Skip to main content
Log in

A Chebyshev polynomial-based conditional privacy-preserving authentication and group-key agreement scheme for VANET

  • Original Paper
  • Published:
Nonlinear Dynamics Aims and scope Submit manuscript

Abstract

Vehicle ad hoc network (VANET) is an open communication environment. Any user can broadcast messages, which means that it can be easily attacked by malicious users. Therefore, the authentication of vehicles is needed. In this paper, we propose a Chebyshev polynomial-based conditional privacy-preserving authentication and group-key agreement scheme for VANET. Specifically, we solve three problems in VANET: (1) we improve the effectiveness of TA by using Chebyshev polynomial to authenticate vehicles; (2) we reduce the computational burden of TA by using Chinese remainder theorem to manage group members; (3) we provide conditional privacy for users by using traceable pseudonym scheme. Theoretical and experimental results show that the proposed scheme is more efficient than most existing schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Data Availability

All data generated or analyzed during this study are included in this published article.

References

  1. Shen, X., Cheng, X., Yang, L., Zhang, R., Jiao, B.: Data dissemination in vanets: a scheduling approach. IEEE Trans. Intell. Transp. Syst. 15(5), 2213–2223 (2014)

    Article  Google Scholar 

  2. Commission, F.C., et al.: Amendment of the commission’s rules regarding dedicated short-range communication service in the 5.850-5.925 ghz band. FCC, Washington, DC, USA, Tech. Rep. FCC pp. 02–302 (2002)

  3. Jiang, D., Delgrossi, L.: Ieee 802.11 p: Towards an international standard for wireless access in vehicular environments. In: VTC Spring 2008-IEEE Vehicular Technology Conference, pp. 2036–2040. IEEE (2008)

  4. Liu, Y., Wang, L., Chen, H.H.: Message authentication using proxy vehicles in vehicular ad hoc networks. IEEE Trans. Vehicul Technol. 64(8), 3697–3710 (2014)

    Article  Google Scholar 

  5. Ye, G., Jiao, K., Huang, X.: Quantum logistic image encryption algorithm based on sha-3 and rsa. Nonlinear Dyn. (2021). https://doi.org/10.1007/s11071-021-06422-2

    Article  Google Scholar 

  6. Ye, G., Jiao, K., Wu, H., Pan, C., Huang, X.: An asymmetric image encryption algorithm based on a fractional-order chaotic system and the rsa public-key cryptosystem. Int. J. Bifurc. Chaos 30, 2050233 (2020). https://doi.org/10.1142/S0218127420502338

    Article  MathSciNet  MATH  Google Scholar 

  7. Raya, M., Hubaux, J.P.: Securing vehicular ad hoc networks. J. Comput. Secur. 15(1), 39–68 (2007)

    Article  Google Scholar 

  8. Zhang, C., Lu, R., Lin, X., Ho, P.H., Shen, X.: An efficient identity-based batch verification scheme for vehicular sensor networks. In: IEEE INFOCOM 2008-The 27th Conference on Computer Communications, pp. 246–250. IEEE (2008)

  9. He, D., Zeadally, S., Xu, B., Huang, X.: An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans. Inf. Forensics Secur. 10(12), 2681–2691 (2015)

    Article  Google Scholar 

  10. Lo, N.W., Tsai, J.L.: An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings. IEEE Trans. Intell. Transp. Syst. 17(5), 1319–1328 (2015)

    Article  Google Scholar 

  11. Azees, M., Vijayakumar, P., Deboarh, L.J.: Eaap: efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad hoc networks. IEEE Trans. Intell. Transp. Syst. 18(9), 2467–2476 (2017)

    Article  Google Scholar 

  12. Lai, H., Orgun, M.A., Xiao, J., Pieprzyk, J., Xue, L., Yang, Y.: Provably secure three-party key agreement protocol using chebyshev chaotic maps in the standard model. Nonlinear Dyn. 77(4), 1427–1439 (2014)

    Article  MathSciNet  Google Scholar 

  13. Lee, T.F.: Efficient three-party authenticated key agreements based on chebyshev chaotic map-based diffie-hellman assumption. Nonlinear Dyn. 81(4), 2071–2078 (2015)

    Article  MathSciNet  Google Scholar 

  14. Zheng, X., Huang, C.T., Matthews, M.: Chinese remainder theorem based group key management. In: Proceedings of the 45th annual southeast regional conference, pp. 266–271 (2007)

  15. Vijayakumar, P., Bose, S., Kannan, A.: Centralized key distribution protocol using the greatest common divisor method. Comput. Math. Appl. 65(9), 1360–1368 (2013)

    Article  MathSciNet  Google Scholar 

  16. Vijayakumar, P., Azees, M., Kannan, A., Deborah, L.J.: Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks. IEEE Trans. Intell. Transp. Syst. 17(4), 1015–1028 (2015)

    Article  Google Scholar 

  17. Li, X., Liu, Y., Yin, X.: An anonymous conditional privacy-preserving authentication scheme for vanets. In: 2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS), pp. 1763–1770. IEEE (2019)

  18. Zhang, L.: Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solitons Fractals 37(3), 669–674 (2008)

    Article  MathSciNet  Google Scholar 

  19. Wang, Y., Liao, X., Xiao, D., Wong, K.W.: One-way hash function construction based on 2d coupled map lattices. Inf. Sci. 178(5), 1391–1406 (2008)

    Article  Google Scholar 

  20. Vijayakumar, P., Azees, M., Chang, V., Deborah, J., Balusamy, B.: Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks. Cluster Comput. 20(3), 2439–2450 (2017)

    Article  Google Scholar 

  21. Vijayakumar, P., Chang, V., Deborah, L.J., Balusamy, B., Shynu, P.: Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks. Future Generat. Comput. Syst. 78, 943–955 (2018)

    Article  Google Scholar 

  22. Lima, J.B., Panario, D., de Souza, R.C.: Public-key encryption based on chebyshev polynomials over gf (q). Inf. Process. Lett. 111(2), 51–56 (2010)

    Article  MathSciNet  Google Scholar 

  23. Burrows, M., Abadi, M., Needham, R.M.: A logic of authentication. Proc. R. Soc. Lond. Math. Phys. Sci. 426(1871), 233–271 (1989)

    MathSciNet  MATH  Google Scholar 

Download references

Acknowledgements

The work was funded by the technological innovation and application projects of Chongqing (Grant No.cstc2019jscx-msxmX0077).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jiyun Yang.

Ethics declarations

Conflicts of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yang, J., Deng, J., Xiang, T. et al. A Chebyshev polynomial-based conditional privacy-preserving authentication and group-key agreement scheme for VANET. Nonlinear Dyn 106, 2655–2666 (2021). https://doi.org/10.1007/s11071-021-06898-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11071-021-06898-y

Keywords

Navigation