IMPROVEMENT ON A CONDITIONAL PRIVACY-PRESERVING AUTHENTICATION SCHEME FOR VANET

Lin Si, Baoyuan Kang, Mingming Xie

Abstract


Based on the roadside unit (RSUB) and tamper proof devices (TPDB) technology, Poursnaghi and Zahednejad proposed a conditional privacy-preserving authentication scheme for intelligent transportation. Through analysis, we found that their scheme can’t effectively achieve conditional tracking, and there are loopholes in the tracking identity phase, which makes the scheme vulnerable to internal attacks. At the same time, due to the lack of randomness of the signature of the message, the scheme is vulnerable to spoofing attacks. In order to overcome the shortcomings of the Poursnaghi et al. scheme, an improved scheme is presented. The improvement scheme improves the way of providing the identity information of the onboard unit (OBU) in the original scheme and the signature of the message, so that the trusted authority (TA) can obtain the identity information of the onboard unit (OBU) through calculation, thereby verifying Whether the two sides of the communication are credible, effectively avoiding internal attacks, and improving the randomness of the signature of the message, effectively avoiding the counterfeit attack and improving the security of the solution.

Keywords


VANET; Authentication Scheme; Conditional Privacy-preserving; Security

Full Text:

PDF

References


L B Wu ,Y Xie , et al. EIAS: new efficient identity-based authentication scheme with conditional privacy-preserving for VANETs[J]. Telecommunication System, 2017, 65(2):229-240.

C Gamage,B Gras, B Crispo, et al.An identity-based ring signature scheme with enhanced privacy[J].Secure communication Workshops, 2006, pp. 1–5.

R Lu, X Lin, H Zhu,et al.ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications[J]. In The 27th conference on computer communications,2008.

Hrong S J,Tzeng S F,Fan Y,et al. B-SPECS+: Batch verification for secure pseudonymous authentication in VANET[J]. IEEE Transactions on Information Forensics and Security,2013,p:1860-1875

M Bayat, M Barmshoory, M Rahimi, et al. A secure authentication scheme for VANETs with batch verification[J]. Wireless Netwrrk,2015,21 (5):1733–1743.

J Harding, G Powell, R Yoon, et al. Vehicle-to-Vehicle Communications: Readiness of V2V Technology for Application[J]. Technical Report, 2014.

S Al-Sultan, M M Al-Doori, A H Al-Bayatti, et al. A comprehensive survey on vehicular ad hoc network[J]. Network Computer,2014,(37) :380–392.

Y Liu, Y Wang, G Chang. Efficient privacy-preserving dual authentication and key agreement scheme for secure V2V communications in an IoV paradigm[J]. IEEE Transactions on Intelligent Transportation System, 2017,18(10):2740-2749.

J Li, H Lu, M Guizani. ACPN: a novel authentication framework with conditional privacy-preservation and non-repudiation for vanets[J]. IEEE Transactions on Parallel and Distributed Systems, 2015,26 (4): 938–948.

F Wang, Y Xu, H Zhang, et al.2Flip: a two-factor lightweight privacy-preserving authentication scheme for vanet[J]. IEEE Transactions on Vehicular Technology, 2016,65(2):896–911.

F Qu, Z Wu, F Y Wang, et al. A security and privacy review of VANETs[J]. IEEE Transactions on Intelligent Transportation Systems,2015,16 (6):2985–2996.

Lin I C, Hwang M S, Li L H, et al. A new remote user Authentication scheme for multi-server architecture[J].Future Generation Computer System,2003,19(1):13-22.

M Raya, J P Hubaux ,et al. Securing vehicular ad hoc networks[J].Computer Security,2007,15 (1) :39–68.

J Huang, L Yeh, L Y, et al. ABAKA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks[J]. IEEE Transactions on Vehicular Technology, 2011,60(1):248–262.

T W Chim, S M Yiu, L C Hui, et al. MLAS: multiple level authentication scheme for VANETs[J]. Ad Hoc Netwwork,2012,10 (7):1445–1456.

H Xiong, K Beznosov, Z Qin, M Ripeanu, Efficient and spontaneous privacy-preserving protocol for secure vehicular communication, in: Communications (ICC), IEEE International Conference on, 2010, pp. 1–6.

H Xiong, Z Chen, F Li, Efficient and multi-level privacy-preserving communication protocol for VANET, Compute Electronic. Eng. 38 (3), 2012, 573–581.

Y Wang, H Zhong, Y Xu, J Cui, ECPB: efficient conditional privacy-preserving authentication scheme supporting batch verification for vanets, IJ Network Security. 18 (2), 2016, 374–382.

J Shao, X Lin, R Lu, C Zuo, A threshold anonymous authentication protocol for VANETs, IEEE Trans. Vehicle Technology. 65 (3) , 2016, 1711–1720.

S M Pournaghi, B Zahednejad, NECPPA: A novel and efficient conditional privacy-preserving authentication scheme for VANET.2018.

J Li, H Lu, M Guizani, ACPN: a novel authentication framework with conditional privacy-preservation and non-repudiation for vanets, IEEE Trans. Parallel Distribute. Syst. 26 (4) , 2015, 938–948.

F Wang, Y Xu, H Zhang, Y Zhang, L Zhu, 2Flip: a two-factor lightweight privacy-preserving authentication scheme for vanet, IEEE Trans. Vehicle Technology. 65(2), 2016, 896–911.

F Qu, Z Wu, F Y Wang, W Cho, A security and privacy review of VANETs, IEEE Trans. Intell. Transp . System. 16 (6),2015, 2985–2996.

J Harding, G Powell, R Yoon, J Fikentscher, C Doyle, D Sade, M Lukuc, J. Si-mons, J Wang, Vehicle-to-Vehicle Communications: Readiness of V2V Technology for Application, Technical Report, 2014.

S Al-Sultan, M M Al-Doori, A H Al-Bayatti, H Zedan, A comprehensive survey on vehicular ad hoc network, J. Network Computer. Appl. 37, 2014, 380–392.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2018 International Educational Applied Scientific Research Journal