Anonymous Authentication and Key-Agreement Schemes in Vehicular Ad-Hoc Networks

نویسندگان

  • Cheng-Yeh Chen
  • Te-Cheng Hsu
  • Hsin-Te Wu
  • John Y. Chiang
  • Wen-Shyong Hsieh
چکیده

Vehicular ad hoc networks (VANETs) have been the focus of considerable recent research, allowing vehicles to broadcast messages to other vehicles and inform drivers regarding immediate route changes that can improve driving efficiency or avoid accidents. Because vehicles communicate using wireless channels, malicious attacks may occur during the transmission of messages. To ensure security, the accuracy of received messages must be confirmed and the authenticity of the sender must be verified. However, methods designed to ensure VANET security require improvements. For example, the cost of certificate management and the exposure of certificates are major concerns, and roadside unit (RSU) aided schemes cannot achieve real-time authentication. To solve these problems, anonymous-authentication and key-agreement schemes are proposed based on chameleon hashing and ID-based encryption (IBE), respectively. The proposed schemes feature the following properties. (1) Every vehicle can generate numerous chameleon-hash values to represent itself, and RSU can verify the ownership of these chameleon hash values. (2) Private communication between any two vehicles can be achieved by using IBE. (3) The true identities of vehicles are protected. Moreover, the proposed method fulfills numerous security requirements of the vehicular-communication environment.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Efficient Anonymous Authentication Protocol for Secure Vehicular Communications

As vehicular communications bring the promise of improved road safety and optimized road traffic through cooperative systems applications, it becomes a prerequisite to make vehicular communications secure for the successful deployment of vehicular ad hoc networks. In this paper, we propose an efficient authentication protocol with anonymous public key certificates for secure vehicular communica...

متن کامل

Secure Location-Aided Routing Protocols With Wi-Fi Direct For Vehicular Ad Hoc Networks

Secure routing protocols are proposed for the vehicular ad hoc networks. The protocols integrate the security authentication process with the Location-Aided Routing (LAR) protocol to support Wi-Fi Direct communications between the vehicles. The methods are robust against various security threats. The security authentication process adopts a modified DiffieHellman key agreement protocol. The Dif...

متن کامل

Identity Authentication and Key Agreement Schemes for Ad Hoc Networks

Identity authentication and key agreement schemes play significant role in ad hoc networks. In this paper, a new identity authentication scheme relies on the threshold group signature is introduced. Compared with the current schemes it is secure, efficient and adaptable to a multi-hop feature of ad hoc networks. In addition, a new key agreement scheme based on the threshold cryptography using t...

متن کامل

PUCA: A pseudonym scheme with strong privacy guarantees for vehicular ad-hoc networks

Pseudonym certificates are the state-of-the-art approach for secure and privacy-friendly message authentication in vehicular ad-hoc networks. However, most of the proposed pseudonym schemes focus on privacy among participants. Privacy towards backend providers is usually (if at all) only protected by separation of responsibilities. The protection can be overridden, when the entities collaborate...

متن کامل

An Efficient Anonymous Authentication Protocol in Vehicular Ad-hoc Networks

In this paper, we introduce an efficient anonymous authentication protocol in Vehicular Ad-hoc Networks (VANETs) [5] to resolve the issue on anonymous authentication for communication between roadside units and vehicles. Our proposed protocol cannot only guarantee privacy, anonymity, and other basic cryptographic requirements but also provide traceability of illegal users. Our proposed protocol...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014