Message Authentication Scheme for Vehicular Ad-Hoc Wireless Networks without RSU

نویسندگان

  • Yu-Hsiu Huang
  • Kai-Hsun Fan
  • Wen-Shyong Hsieh
چکیده

Studies were conducted on vehicular ad-hoc network (VANET) in recent years. VANET is a network that combines on-board wireless equipment (On-Board Unit, OBU) and roadside fixed wireless equipment (Road Side Unit, RSU) through wireless communication technology. When vehicles broadcast messages, the traditional systems usually use RSU to do message authentication that we can ensure messages are integrity (message authentication) and broadcasted by legitimate vehicles (identity verification). But the cover range of RSU is limit and the cost is expensive, so these systems cannot work without RSU. In this paper, we propose the mechanism based on chameleon hashing and HMAC to do identity verification and message authentication under the environment without RSU. In the proposed scheme, two secret values are retained by TA, and TA will use these secret values to create and pre-load a public identity and a secret value to every registered vehicle. Based on the public identity and the secret value, a vehicle can broadcast message and make secure communication with other vehicles. The other vehicles can also make the message authentication and identity verification based on the techniques of chameleon hash, HMAC and Diffie-Hellman key exchange. The security and performance analysis show that the proposed scheme is secure and its performance is more superior than the related works.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Using a Random Secret Pre-Distribution Scheme to Implement Message Authentication in VANETs

In recent years, the development of the Intelligent Transportation System (ITS) has increased the popularity of vehicular ad hoc networks (VANET). A VANET is designed to enable vehicles to exchange information about traffic or vehicle conditions to help other vehicles avoid traffic accidents or traffic jams. To resist malicious attacks, all vehicles must be anonymous and their routings must be ...

متن کامل

An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks

In the vehicular ad hoc networks (VANET), various authentication schemes have been proposed for secure communications. However, the previous schemes are inefficient because each vehicle needs to share and keep a large number of session keys for communicating with the other vehicles on the VANET. To overcome the above drawback, we propose a new authenticated communication scheme for the VANET. I...

متن کامل

Infrastructure based Authentication in VANETs

In a vehicular ad-hoc networks (VANETs), the veracity of a message requires authentication of the source vehicle. In this work, a technique for mutual authentication of a vehicle and road side unit (RSU) that preserves the privacy of the vehicle is proposed. The technique relies on the traffic authorities and assumes a hierarchical structure comprising a central trusted authority (TA) with stat...

متن کامل

An identity-based authentication scheme for safety messages in WAVE-enabled VANETs

In a Vehicular Ad hoc Network (VANET), a road-side infrastructure, or RSU is anticipated to be installed at some road-side location. This exposes the VANET to several different adversaries. In this paper, we present an authentication scheme for infrastructure generated safety messages using an identity-based proxy signature and verification mechanism. An identity-based technique offers a certif...

متن کامل

Anonymous Authentication and Key-Agreement Schemes in Vehicular Ad-Hoc Networks

Vehicular ad hoc networks (VANETs) have been the focus of considerable recent research, allowing vehicles to broadcast messages to other vehicles and inform drivers regarding immediate route changes that can improve driving efficiency or avoid accidents. Because vehicles communicate using wireless channels, malicious attacks may occur during the transmission of messages. To ensure security, the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014