Anonymous Authentication and Key Agreement Scheme Combining the Group Key for Vehicular Ad Hoc Networks

被引:9
|
作者
Sun, Mei [1 ,2 ]
Guo, Yuyan [2 ]
Zhang, Dongbing [2 ]
Jiang, MingMing [2 ]
机构
[1] China Univ Min & Technol, Sch Informat & Control Engn, Xuzhou 221116, Jiangsu, Peoples R China
[2] Huaibei Normal Univ, Sch Comp Sci & Technol, Huaibei 235000, Peoples R China
基金
中国国家自然科学基金;
关键词
PRIVACY-PRESERVING AUTHENTICATION; VALUE-ADDED SERVICES; PROTOCOL; SECURE; MANAGEMENT;
D O I
10.1155/2021/5526412
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Vehicular ad hoc network (VANET) is a multihop mobile wireless communication network that can realize many vehicle-related applications through multitop communication. In the open wireless communication environment, security and privacy protection are important contents of VANET research. The most basic method of VANET privacy protection is anonymous authentication. Even through, there are many existing schemes to provide anonymous authentication for VANETs. Many existing schemes suffer from high computational cost by using bilinear pairing operation or need the assistance of the trust authorities (TAs) during the authentication process or rely on an ideal tamper-proof device (TPD), which requires very strong security assumption. In this study, an anonymous authentication and key negotiation scheme by using private key and group key is proposed, which is based on pseudonym using the nonsingular elliptic curve. In this scheme, there is no third party trust center to participate in the authentication, there is no need to query the database, and there is no need of the local database to save the identity information of many vehicles, which reduce the storage space and the authentication time compared with other schemes. The proposed scheme only needs realistic TPDs. In the proposed scheme, TPDs do not need to preinstall the system key as many other schemes do; hence, the failure of a single TPD does not affect the security of the entire system. The security of the scheme is proved under the random oracle model. Compared with the related schemes using bilinear pairings, the computational cost and communication cost of the proposed scheme are reduced by 82% and 50%, respectively.
引用
收藏
页数:13
相关论文
共 50 条
  • [31] An Efficient Group Key Agreement Protocol for Ad Hoc Networks
    Zhang Li-Ping
    Cui Guo-Hua
    Yu Zhi-Gang
    PROCEEDINGS OF THE 2008 7TH IEEE INTERNATIONAL CONFERENCE ON CYBERNETIC INTELLIGENT SYSTEMS, 2008, : 180 - +
  • [32] Dynamic asymmetric group key agreement for ad hoc networks
    Zhao, Xingwen
    Zhang, Fangguo
    Tian, Haibo
    AD HOC NETWORKS, 2011, 9 (05) : 928 - 939
  • [33] Fast group key agreement protocols in Ad Hoc networks
    School of Economics and Management, Xidian Univ., Xi'an 710071, China
    不详
    不详
    不详
    Xi'an Dianzi Keji Daxue Xuebao, 2007, 4 (659-663):
  • [34] An Efficient Group Key Agreement Protocol for Ad Hoc Networks
    Zhang Li-Ping
    Zhang Li-Ping
    Cui Guo-Hua
    Yu Zhi-Gang
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 2509 - +
  • [35] A Novel Group Key Agreement Protocol for Ad Hoc Networks
    Zhang Li-Ping
    Wang Yi
    Li Gui-Ling
    2009 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP 2009), 2009, : 509 - +
  • [36] Efficient Group Key Agreement & Recovery in Ad hoc Networks
    Komninos, Nikos
    Mantas, Georgios
    ICWMMN 08, PROCEEDINGS, 2008, : 25 - 28
  • [37] Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks
    Wu, Tsu-Yang
    Lee, Zhiyuan
    Yang, Lei
    Luo, Jia-Ning
    Tso, Raylin
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (07): : 6992 - 7020
  • [38] Session key agreement scheme for Ad Hoc network based on identity authentication
    Shi, Rong-Hua
    Fan, Xiang-Yu
    Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and Technology), 2010, 41 (06): : 2236 - 2239
  • [39] A novel identity authentication and key agreement scheme for ad hoc network security
    Pi, Jian-yong
    Liu, Xin-song
    Wu, Ai
    Fu, Qing-yun
    IMECS 2006: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, 2006, : 436 - +
  • [40] An Anonymous Mutual Authentication and Key Agreement Scheme in WBAN
    Meng, Xiangwei
    Xu, Jianbo
    Liang, Wei
    Li, Kuan-Ching
    2019 IEEE 5TH INTL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / IEEE INTL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC) / IEEE INTL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2019, : 31 - 36