EPAF: An Efficient Pseudonymous-Based Inter-vehicle Authentication Framework for VANET

  • Fei Wang
  • Yifan Du
  • Yongjun Xu
  • Tan Cheng
  • Xiaoli Pan
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 747)


Road users are now able to retrieve safety information, computing task results and subscribing content through various vehicular ad hoc network (VANET) services. Most commonly used services are safety beacon, cloud computation, and content subscription. Road users concern more about data security than ever. Privacy preserving authentication (PPA) is one main mechanism to secure inter-vehicle messages. However, for historical reasons, PPA for three services are different and therefore hard to be unified and not lightweight enough. To improve the flexibility and efficiency of PPA for various VANET services, it is necessary to securely authenticate messages preserving privacy for individual service, but also to unify PPA processes of various services in one vehicle. Here we propose an Efficient Pseudonymous-based Inter-Vehicle Authentication Framework for various VANET services. Our novel framework employs three methods. Method No. 1 consists of a decentralized certificate authority (CA), which allows vehicles to communicate only if vehicles registering themselves. Method No. 2 adopts a three-stage mutual authenticating process, which adapts to different communicating models in various services. Method No. 3 we design a universal basic module that requires only lightweight hashing and MAC operations to accomplish the signing and verifying processes. To analyze the security performance of our EPAF, we use automated tool under symbolic approach. Our results strongly suggest that EPAF is secure, robust and adaptable in vehicular safety, as well as in content and cloud computation services. To analyze the performance of EPAF, we calculate benchmarks and simulate the network. Our results strongly suggest that EPAF reduces computation cost by 370–3500 times, decreases communication overhead by 45.98%–75.53% and CA need not to manage CRL compared with classical schemes. In conclusion our framework provides insights into how data privacy can be simultaneously protected using our EPAF, while also improving communication and computing speed even in high traffic density.


VANET Privacy preserving Authentication framework Cloud computation 


  1. 1.
    Su, Z., Hui, Y., Yang, Q.: The next generation vehicular networks: a content-centric framework. IEEE Wirel. Commun. 24(1), 60–66 (2007)CrossRefGoogle Scholar
  2. 2.
    Harding, J., Powell, G., Yoon, R., Fikentscher, J., Doyle, C., Sade, D., Lukuc, M., Simons, J., Wang, J.: Vehicle-to-vehicle communications: readiness of V2V technology for application. NHTSA, Washington, DC, Technical report, DOT-HS-812-014 (2014) Google Scholar
  3. 3.
    Chim, T.W., Yiu, S.M., Hui, L.C., Li, V.O.: VSPN: VANET-based secure and privacy-preserving navigation. IEEE Trans. Comput. 63(2), 510–512 (2014)MathSciNetCrossRefGoogle Scholar
  4. 4.
    Wang, M., Liu, D., Zhu, L., Xu, Y., Wang, F.: LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication. Computing 98, 1–24 (2014)MathSciNetzbMATHGoogle Scholar
  5. 5.
    Raya, M., Hubaux, J.-P.: Securing vehicular Ad hoc networks. J. Comput. Secur. 15(1), 39–68 (2007)CrossRefGoogle Scholar
  6. 6.
    Huang, C., Lu, R., Zhu, H., Hu, H., Lin, X.: PTVC: achieving privacy-preserving trust-based verifiable vehicular cloud computing. In: 2016 IEEE Global Communications Conference (GLOBECOM), Washington, DC, pp. 1–6 (2016)Google Scholar
  7. 7.
    Lu, R., Lin, X., Zhu, H., Ho, P.-H., Shen, X.: ECPP: efficient conditional privacy preservation protocol for secure vehicular communications. In: Proceedings of the INFOCOM 2008, pp. 1903–1911 (2008)Google Scholar
  8. 8.
    Lin, X., Sun, X., Ho, P.-H., Shen, X.: GSIS: a secure and privacy-preserving protocol for vehicular communications. IEEE Trans. Veh. Technol. 56(6), 3442–3456 (2007)CrossRefGoogle Scholar
  9. 9.
    Zhang, L., Wu, Q., Solanas, A., Josep, D.-F.: A scalable robust authentication protocol for secure vehicular communications. IEEE Trans. Veh. Technol. 59(4), 1606–1617 (2010)CrossRefGoogle Scholar
  10. 10.
    Studer, A., Bai, F., Bellur, B., Perrig, A.: Flexible, extensible, and efficient VANET authentication. J. Commun. Netw. 11, 589–598 (2009)CrossRefGoogle Scholar
  11. 11.
    Bellare, M., Canetti, R., Krawczyk, H.: Message authentication using hash functions: the HMAC construction. RSA Laboratories’ CryptoBytes 2(1), 12–15 (1996)zbMATHGoogle Scholar
  12. 12.
    Scott, M.: Efficient Implementation of Cryptographic Pairings. slide.pdf
  13. 13.
    Keränen, A., Ott, J., Kärkkäinen, T.: The ONE simulator for DTN protocol evaluation. In: Proceedings of the 2nd International Conference on Simulation Tools and Techniques (2009)Google Scholar
  14. 14.
    Wang, F., Xu, Y., Zhang, H., Zhang, Y., Zhu, L.: 2FLIP: a two-factor lightweight privacy-preserving authentication scheme for VANET. IEEE Trans. Veh. Technol. 65(2), 896–911 (2016)CrossRefGoogle Scholar
  15. 15.
    Horng, S.J., Tzeng, S.F., Li, T., Wang, X., Huang, P.H., Khan, M.K.: Enhancing security and privacy for identity-based batch verification scheme in VANET. IEEE Trans. Veh. Technol. 66(4), 3235–3248 (2017)CrossRefGoogle Scholar
  16. 16.
    Canetti, R., Herzog, J.: Universally composable symbolic analysis of mutual authentication and key-exchange protocols. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 380–403. Springer, Heidelberg (2006). Scholar
  17. 17.
    Zhang, Z., Zhu, L., Liao, L., Wang, M.: Computationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairings. Inf. Sci. 276(20), 93–112 (2012)MathSciNetCrossRefzbMATHGoogle Scholar
  18. 18.
    Du, X., Chen, H.H.: Security in wireless sensor networks. IEEE Wirel. Commun. Mag. 15(4), 60–66 (2008)CrossRefGoogle Scholar
  19. 19.
    Du, X., Guizani, M., Xiao, Y., Chen, H.H.: Secure and efficient time synchronization in heterogeneous sensor networks. IEEE Trans. Vehi. Technol. 57(4), 2387–2394 (2008)CrossRefGoogle Scholar
  20. 20.
    Du, X., Xiao, Y., Guizani, M., Chen, H.H.: An effective key management scheme for heterogeneous sensor networks. Ad Hoc Netw. 5(1), 24–34 (2007)CrossRefGoogle Scholar
  21. 21.
    Xiao, Y., Rayi, V., Sun, B., Du, X., Hu, F., Galloway, M.: A survey of key management schemes in wireless sensor networks. J. Comput. Commun. 30(11–12), 2314–2341 (2007)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Institute of Computing Technology, Chinese Academy of SciencesBeijingChina
  2. 2.University of Chinese Academy of SciencesBeijingChina
  3. 3.93868 TroopsPeople’s Liberation ArmyBeijingChina

Personalised recommendations