An Anonymous and Efficient Certificate-Based Identity Authentication Protocol for VANET

被引:5
|
作者
Qiao, Zirui [1 ,2 ]
Ma, Kui [2 ]
Zhou, Yanwei [2 ,3 ]
Yang, Qiliang [4 ]
Xia, Zhe [5 ]
Yang, Bo [2 ]
Zhang, Mingwu [6 ]
机构
[1] Xian Univ Posts & Telecommun, Sch Cyberspace Secur, Xian 710121, Peoples R China
[2] Shaanxi Normal Univ, Sch Comp Sci, Xian 710119, Peoples R China
[3] State Key Lab Cryptol, Beijing 100878, Peoples R China
[4] Shanghai Dev Ctr Comp Software Technol, Shanghai 201203, Peoples R China
[5] Wuhan Univ Technol, Sch Comp Sci & Technol, Wuhan 430062, Peoples R China
[6] Hubei Univ Technol, Sch Comp, Wuhan 430070, Peoples R China
基金
中国国家自然科学基金;
关键词
Protocols; Authentication; Security; Vehicular ad hoc networks; Cryptography; Proposals; Vehicle dynamics; Anonymity; certificate-based aggregate signature (CBAS); certificate-based cryptography; identity authentication; SECURITY; SCHEME; SIGNATURES;
D O I
10.1109/JIOT.2023.3330580
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, the development of Internet of Things technology has led to a surge in interest in the vehicular ad hoc network (VANET), which has greatly improved travel efficiency and facilitated vehicle data sharing. To ensure the privacy and security of both vehicles and personnel, researchers have proposed various measures for securing VANET systems. Recently, certificate-based aggregate signature (CBAS) schemes have been proposed to design an identity authentication protocol for the VANET to prevent tampering and corruption of private vehicle data. In this study, we conduct a security analysis of the previous CBAS scheme by presenting a security attack. Afterward, we propose a novel and concrete construction of the CBAS scheme that offers improved performance for VANET, which can enhance protection in the VANET scenario. We also demonstrate its security based on standard cryptographic assumptions. Comparative results from theoretical analysis and experimental evaluation illustrate the practicality of our proposed scheme. Similarly, the identity authentication protocol created based on the above CBAS scheme has the properties of dynamic anonymity, mutual identity authentication, unforgeability.
引用
收藏
页码:11232 / 11245
页数:14
相关论文
共 50 条
  • [21] Towards Certificate-Based Authentication for Future Mobile Communications
    Kpatcha Bayarou
    Matthias Enzmann
    Elli Giessler
    Michael Haisch
    Brian Hunter
    Mohammad Ilyas
    Sebastian Rohr
    Markus Schneider
    Wireless Personal Communications, 2004, 29 : 283 - 301
  • [22] Anonymous chaotic-based identity authentication protocol in IoT
    Long, Jing
    Su, Xin
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2021, 14 (02) : 194 - 200
  • [23] Network Mobility Route Optimization with Certificate-based Authentication
    Bauer, Christian
    2009 FIRST INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS, 2009, : 189 - 194
  • [24] Towards certificate-based authentication for future mobile communications
    Bayarou, K
    Enzmann, M
    Giessler, E
    Haisch, M
    Hunter, B
    Ilyas, M
    Rohr, S
    Schneider, M
    WIRELESS PERSONAL COMMUNICATIONS, 2004, 29 (3-4) : 283 - 301
  • [25] Identity-Based Edge Computing Anonymous Authentication Protocol
    Kang, Naixin
    Ning, Zhenhu
    Zhang, Shiqiang
    Rehman, Sadaqat Ur
    Waqas
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 74 (02): : 3931 - 3943
  • [26] Efficient Anonymous Authentication Protocol Using Key-Insulated Signature Scheme for Secure VANET
    Park, Youngho
    Sur, Chul
    Jung, Chae Duk
    Rhee, Kyung-Hyune
    MOBILE LIGHTWEIGHT WIRELESS SYSTEMS, 2009, 13 : 35 - 44
  • [27] Certificate-based authentication using hardware cryptographic devices
    Dolezel R.
    Pedersen J.M.
    Advances in Intelligent and Soft Computing, 2011, 102 : 519 - 531
  • [28] Anonymous certificate-based broadcast encryption with constant decryption cost
    Li, Jiguo
    Chen, Liqing
    Lu, Yang
    Zhang, Yichen
    INFORMATION SCIENCES, 2018, 454 : 110 - 127
  • [29] A Lightweight Certificate-based Source Authentication Protocol for Group Communication in Hybrid Wireless/Satellite Networks
    Roy-Chowdhury, Ayan
    Baras, John S.
    GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [30] An Efficient Certificate-Based Authenticated Key Agreement Protocol Without Bilinear Pairing
    Lu, Yang
    Zhang, Quanling
    Li, Jiguo
    Shen, Jian
    INFORMATION TECHNOLOGY AND CONTROL, 2017, 46 (03): : 345 - 359