Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks

被引:132
|
作者
Liu, Yiliang [1 ,2 ]
Wang, Liangmin [1 ]
Chen, Hsiao-Hwa [2 ]
机构
[1] Jiangsu Univ, Dept Internet Things Engn, Zhenjiang 212013, Peoples R China
[2] Natl Cheng Kung Univ, Dept Engn Sci, Tainan 70101, Taiwan
基金
中国国家自然科学基金;
关键词
Key negotiation; privacy preservation; proxy-based authentication; proxy vehicle; vehicular ad hoc network (VANET); PRIVACY-PRESERVING AUTHENTICATION; PSEUDONYMOUS AUTHENTICATION; BATCH VERIFICATION; SCHEME; SECURE; PROTOCOL; PRESERVATION;
D O I
10.1109/TVT.2014.2358633
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Normally, authentication in vehicular ad hoc networks (VANETs) uses public key infrastructure to verify the integrity of messages and the identity of message senders. The issues considered in the authentication schemes include the level of security and computational efficiency in the verification processes. Most existing schemes mainly focus on assuring the security and privacy of VANET information. However, these schemes may not work well in VANET scenarios. For instance, it is difficult for a roadside unit (RSU) to verify each vehicle's signature sequentially when a large number of vehicles emerge in the coverage areas of an RSU. To reduce the computational overhead of RSUs, we propose a proxy-based authentication scheme (PBAS) using distributed computing. In the PBAS, proxy vehicles are used to authenticate multiple messages with a verification function at the same time. In addition, the RSU is able to independently verify the outputs from the verification function of the proxy vehicles. We also design an expedite key negotiation scheme for transmitting sensitive messages. It is shown from the analysis and simulations that an RSU can verify 26 500 signatures per second simultaneously with the help of the proxy vehicles. The time needed to verify 3000 signatures in the PBAS can be reduced by 88% compared with existing batch-based authentication schemes.
引用
收藏
页码:3697 / 3710
页数:14
相关论文
共 50 条
  • [1] Identity-based message authentication scheme using proxy vehicles for vehicular ad hoc networks
    Jenefa, J.
    Anita, E. A. Mary
    [J]. WIRELESS NETWORKS, 2021, 27 (05) : 3093 - 3108
  • [2] Identity-based message authentication scheme using proxy vehicles for vehicular ad hoc networks
    J. Jenefa
    E. A. Mary Anita
    [J]. Wireless Networks, 2021, 27 : 3093 - 3108
  • [3] Message Authentication in Vehicular Ad hoc Networks: ECDSA Based Approach
    Manvi, S. S.
    Kakkasageri, M. S.
    Adiga, D. G.
    [J]. INTERNATIONAL CONFERENCE ON FUTURE COMPUTER AND COMMUNICATIONS, PROCEEDINGS, 2009, : 16 - +
  • [4] Achieving Efficient Cooperative Message Authentication in Vehicular Ad Hoc Networks
    Lin, Xiaodong
    Li, Xu
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2013, 62 (07) : 3339 - 3348
  • [5] Message Authentication and Network Anomalies Detection in Vehicular Ad Hoc Networks
    Legashev, Leonid
    Bolodurina, Irina
    Zabrodina, Lubov
    Ushakov, Yuri
    Shukhman, Alexander
    Parfenov, Denis
    Zhou, Yong
    Xu, Yan
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [6] EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
    Wasef, Albert
    Shen, Xuemin
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2013, 12 (01) : 78 - 89
  • [7] MAAC: Message Authentication Acceleration Protocol for Vehicular Ad Hoc Networks
    Wasef, Albert
    Shen, Xuemin
    [J]. GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 4476 - 4481
  • [8] A Message-Oriented Message Dissemination and Authentication Scheme for Vehicular Ad Hoc Networks
    Li, Xincheng
    Liu, Yali
    Yin, Xinchun
    [J]. 2019 IEEE INTL CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, BIG DATA & CLOUD COMPUTING, SUSTAINABLE COMPUTING & COMMUNICATIONS, SOCIAL COMPUTING & NETWORKING (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2019), 2019, : 223 - 228
  • [9] Privacy protection for vehicular ad hoc networks by using an efficient revocable message authentication scheme
    Fan, Chun-I
    Hsu, Ruei-Hau
    Chen, Wei-Kuei
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (05) : 462 - 478
  • [10] RSU-based message authentication for vehicular ad-hoc networks
    Hsin-Te Wu
    Wen-Shyong Hsieh
    [J]. Multimedia Tools and Applications, 2013, 66 : 215 - 227