Skip to main content

Efficient Anonymous Authentication Protocol Using Key-Insulated Signature Scheme for Secure VANET

  • Conference paper
Mobile Lightweight Wireless Systems (Mobilight 2009)

Abstract

In this paper, we propose an efficient authentication protocol with conditional privacy preservation for secure vehicular communications. The proposed protocol follows the system model to issue on-the-fly anonymous public key certificates to vehicles by road-side units. In order to design an efficient message authentication protocol, we consider a key-insulated signature scheme for certifying anonymous public keys of vehicles to such a system model. We demonstrate experimental results to confirm that the proposed protocol has better performance than other protocols based on group signature schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chen, L., Cheng, Z., Smart, N.P.: Identity-based key agreement protocols from pairings. International Journal of Information Security 6(4), 213–241 (2007)

    Article  Google Scholar 

  2. Dodis, Y., Katz, J., Xu, S., Yung, M.: Key-insulated public key cryptosystems. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 65–82. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  3. Lin, X., Sun, X., Shen, X.: GSIS: a secure and privacy preserving protocol for vehicular communications. IEEE Transaction on Vechicular Technology 56(6), 3442–3456 (2007)

    Article  Google Scholar 

  4. Lu, R., Lin, X., Zhu, H., Ho, P.-H., Shen, X.: ECPP: Efficient conditional privacy preservation protocol for secure vehilce communications. In: Proceedings of The IEEE INFOCOM 2008, pp. 1229–1237 (2008)

    Google Scholar 

  5. Ohtake, G., Hanaoka, G., Ogawa, K.: An efficient strong key-insulated signature scheme and its application. In: Mjølsnes, S.F., Mauw, S., Katsikas, S.K. (eds.) EuroPKI 2008. LNCS, vol. 5057, pp. 150–165. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  6. Parno, B., Perrig, A.: Challenges in securing vehicular networks. In: Proceedings of the Fourth Workshop on Hot Topics in Networks (HotNets-IV) (2005)

    Google Scholar 

  7. Raya, M., Hubaux, J.-P.: Securing vehicular ad hoc networks. Journal of Computer Security 15(1), 39–68 (2007)

    Article  Google Scholar 

  8. Zarki, M.E., Mehrotra, S., Tsudik, G.: Security Issues in a Future Vehicular Network. In: European Wireless 2002 (2002)

    Google Scholar 

  9. Dedicated Short Range Communications (DSRC), http://www.leearmstrong.com/dsrc/dsrchomeset.htm

  10. IEEE Standard 1609.2 - IEEE Trial-Use Standard for Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages (July 2006)

    Google Scholar 

  11. IEEE 802.11p parameters for NS2, http://dsn.tm.uni-karlsruhe.de/Overhaul_NS-2.php

  12. Network Simulator-NS2, http://www.isi.edu/nsnam/ns/

  13. TraNS - Realistic Simulator for VANET, http://trans.epfl.ch/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Park, Y., Sur, C., Jung, C.D., Rhee, KH. (2009). Efficient Anonymous Authentication Protocol Using Key-Insulated Signature Scheme for Secure VANET. In: Granelli, F., Skianis, C., Chatzimisios, P., Xiao, Y., Redana, S. (eds) Mobile Lightweight Wireless Systems. Mobilight 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 13. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03819-8_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-03819-8_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-03818-1

  • Online ISBN: 978-3-642-03819-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics