An Efficient RSU Authentication Scheme based on Merkle Hash Tree for VANETs

被引:4
|
作者
Moni, Shafika Showkat [1 ]
Manivannan, D. [1 ]
机构
[1] Univ Kentucky, Dept Comp Sci, Lexington, KY 40506 USA
关键词
VANETs; Merkle Hash Tree (MHT); authentication in VANETs;
D O I
10.1109/icc40277.2020.9149028
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Due to the dynamic nature of Vehicular Ad Hoc Networks (VANETs), entities in VANETs are needed to be authenticated prior to any communication between them takes place. In this paper, we present an efficient scheme for vehicles to authenticate Road Side Units (RSUs). We exploit Merkle Hash Tree (MHT) to reduce computation and communication overheads for authenticating RSUs. A detailed security analysis is carried out to demonstrate its effectiveness against message modification attack, replay attack, and message injection attack. Finally, our analysis shows that the proposed authentication scheme performs better than the ECDSA+ECDH aggregation scheme with respect to computation and communication overheads.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] NERA: A new and efficient RSU based authentication scheme for VANETs
    Majid Bayat
    Morteza Pournaghi
    Majid Rahimi
    Mostafa Barmshoory
    [J]. Wireless Networks, 2020, 26 : 3083 - 3098
  • [2] NERA: A new and efficient RSU based authentication scheme for VANETs
    Bayat, Majid
    Pournaghi, Morteza
    Rahimi, Majid
    Barmshoory, Mostafa
    [J]. WIRELESS NETWORKS, 2020, 26 (05) : 3083 - 3098
  • [3] RSU Based Efficient Vehicle Authentication Mechanism for VANETs
    Ashritha, M.
    Sridhar, C. S.
    [J]. PROCEEDINGS OF 2015 IEEE 9TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO), 2015,
  • [4] An Efficient Two-Factor Authentication Scheme Based on the Merkle Tree
    Yin, Xinming
    He, Junhui
    Guo, Yi
    Han, Dezhi
    Li, Kuan-Ching
    Castiglione, Arcangelo
    [J]. SENSORS, 2020, 20 (20) : 1 - 19
  • [5] An Efficient Merkle-Tree-Based Authentication Scheme for Smart Grid
    Li, Hongwei
    Lu, Rongxing
    Zhou, Liang
    Yang, Bo
    Shen, Xuemin
    [J]. IEEE SYSTEMS JOURNAL, 2014, 8 (02): : 655 - 663
  • [6] A Design of Efficient Multi-Authentication Scheme Using a Merkle Hash Tree in the Smart Home Environments
    Kim, Mansik
    Choi, Won-Kyu
    Jun, Moon-Seog
    [J]. ADVANCED SCIENCE LETTERS, 2016, 22 (09) : 2538 - 2542
  • [7] Homomorphic Authentication Based on Rank-Based Merkle Hash Tree
    Bai, Ping
    Zhang, Wei
    Wang, Xu An
    Liu, Yudong
    Yang, HaiBin
    Shan, Chun
    [J]. ADVANCES IN INTERNET, DATA & WEB TECHNOLOGIES, 2018, 17 : 841 - 848
  • [8] Cloud Data Encryption and Authentication Based on Enhanced Merkle Hash Tree Method
    Jayaprakash, J. Stanly
    Balasubramanian, Kishore
    Sulaiman, Rossilawati
    Hasan, Mohammad Kamrul
    Parameshachari, B. D.
    Iwendi, Celestine
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (01): : 519 - 534
  • [9] An efficient Minkowski distance-based matching with Merkle hash tree authentication for biometric recognition in cloud computing
    R. Ramya
    T. Sasikala
    [J]. Soft Computing, 2019, 23 : 13423 - 13431
  • [10] An efficient Minkowski distance-based matching with Merkle hash tree authentication for biometric recognition in cloud computing
    Ramya, R.
    Sasikala, T.
    [J]. SOFT COMPUTING, 2019, 23 (24) : 13423 - 13431