An Efficient RSU Authentication Scheme based on Merkle Hash Tree for VANETs

被引:4
|
作者
Moni, Shafika Showkat [1 ]
Manivannan, D. [1 ]
机构
[1] Univ Kentucky, Dept Comp Sci, Lexington, KY 40506 USA
关键词
VANETs; Merkle Hash Tree (MHT); authentication in VANETs;
D O I
10.1109/icc40277.2020.9149028
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Due to the dynamic nature of Vehicular Ad Hoc Networks (VANETs), entities in VANETs are needed to be authenticated prior to any communication between them takes place. In this paper, we present an efficient scheme for vehicles to authenticate Road Side Units (RSUs). We exploit Merkle Hash Tree (MHT) to reduce computation and communication overheads for authenticating RSUs. A detailed security analysis is carried out to demonstrate its effectiveness against message modification attack, replay attack, and message injection attack. Finally, our analysis shows that the proposed authentication scheme performs better than the ECDSA+ECDH aggregation scheme with respect to computation and communication overheads.
引用
收藏
页数:7
相关论文
共 50 条
  • [31] An Improved RSU-based Authentication Scheme for VANET
    Cheng, Hongyuan
    Liu, Yining
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (04): : 1137 - 1150
  • [32] An Efficient Identity-Based Privacy-Preserving Authentication Scheme for VANETs
    Cui, Jie
    Xu, Wenyu
    Sha, Kewei
    Zhong, Hong
    [J]. COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, COLLABORATECOM 2017, 2018, 252 : 508 - 518
  • [33] An Efficient and Secure Anonymous Authentication Scheme for VANETs Based on the Framework of Group Signatures
    Yue, Xiaohan
    Chen, Bing
    Wang, Xibo
    Duan, Yong
    Gao, Mingchao
    He, Yuan
    [J]. IEEE ACCESS, 2018, 6 : 62584 - 62600
  • [34] Dynamic Provable Data Possession Based on Ranked Merkle Hash Tree
    Zou, Jing
    Sun, Yunchuan
    Li, Shixian
    [J]. 2016 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI), 2016, : 4 - 9
  • [35] The Cloud Access Control Based on Dynamic Feedback and Merkle Hash Tree
    Yi, Xiushuang
    Wang, Weiqiang
    [J]. 2012 FIFTH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID 2012), VOL 1, 2012, : 217 - 221
  • [36] Verifiable multi-keyword search scheme based on improved Merkle-Tree authentication method
    Tian Y.
    Luo Q.
    [J]. Tongxin Xuebao/Journal on Communications, 2020, 41 (09): : 118 - 129
  • [37] An Efficient V2I Authentication Scheme for VANETs
    Zhou, Yousheng
    Liu, Siling
    Xiao, Min
    Deng, Shaojiang
    Wang, Xiaojun
    [J]. MOBILE INFORMATION SYSTEMS, 2018, 2018
  • [38] An Efficient Anonymous Authentication Scheme Using Registration List in VANETs
    Aghabagherloo, Alireza
    Mohajeri, Javad
    Salmasizadeh, Mahmoud
    Feghhi, Mahmood Mohassel
    [J]. 2020 28TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE), 2020, : 355 - 359
  • [39] BASRAC: An efficient batch authentication scheme with rule-based access control for VANETs
    Chen, Shuyi
    Liu, Yali
    Ning, Jianting
    Zhu, Xiuping
    [J]. VEHICULAR COMMUNICATIONS, 2023, 40
  • [40] An Efficient Authentication Scheme Based on the Self-Updating Hash Chain for Campus Network
    Zhang, Haojun
    Li, Xiaoxue
    Liu, Yukun
    [J]. 2008 IEEE INTERNATIONAL SYMPOSIUM ON IT IN MEDICINE AND EDUCATION, VOLS 1 AND 2, PROCEEDINGS, 2008, : 268 - +