Secure and Pairing-Free Identity-Based Batch Verification Scheme in Vehicle Ad-Hoc Networks
详细信息    查看全文
  • 关键词:Information security ; Ad hoc network ; Vehicular ad hoc network (VANET) ; Identity ; based batch verification ; Authentication scheme ; Pairing ; free Diffie ; Hellman
  • 刊名:Lecture Notes in Computer Science
  • 出版年:2016
  • 出版时间:2016
  • 年:2016
  • 卷:9773
  • 期:1
  • 页码:11-20
  • 全文大小:130 KB
  • 参考文献:1.Ying, L., Yang, S., Srikant, R.: Optimal delay-throughput tradeoffs in mobile ad hoc networks. IEEE Trans. Inf. Theor. 54(9), 4119–4143 (2008)MathSciNet CrossRef MATH
    2.Eissa, T., Razak, S., Ngadi, M.: A novel lightweight authentication scheme for mobile ad hoc networks. Arab. J. Sci. Eng. 37(8), 2179–2192 (2012)CrossRef
    3.Zhang, Y., Liu, W., Wei, W., et al.: Location-based compromise-tolerant security mechanisms for wireless sensor networks. IEEE J. Sel. Areas Commun. 24(2), 247–260 (2013)MathSciNet CrossRef
    4.Shabnam, K., Mazleena, S.: A novel authentication scheme for mobile environments in the context of elliptic curve cryptography. In: Proceeding I4CT 2015, pp. 506–510. IEEE press, New York (2015)
    5.Lin, X., Lu, R., Zhang, C., et al.: Security in vehicular ad hoc networks. IEEE Commun. Mag. 46(4), 88–95 (2008)CrossRef
    6.Tzeng, S., Horng, S., Li, T., et al.: Enhancing security and privacy for identity-based batch verification scheme in VANET. IEEE Trans. Veh. Technol. 99, 1–12 (2015)
    7.Papadimitratos, P., Hubaux, J.: Report on the secure vehicular communications: results and challenges ahead workshop. ACM SIGMOBILE Mobile Comput. Commun. Rev. 12(2), 53–64 (2008)CrossRef
    8.Chim, T., Yiu, S., Hui, C., et al.: SPECS: secure and privacy enhancing communications schemes for VANETs. Ad Hoc Netw. 9(2), 189–203 (2011)CrossRef
    9.Horng, S., Tzeng, S., Pan, Y., et al.: b-SPECS+: batch verification for secure pseudonymous authentication in VANET. IEEE Trans. Inf. Forensics Secur. 8(11), 1860–1875 (2013)CrossRef
    10.Nithya, D., Kumari, N.: A survey of routing protocols for VANET in Urban scenarios. In: Proceeding Pattern Recognition, Informatics and Mobile Engineering PRIME 2013, pp. 464–467. IEEE Press, New York (2013)
    11.Mokhtar, B., Azab, M.: Survey on security issues in vehicular ad hoc networks. Alexandria Eng. J. 54, 1115–1126 (2015)CrossRef
    12.Thenmozhi, T., Somasundaram, R.: Towards modelling a trusted and secured centralised reputation system for VANET’s. Wireless Pers. Commun. 88(2), 357–370 (2016) CrossRef
    13.Zhang, C., Lu, R., Lin, X., et al.: An efficient identity-based batch verification scheme for vehicular sensor networks. In: Proceeding INFOCOM 2008, pp. 816–824. IEEE Press, New York (2008)
    14.Zhang, C., Ho, P., Tapolcai, J.: On batch verification with group testing for vehicular communications. Wireless Netw. 17(8), 1851–1865 (2011)CrossRef
    15.Lee, C., Lai, Y.: Toward a secure batch verification with group testing for VANET. Wireless Netw. 19(6), 1441–1449 (2013)MathSciNet CrossRef
    16.IEEE Trial-Use Standard for Wireless Access in Vehicular Environment-Security Services for Applications and Management Messages. In: IEEE standard 1609, 2 July 2006
    17.Huang, J., Yeh, L., Chien, H.: ABAKA: an anonymous batch authenticated and key agreement scheme for value-add services in vehicular ad hoc networks. IEEE Trans. Veh. Technol. 60(1), 248–262 (2011)CrossRef
    18.Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. J. Cryptology 17(4), 297–319 (2004)MathSciNet CrossRef MATH
    19.Pointcheval, D., Stern, J.: Security arguments for digital signatures and blind signatures. J. Cryptology. 13(3), 361–396 (2000)CrossRef MATH
  • 作者单位:Xiaoming Hu (16)
    Jian Wang (16)
    Huajie Xu (17)
    Yan Liu (16)
    Xiaojun Zhang (18)

    16. College of Computer and Information Engineering, Shanghai Polytechnic University, Shanghai, 201209, China
    17. School of Computer and Electronic Information, Guangxi University, Nanning, 530004, China
    18. E & A College, Hebei Normal University of Science and Technology, Hebei, 066004, China
  • 丛书名:Intelligent Computing Methodologies
  • ISBN:978-3-319-42297-8
  • 刊物类别:Computer Science
  • 刊物主题:Artificial Intelligence and Robotics
    Computer Communication Networks
    Software Engineering
    Data Encryption
    Database Management
    Computation by Abstract Devices
    Algorithm Analysis and Problem Complexity
  • 出版者:Springer Berlin / Heidelberg
  • ISSN:1611-3349
  • 卷排序:9773
文摘
Identity-based batch verification (IBBV) scheme is very desirable to solve efficiency, security and privacy preservation issues for vehicular ad hoc network (VANET). In 2015, Tzeng et al. proposed an IBBV scheme which was published in IEEE Transaction on Vehicular Technology. Their scheme has superior performance than other existing similar schemes in terms of security, computation cost and transmission overhead by performance evaluations. However, one time signature verification of their scheme needs two bilinear pairing operations. As it is well known, bilinear pairing is one of the most time-consuming operation in modern cryptography. Therefore, some efforts can be made to prevent the appearance of pairing and obtain better efficiency. In this paper, we propose an improved scheme of Tzeng et al.’s IBBV. Our improved IBBV scheme needs not use bilinear pairing without the lack of security and privacy-preserving. The total computation cost for signing and verifying is the constant 1.2 ms for single message and n messages respectively, which is far better performance than Tzeng et al. scheme and other similar schemes. So our improved IBBV scheme is more suitable for practical use. Finally, we apply the recovering technology of the vehicle’s real identity of Tzeng et al.’s IBBV scheme to a public key authentication scheme for mobile Ad-hoc networks to address an improved pairing-free authentication scheme.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700