 17(1), 317–338.

    MathSciNet  Google Scholar 

  73. Li J, Yuan H, Zhang Y. Cryptanalysis and Improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor Net- works. IACR, Technical Report; 2016 . Eprint, [Online]

  74. Mahendran, J., & Lakshmana, L. (2022). Fog computing with IoT device’s data security management using density control weighted election and extensible authentication protocol. International Journal of Intelligent Engineering and Systems, 15(1), 21–32.

    Google Scholar 

  75. Dindayal, M., & Yadav, D. K. (2018). Performance analysis of RSA and elliptic curve cryptography. International Journal of Network Security, 20(4), 625–635. https://doi.org/10.6633/IJNS.201807

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. V. N. Santhosh Kumar.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rajkumar, Y., Kumar, S.V.N.S. An elliptic curve cryptography based certificate-less signature aggregation scheme for efficient authentication in vehicular ad hoc networks. Wireless Netw 30, 335–362 (2024). https://doi.org/10.1007/s11276-023-03473-8

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-023-03473-8

Keywords

Navigation