A Novel Identity-Based Mutual Authentication Scheme for Vehicle Ad Hoc Networks

被引:2
|
作者
Di, Chaofan [1 ,2 ]
Wu, Wanqing [1 ,2 ]
机构
[1] Hebei Univ, Sch Cyber Secur & Comp, Baoding, Peoples R China
[2] Hebei Univ, Key Lab High Trusted Informat Syst Hebei Prov, Baoding, Peoples R China
关键词
PRIVACY-PRESERVING AUTHENTICATION; DUAL AUTHENTICATION; SECURE; COMPUTATION; PROTOCOL;
D O I
10.1155/2022/7881079
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The vehicle ad hoc network (VANET) is an emerging industry that deeply integrates a new generation of network communication technology with automotive and road transportation. As the basic nodes of VANETs, vehicles can communicate and share information with other peer vehicles. However, with the rapid development of the industry, the security risks of VANETs, especially the problem of privacy leakage, have become increasingly prominent. To solve this problem, we propose a novel identity-based mutual authentication scheme (IBMA) for vehicle ad hoc networks. In this scheme, we adopt identity-based cryptography (IBC) to generate keys, which reduces the storage burden of the central authority and eliminates the need to rely on the certificate to distribute the public key. Meanwhile, the key escrow issue can be solved, which is a common problem in IBC. Then, the scheme adjusts central authority to semihonest and realizes unconditional privacy protection. In addition, our scheme achieves complete anonymity, which can prevent any other entities such as peer vehicles and central authorities from tracking vehicles. Finally, our scheme provides efficient traceability while protecting vehicle privacy. Security analysis shows that the proposed scheme satisfies a variety of security requirements such as anonymity, reliability, and nonrepudiation. Performance analysis demonstrates that our proposed scheme is efficient and requires less communication and storage cost compared with related schemes.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Identity-based deniable authentication for ad hoc networks
    Fagen Li
    Pan Xiong
    Chunhua Jin
    [J]. Computing, 2014, 96 : 843 - 853
  • [2] Identity-based deniable authentication for ad hoc networks
    Li, Fagen
    Xiong, Pan
    Jin, Chunhua
    [J]. COMPUTING, 2014, 96 (09) : 843 - 853
  • [3] Identity-based message authentication scheme using proxy vehicles for vehicular ad hoc networks
    J. Jenefa
    E. A. Mary Anita
    [J]. Wireless Networks, 2021, 27 : 3093 - 3108
  • [4] Identity-based message authentication scheme using proxy vehicles for vehicular ad hoc networks
    Jenefa, J.
    Anita, E. A. Mary
    [J]. WIRELESS NETWORKS, 2021, 27 (05) : 3093 - 3108
  • [5] SIMULATION OF AN IDENTITY-BASED CRYPTOGRAPHY SCHEME FOR AD HOC NETWORKS
    Mihai-Lica, Pura
    Victor-Valeriu, Patriciu
    Ion, Bica
    [J]. SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 135 - 139
  • [6] Practical Identity-Based Authentication Protocol for Ad-hoc Networks
    Feng, Boang
    Liu, Jianwei
    [J]. PROCEEDINGS OF 2016 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2016), 2016, : 365 - 368
  • [7] An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks
    He, Debiao
    Zeadally, Sherali
    Xu, Baowen
    Huang, Xinyi
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (12) : 2681 - 2691
  • [8] Towards Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks
    Al-Shareeda, Mahmood A.
    Anbar, Mohammed
    Manickam, Selvakumar
    Hasbullah, Iznan Husainy
    [J]. IEEE ACCESS, 2021, 9 : 113226 - 113238
  • [9] An Identity-based and Threshold Key Management Scheme for Ad hoc Networks
    Sun, Hua
    Zheng, Xuefeng
    Deng, Zhongjun
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 520 - 523
  • [10] Threshold and identity-based key management and authentication for wireless ad hoc networks
    Deng, HM
    Mukherjee, A
    Agrawal, DP
    [J]. ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, 2004, : 107 - 111