Skip to main content
Log in

SPSR-VCP: secure and privacy preserving SignRecryption in vehicular cyber physical systems

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Intelligent transportation is one of the most anticipated projects of cyber-physical systems (CPS), and complete implementation of vehicular ad hoc network (VANET) on road is a fictional reality of the future. Security risks are the major limiting factor in VANET implementation in real life. The intrusion of any unwanted or unauthorized person in a vehicular network leads to significant damage to other authorized vehicles in the network. To prevent this, we propose a secure and privacy-preserving signRecryption protocol which also embeds group signature with a complete authentication protocol. Signcryption increases efficiency, re-encryption provides robustness, group signature ensures privacy, and authentication restricts unauthorized access in the network. All these properties are integrated to deliver the final protocol which is highly efficient, robust and secure. Security of the algorithm has been verified using Burrows-Abadi-Needham (BAN) logic and Automated Validation of Internet Security Protocols and Applications (AVISPA) tool.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  • Armando A et al. (2005) The AVISPA tool for the automated validation of internet security protocols and applications. In: International conference on computer aided verification. Springer, Berlin, Heidelberg, pp 281–285

  • Baheti R, Gill H (2011) Cyber-physical systems. Impact Control Technol 12(1):161–166

    Google Scholar 

  • Barreto PS, Libert B, McCullagh N, Quisquater JJ (2005) Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In: International conference on the theory and application of cryptology and information security. Springer, Berlin, Heidelberg, pp 515–532

  • Bayat M et al (2015) A secure authentication scheme for VANETs with batch verification. Wireless Netw 21(5):1733–1743

    Article  Google Scholar 

  • Blaze M et al (1998) Divertible protocols and atomic proxy cryptography. In: International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, Heidelberg, pp 127–144

  • Burrows M, Abadi M, Needham RM (1989) A logic of authentication. Proc Royal Soc London A Math Phys Sci 426(1871):233–271

    MathSciNet  MATH  Google Scholar 

  • Canetti R, Hohenberger S (2007) Chosen-ciphertext secure proxy re-encryption. In: Proceedings of the 14th ACM conference on Computer and communications security, pp 185-194

  • Chen L et al (2016) Private reputation retrieval in publica privacy-aware announcement scheme for VANETs. IET Inf Secur 11(4):204–210

    Article  Google Scholar 

  • Deka L et al (2018) Transportation Cyber-Physical System and its importance for future mobility. In: Transportation Cyber-Physical Systems, pp 1–20

  • Feng X et al (2017) A method for defensing against multi-source Sybil attacks in VANET. Peer-to-Peer Netw Appl 10(2):305–314

    Article  Google Scholar 

  • Ateniese G, Kevin F, Green M, Hohenberger S (2006) Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans Inf Syst Secur 9:1–30

    Article  Google Scholar 

  • Han Y, Fang D, Yue Z, Zhang J (2014) SCHAP: The aggregate signCryption based hybrid authentication protocol for VANET. In: International conference on Internet of vehicles, Springer, pp 218-226

  • Hong Z, Tang F, Luo W (2018) Privacy-Preserving Aggregate Signcryption for Vehicular Ad Hoc Networks. In: Proceedings of the 2nd international conference on cryptography, security and privacy, ACM

  • Jeong J, Lee E (2014) Vcps: Vehicular cyber-physical systems for smart road services. In: 28th International conference on advanced information networking and applications workshops (WAINA), IEEE, pp 133-138

  • Jia D et al (2016) A survey on platoon-based vehicular cyber-physical systems. IEEE Commun Surv Tutor 18(1):263–284

    Article  Google Scholar 

  • Jianhong Z, Min X, Liying L (2014) On the security of a secure batch verification with group testing for VANET. Int J Netw Secur 16(5):351–358

    Google Scholar 

  • Jinila YB, Komathy K (2013) A privacy preserving authentication framework for safety messages in VANET, IET, pp 456-461

  • Kalaiarasy C, Sreenath N, Amuthan A (2020) An effective variant ring signature-based pseudonym changing mechanism for privacy preservation in mixed zones of vehicular networks. J Ambient Intell Human Comput 11:1669–1681

    Article  Google Scholar 

  • Kanchan S, Chaudhari NS (2016) Integrating group signature scheme with Non-transitive Proxy Re-encryption in VANET. In: International conference on computing. Analytics and Security Trends (CAST), IEEE, pp 227–231

  • Kanchan S, Singh G, Chaudhari NS (2018) Re-encrypting secure and efficient routing in VANET groups using sharable clouds. In: 4th International conference on recent advances in information technology (RAIT). IEEE, pp 1-6

  • Kumari S, Khan MK (2014) More secure smart cardbased remote user password authentication scheme with user anonymity. Secur Commun Netw 7(11):2039–2053

    Article  Google Scholar 

  • Lin Xiaodong et al (2007) GSIS: A secure and privacy-preserving protocol for vehicular communications. IEEE Trans Veh Technol 56(6):3442–3456

    Article  Google Scholar 

  • Lu R et al (2013) A lightweight conditional privacy-preservation protocol for vehicular traffic-monitoring systems. IEEE Intell Syst 28(3):62–65

    Article  Google Scholar 

  • Ma C, Ao J (2009) Group-based Proxy Re-encryption Scheme Secure Against Chosen Ciphertext Attack. IJ Netw Secur 8(3):266–270

    Google Scholar 

  • Mekki T et al (2017) Vehicular cloud networks: Challenges, architectures, and future directions. Veh Commun 9:268–280

    Google Scholar 

  • Parne BL, Gupta S, Chaudhari NS (2018) Segb: Security enhanced group based aka protocol for m2m communication in an iot enabled lte/lte-a network. IEEE Access 6:3668–3684

    Article  Google Scholar 

  • Rawat DB, Bajracharya C, Yan G (2015) Towards intelligent transportation cyber-physical systems: Real-time computing and communications perspectives. In: 2015 SoutheastCon IEEE, pp 1-6

  • Savu L (2012) Signcryption scheme based on schnorr digital signature. arXiv preprint arXiv:1202.1663

  • Selvi M, Ramakrishnan B (2015) Prioritized and secured data dissemination technique in VANET based on optimal blowfish algorithm and signcryption method. Int J Comput Netw Appl 2(4):165–172

    Google Scholar 

  • Singh Sumitkumar, Vijayan R (2011) Enhanced security for information flow in vanet using signcryption and trust level. Int J Comput Appl 16(5):0975–8887

    Google Scholar 

  • Sneha K, Chaudhari NS (2018) SRCPR: SignReCrypting Proxy Re-signature in secure VANET Groups. IEEE Access 6:59282–59295

    Article  Google Scholar 

  • Sun X, Lin X, Ho P-H (2007) Secure vehicular communications based on group signature and ID-based signature scheme, In: International Conference on communications, IEEE, pp 1539-1545

  • Sur C, Park Y, Rhee KH (2016) An efficient and secure navigation protocol based on vehicular cloud. Int J Comput Math 93(2):325–344

    Article  MathSciNet  Google Scholar 

  • Wan C, Zhang J (2018) Efficient identity-based data transmission for VANET. J Ambient Intell Humaniz Comput 9(6):1861–1871

    Article  Google Scholar 

  • Wessels Jan, CMG FINANCE BV (2001) Application of BAN-logic, CMG FINANCE BV 19 : 1-23

  • Zheng Y (1997) Digital signcryption or how to achieve cost (signature & encryption) cost (signature)+ cost (encryption). In: Annual International Cryptology Conference, Springer, Berlin, Heidelberg

  • Zhao H et al (2018) Dynamic trust model for vehicular cyber-physical systems. Int J Netw Secur 20(1):157–167

    Google Scholar 

  • Zhou Y, Liu S, Xiao M, Deng S, Wang X (2018) An efficient V2I authentication scheme for VANETs. Mob Inf Syst 2018:4070283

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sneha Kanchan.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kanchan, S., Singh, G. & Chaudhari, N.S. SPSR-VCP: secure and privacy preserving SignRecryption in vehicular cyber physical systems. J Ambient Intell Human Comput 13, 1–20 (2022). https://doi.org/10.1007/s12652-020-02859-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-020-02859-2

Keywords

Navigation