An Efficient Dynamic Group-Based Batch Verification Scheme for Vehicular Sensor Networks

  • Liming Jiang
  • Yan Wang
  • Jiajun Tian
  • Frank JiangEmail author
  • Nick Patterson
  • Robin Doss
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 1113)


The batch verification methods can relieve the bottleneck problem of vehicular authentication efficiency to accelerate the authentication speed during the group construction phase. However, in current batch verification methods, there exist some deficiencies such as the authentication methods applied in the actual scenario are sensitive to the group initialization and dynamic construction process and the intra-group communication efficiency have not been improved due to lack of effective dynamic group management. This paper proposes a fast and secure batch verification scheme based on dynamic group management and certificateless public-key cryptography. First, the two-way authentication between the proxy vehicle and the roadside unit (RSU) is established, and then the batch verification method relying on RSU-assisted are proposed based on dynamic management of the intra-group vehicles. Our method fully considers the security requirements of the group while solving certification efficiency. Theoretical analysis and simulation experiments show that compared with other existing solutions, the verification scheme in this paper reduces the computational delay and transmission overhead whilst increasing robustness in dynamic environments.


VANETs Dynamic group Batch verification RSU-assisted 


  1. 1.
    Qu, F., Wu, Z., Wang, F.-Y., Cho, W.: A security and privacy review of VANETs. IEEE Trans. Intell. Transp. Syst. 16(6), 2985–2996 (2015)CrossRefGoogle Scholar
  2. 2.
    Al-Sultan, S., Al-Doori, M.M., Al-Bayatti, A.H., Zedan, H.: A comprehensive survey on vehicular ad hoc network. J. Netw. Comput. Appl. 37, 380–3923 (2014)CrossRefGoogle Scholar
  3. 3.
    Lu, R., Lin, X., Liang, X., Shen, X.: A dynamic privacy-preserving key management scheme for location-based services in VANETs. IEEE Trans. Intell. Transp. Syst. 13(1), 127–139 (2012)CrossRefGoogle Scholar
  4. 4.
    Xiong, H., Chen, Z., Li, F.: Efficient and multi-level privacy-preserving communication protocol for VANET. Comput. Electr. Eng. 38(3), 573–581 (2012)CrossRefGoogle Scholar
  5. 5.
    Raya, M, Aziz, A, Hubaux, J.P.: Efficient secure aggregation in VANETs. In: Proceedings of International Workshop on Vehicular Ad Hoc Networks, New York, pp. 67–75 (2006)Google Scholar
  6. 6.
    Chim, T.W., Yiu, S.M., Lucas, C.K., et al.: SPECS: secure and privacy enhancing communications schemes for VANETs. Ad Hoc Netw. 9, 189–203 (2011)CrossRefGoogle Scholar
  7. 7.
    Zhang, C., Lu, R., Lin, X., et al.: An efficient identity based batch verification scheme for vehicular sensor networks. In: The 27th IEEE Conference on Computer Communications, INFOCOM, Phoenix, AZ, pp. 246–250 (2008)Google Scholar
  8. 8.
    Lu, R., Lin, X., Zhu, H., et al.: ECPP: efficient conditional privacy preservation protocol for secure vehicular communications. In: Proceedings of IEEE INFOCOM, Phoenix, pp. 1229–1237 (2008)Google Scholar
  9. 9.
    Yang, J.H., Chang, C.C.: An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Comput. Secur. 28, 138–143 (2009)CrossRefGoogle Scholar
  10. 10.
    Huang, J.L., Yeh, L.Y., Chien, H.Y.: ABAKA: an anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks. IEEE Trans. Veh. Technol. 60, 248–262 (2011)CrossRefGoogle Scholar
  11. 11.
    Shim, K.A.: CPAS: an efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Trans. Veh. Technol. 61, 1874–1883 (2012)CrossRefGoogle Scholar
  12. 12.
    Sun, Y., Lu, R., Lin, X., et al.: An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. IEEE Trans. Veh. Technol. 59, 3589–3603 (2010)CrossRefGoogle Scholar
  13. 13.
    Liu, J.K., Yuen, T.H., Au, M.H., Susilo, W.: Improvements on an authentication scheme for vehicular sensor networks. Expert Syst. Appl. 41(5), 2559–2564 (2014)CrossRefGoogle Scholar
  14. 14.
    Liu, Y., Wang, L., Chen, H.-H.: Message authentication using proxy vehicles in vehicular ad hoc networks. IEEE Trans. Veh. Technol. 64(8), 3697–3710 (2015)CrossRefGoogle Scholar
  15. 15.
    Zhang, C., Lin, X., Lu, R., Ho, P.H.: RAISE: an efficient RSU-aided message authentication scheme in vehicular communication networks. In: ICC 2008, IEEE International Conference on Communications, pp. 1451–1457. IEEE (2008)Google Scholar
  16. 16.
    Shao, J., Lin, X., Lu, R., Zuo, C.: A threshold anonymous authentication protocol for VANETs. IEEE Trans. Veh. Technol. 65(3), 1711–1720 (2016)CrossRefGoogle Scholar
  17. 17.
    Chuang, M.-C., Lee, J.-F.: TEAM: trust-extended authentication mechanism for vehicular ad hoc networks. IEEE Syst. J. 8(3), 749–758 (2014)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Liming Jiang
    • 1
  • Yan Wang
    • 2
  • Jiajun Tian
    • 2
  • Frank Jiang
    • 3
    Email author
  • Nick Patterson
    • 3
  • Robin Doss
    • 3
  1. 1.School of Computer Science and TechnologyHunan University of Science and TechnologyXiangtanChina
  2. 2.School of Computer Science and TechnologyUniversity of South ChinaHengyangChina
  3. 3.School of Information TechnologyDeakin UniversityGeelongAustralia

Personalised recommendations