Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication

  • Published:
Computing Aims and scope Submit manuscript

Abstract

Authentication in vehicular ad-hoc network (VANET) is still a research challenge, as it requires not only secure and efficient authentication, but also privacy preservation. In this paper, we proposed a lightweight and efficient authentication scheme (LESPP) with strong privacy preservation for secure VANET communication. The proposed scheme utilizes self-generated pseudo identity to guarantee both privacy preservation and conditional traceability, and it only requires a lightweight symmetric encryption and message authentication code (MAC) generation for message signing and a fast MAC re-generation for verification. Compared with currently existing public key based schemes, the proposed scheme significantly reduces computation cost by \(10^2\)\(10^3\) times and decreases communication overhead by 41.33–77.60 %, thus achieving resilience to denial of service (DoS) attack. In LESPP, only key management center can expose a vehicle’s real identity from its pseudo identity, therefore, LESPP provides strong privacy preservation so that the adversaries cannot trace any vehicles, even if all roadside units are compromised. Furthermore, vehicles in LESPP need not maintain certificate revocation list (CRL), so any CRL related overhead is avoided. Extensive simulations reveal that the novel scheme is feasible and has an outstanding performance of nearly 0 ms network delay and 0 % packet loss ratio, which are especially appropriate for realtime emergency event reporting applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  1. Weiland RJ, Purser LB (2000) Intelligent transportation systems. Transportation in the new millennium. http://trid.trb.org/view.aspx?id=639268

  2. Taylor MAP (2001) Intelligent transport systems. Handbook of transport systems and traffic control. p 461. http://scholar.google.com/scholar?q=Handbook+of+transport+systems+and+traffic+control+TAYLOR&btnG=&hl=en&as_sdt=0%2C5

  3. Wang F, Zeng D, Yang L (2006) Smart cars on smart roads: an IEEE intelligent transportation systems society update. IEEE Pervasive Comput 5(4):68–69

    Article  MathSciNet  Google Scholar 

  4. Dedicated Short Range Communications (DSRC) Home. http://trid.trb.org/view.aspx?id=725762. Accessed 31 Dec 2002

  5. Msn, TV. http://www.msntv.com/. Accessed 20 May 2007

  6. Raya M, Hubaux J (2005) The security of vehicular ad Hoc networks. In: Proceedings of the 3rd ACM workshop on security of ad hoc and sensor networks, pp 11–21

  7. Raya M, Papadimitratos P, Hubaux JP (2006) Securing vehicular communications. IEEE Wirel Commun 13(1):8–15

    Article  Google Scholar 

  8. Sun Y, Lu R, Lin X, Shen XS (2010) An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. IEEE Trans Veh Technol 59(1):3589–3603

    Article  Google Scholar 

  9. Mao W (2003) Modern cryptography: theory and practice. Prentice-Hall, Englewood Cliffs

    Google Scholar 

  10. Libert B, Vergnaud D (2008) Multi-use unidirectional proxy re-signatures. In: Proceedings of ACM CCS, Alexandria, pp 511–520

  11. Lu R, Lin X, Zhu H, Ho P, Shen XS (2008) ECPP: efficient conditional privacy preservation protocol for secure vehicular communications. In: Proceedings of 2008 INFOCOM, pp 1229–1237

  12. Zhang C, Lu R, Lin X, Ho P, Shen XS (2008) An efficient identity-based batch verification scheme for vehicular sensor networks. In: Proceedings of 2008 INFOCOM, pp 246–250

  13. Fiat A (1990) Batch RSA. In: Proceedings of CRYPTO’89, pp 175–185

  14. Camenisch J, Hohenberger S, Pedersen M (2007) Batch verification of short signatures. In: Proceedings of EUROCRYPT’07, pp 246–263

  15. Lin X, Sun X, Ho P, Shen XS (2007) GSIS: a secure and privacy preserving protocol for vehicular communications. IEEE Trans Veh Technol 56(1):3442–3456

    Google Scholar 

  16. Cham D, Heyst EV (1991) Group signatures. In: Proceedings of 1991 advances in cryptology- EUROCRYPT, pp 257–265

  17. Boneh D, Boyen X, Shacham H (2004) Short group signatures. In: Proceedings of 2004 CRYPTO, pp 227–242

  18. Shamir A (1984) Identity-based cryptosystems and signature schemes. In: Proceedings of 1984 advances in CryptologyCrypto. Springer, New York, pp 47–53

  19. Wang F, Xu YJ, Wu L, Dan Liu, Zhu LH (2013) Authenticating and tracing biological anonym of VANET based on KMC decentralization and two-factor. In: Proceedings of the 11th annual international conference on mobile systems, applications, and services (MobiSys ’13). ACM, New York, pp 519–520

  20. Zhang L, Wu Q, Solanas A, Domingo FJ (2010) A scalable robust authentication protocol for secure vehicular communications. IEEE Trans Veh Technol 59(1):1606–1617

    Article  Google Scholar 

  21. Sampigethaya K, Li M, Huang L, Poovendran R (2007) AMOEBA: robust location privacy scheme for VANET. IEEE J Sel Areas Commun 25(1):1569–1589

    Article  Google Scholar 

  22. Calandriello G, Papadimitratos P, Hubaux J, Lioy A (2007) Efficient and robust pseudonymous authentication in VANET. In: Proceedings of 2007 the fourth ACM international workshop on Vehicular, ad hoc networks, pp 19–28

  23. Studer A, Bai F, Bellur B, Perrig A (2008) Flexible, extensible, and efficient VANET authentication. J Commun Netw 11(6):574–588

    Article  Google Scholar 

  24. Perrig A, Canetti R, Tygar JD, Song D (2002) The TESLA broadcast authentication protocol. In: Proceedings of RSA CryptoBytes’02

  25. Lin X, Sun X, Wang X, Zhang C, Ho P, Shen XS (2008) TSVC—timed efficient and secure vehicular communications with privacy preserving. IEEE Trans Wirel Commun 7(1):4987–4998

    Article  Google Scholar 

  26. Ren K, Lou W, Deng RH, Kim K (2006) A novel privacy preserving authentication and access control scheme in pervasive computing environments. IEEE Trans Veh Technol 55(4):1373–1384

    Article  Google Scholar 

  27. Sampigethava K, Huang L, Li M, Poovendran R, Matsuura K, Sezaki K (2006) CARAVAN: providing location privacy for VANET. In: Proceedings of International workshop on vehicular ad hoc networks

  28. Daemen J, Rijmen V (1998) AES Proposal: Rijndael. In: Proceedings of the first advanced encryption standard candidate conference, National Institute of Standards and Technology (NIST)

  29. Bellare M, Canetti R, Krawczyk H (1996) Message authentication using hash functions the HMAC construction. RSA Lab CryptoBytes 2(1):12–15

    MATH  Google Scholar 

  30. Hess F (2003) Efficient identity based signature schemes based on pairings. Sel Areas Cryptogr 2595:310–324

    Google Scholar 

  31. Boneh D, Lynn B, Shacham H (2001) Short signatures from the Weil pairing. In: Proceedings of 2001 ASIACRYPT, pp 514–532

  32. Katz J, Lindell Y (2007) Introduction to modern cryptography: principles and protocols. Chapman & Hall/CRC, Boca Raton, Florida

    MATH  Google Scholar 

  33. Scott M (2007) Efficient implementation of cryptographic pairings. http://www.pairing-conference.org/2007/invited/Scott_slide.pdf

  34. Zhang C, Lin X, Lu R, Ho P, Shen XS (2008) An efficient message authentication scheme for vehicular communications. IEEE Trans Veh Technol 57(1):3357–3368

    Article  Google Scholar 

  35. Keranen A, Ott J, Karkkainen T (2009) The ONE simulator for DTN protocol evaluation. In: Proceedings of the 2nd international conference on simulation tools and techniques

  36. Papadimitratos P, Levente B, Schoch E, Freudiger J, Raya M, Ma Z (2008) Secure vehicular communication systems: design and architecture. Commun Mag IEEE 46(1):100–109

    Article  Google Scholar 

  37. Hsiao H, Studer A, Chen C, Perrig A, Bai F, Bellur B (2011) Flooding-resilient broadcast authentication for VANETs. In: Proceedings of the 17th annual international conference on mobile computing and networking, pp 193–204

  38. Zhang X, Liu C, Nepal S, Pandey S, Chen J (2013) A privacy leakage upper-bound constraint based approach for cost-effective privacy preserving of intermediate datasets in cloud. IEEE Trans Parallel Distrib Syst 24(6):1192–1202

    Article  Google Scholar 

  39. Zhang X, Yang LT, Liu C, Chen J (2014) A scalable two-phase top-down specialization approach for data anonymization using MapReduce on cloud. IEEE Trans Parallel Distrib Syst 25(2):363–373

    Article  Google Scholar 

  40. Zhang X, Liu C, Nepal S, Chen J (2013) An efficient quasi-identifier index based approach for privacy preservation over incremental data sets on cloud. J Comput Syst Sci 79(5):542–555

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgments

This paper is supported by Program for New Century Excellent Talents in University (NCET-12-0046), National Natural Science Foundation of China No.61272512, Beijing Municipal Natural Science Foundation No.4121001, and DNSLAB, China Internet Network Information Center, Beijing 100190.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dan Liu.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Wang, M., Liu, D., Zhu, L. et al. LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication. Computing 98, 685–708 (2016). https://doi.org/10.1007/s00607-014-0393-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00607-014-0393-x

Keywords

Mathematics Subject Classification