SD2PA: a fully safe driving and privacy-preserving authentication scheme for VANETs
Tóm tắt
The basic idea behind the vehicular ad-hoc network (VANET) is the exchange of traffic information between vehicles and the surrounding environment to offer a better driving experience. Privacy and security are the main concerns for meeting the safety aims of the VANET system. In this paper, we analyse recent VANET schemes that utilise a group authentication technique and found important vulnerabilities in terms of driving safety. These systems also suffer from vulnerabilities in terms of management efficiency and computational complexity. To defeat these problems, we propose a lightweight scheme, SD2PA, based on a general hash function for VANET. The proposed scheme overcomes the non-safe driving problem that resulted from the critical driving area. Moreover, the vehicle authentication is only done once by the VANET system administrator during the vehicle’s moving, so the authentication redundancy for the entire system is reduced and system management efficiency is enhanced. The SD2PA scheme also provides anonymity to protect the vehicle’s privacy, unless an important action needs to be taken against a malicious vehicle. A deep computational cost and communicational overhead analysis indicates that SD2PA is better than related schemes, as well as efficiently meeting VANET’s security and privacy needs.
Tài liệu tham khảo
Lee JK, Jeong YS, Park JH (2015) s-ITSF: a service based intelligent transportation system framework for smart accident management. Hum Cent Comput Inf Sci 5(1):34
Papadimitratos P, Fortelle AL, Evenssen K, Brignolo R, Cosenza S (2009) Vehicular communication systems: enabling technologies, applications, and future outlook on intelligent transportation. IEEE Commun Mag 47(11):84–95
Alfadhli SA, Alresheedi S, Lu S, Fatani A, Ince M (2019) ELCPH: An efficient lightweight conditional privacy-preserving authentication scheme based on hash function and local group secrete key for VANET. In: Proceedings of the 2019 the world symposium on software engineering pp 32–36
Bajaj K, Limbasiya T, Das D (2020) An efficient message transmission and verification scheme for VANETs. In: International conference on distributed computing and internet technology. Springer, Cham pp 127–143
Pournaghi SM, Zahednejad B, Bayat M, Farjami Y (2018) NECPPA: a novel and efficient conditional privacy-preserving authentication scheme for VANET. Comput Netw 134:78–92
Grover K, Lim A, Lee S (2015) Efficient authentication approach for highly dynamic vehicular ad hoc networks. Int J Ad Hoc Ubiquit Comput 19:193–207
Guo J, Li X, Liu Z, Ma J, Yang C, Zhang J, Wu D (2020) TROVE: a context awareness trust model for VANETs using reinforcement learning. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2020.2975084
Bayat M, Barmshoory M, Rahimi M, Aref MR (2015) A secure authentication scheme for VANETs with batch verification. Wireless Netw 21(5):1733–1743
Sheikh MS, Liang J, Wang W (2020) Security and privacy in vehicular ad hoc network and vehicle cloud computing: a survey. Wirel Commun Mobile Comput. https://doi.org/10.1155/2020/5129620
Malhi AK, Batra S, Pannu HS (2019) Security of vehicular ad hoc networks: a comprehensive survey. Comput Secur. https://doi.org/10.1016/j.cose.2019.101664
Manivannan D, Moni SS, Zeadally S (2020) Secure authentication and privacy-preserving techniques in Vehicular Ad hoc NETworks (VANETs). Veh Commun. https://doi.org/10.1016/j.vehcom.2020.100247
Zhang C, Lin X, Lu R, Ho PH, Shen X (2008) An efficient message authentication scheme for vehicular communications. IEEE Trans Veh Technol 57(6):3357–3368
Lee CC, Lai YM (2013) Toward a secure batch verification with group testing for VANET. Wirel Netw 19(6):1441–1449
Alamer A, Basudan S (2020) An efficient truthfulness privacy-preserving tendering framework for vehicular fog computing. Eng Appl Artif Intell 91:103583
Cui J, Xu W, Han Y, Zhang J, Zhong H (2020) Secure mutual authentication with privacy preservation in vehicular ad hoc networks. Veh Commun 21:100200
Kakkasageri MS, Manvi SS (2014) Information management in vehicular ad hoc networks: a review. J Netw Comput Appl 39:334–350
Bitam S, Mellouk A, Zeadally S (2015) VANET-cloud: a generic cloud computing model for vehicular Ad Hoc networks. IEEE Wirel Commun 22(1):96–102
Xia Z, Hu Z, Luo J (2017) UPTP vehicle trajectory prediction based on user preference under complexity environment. Wirel Pers Commun 97(3):4651–4665
Yi K, Du R, Liu L, Chen Q, Gao K (2017) Fast participant recruitment algorithm for large-scale vehicle-based mobile crowd sensing. Pervasive Mobile Comput 38:188–199
Granados JÁ, Batalla JM, Togay C (2020) Redundant localization system for automatic vehicles. Mech Syst Signal Process 136:106433
Cui J, Wei L, Zhang J, Xu Y, Zhong H (2019) An efficient message-authentication scheme based on edge computing for vehicular ad hoc networks. IEEE Trans Intell Transp Syst 20(5):1621–1632
Cui J, Tao X, Zhang J, Xu Y, Zhong H (2018) HCPA-GKA: a hash function-based conditional privacy-preserving authentication and group-key agreement scheme for VANETs. Veh Commun 14:15–25
Cui J, Zhang J, Zhong H, Xu Y (2017) SPACF: a secure privacy-preserving authentication scheme for VANET with cuckoo filter. IEEE Trans Veh Technol 66(11):10283–10295
Raya M, Hubaux JP (2007) Securing vehicular ad hoc networks. J Comput Secur 15(1):39–68
Lin X, Lu R, Zhang C, Zhu H, Ho PH, Shen X (2008) Security in vehicular ad hoc networks. IEEE Commun Mag 46(4):88–95
Lin X, Sun X, Ho PH, Shen X (2007) GSIS: a secure and privacy-preserving protocol for vehicular communications. IEEE Trans Veh Technol 56(6):3442–3456
Sun X, Lin X, Ho PH (2007) Secure vehicular communications based on group signature and ID-based signature scheme. In: 2007 IEEE international conference on communications pp 1539–1545
Guo J, Baugh JP, Wang S (2007) A group signature based secure and privacy-preserving vehicular communication framework. In: 2007 mobile networking for vehicular environments pp 103–108
Lu R, Lin X, Liang X, Shen X (2012) A dynamic privacy-preserving key management scheme for location-based services in vanets. IEEE Trans Intell Transp Syst 13(1):127–139
Rajput U, Abbas F, Oh H (2016) A hierarchical privacy preserving pseudonymous authentication protocol for VANET. IEEE Access 4:7770–7784
Zhang C, Ho PH, Tapolcai J (2011) On batch verification with group testing for vehicular communications. Wirel Netw 17(8):1851–1865
Chim TW, Yiu SM, Hui LC, Li VO (2011) SPECS: secure and privacy enhancing communications schemes for VANETs. Ad Hoc Netw 9(2):189–203
Horng SJ, Tzeng SF, Pan Y, Fan P, Wang X, Li T, Khan MK (2013) b-SPECS+ : batch verification for secure pseudonymous authentication in VANET. IEEE Trans Inf Forensics Secur 8(11):1860–1875
Shim KA (2012) CPAS: an efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Trans Veh Technol 61(4):1874–1883
Liu JK, Yuen TH, Au MH, Susilo W (2014) Improvements on an authentication scheme for vehicular sensor networks. Expert Syst Appl 41(5):2559–2564
Jianhong Z, Min X, Liying L (2014) On the security of a secure batch verification with group testing for VANET. Int J Netw Secur 16(5):355–362
Wang Y, Zhong H, Xu Y, Cui J, Guo F (2016) Efficient extensible conditional privacy-preserving authentication scheme supporting batch verification for VANETs. Secur Commun Netw 9(18):5460–5471
Zhang L, Hu C, Wu Q, Domingo-Ferrer J, Qin B (2016) Privacy-preserving vehicular communication authentication with hierarchical aggregation and fast response. IEEE Trans Comput 65(8):2562–2574
Tzeng SF, Horng SJ, Li T, Wang X, Huang PH, Khan MK (2017) Enhancing security and privacy for identity-based batch verification scheme in VANETs. IEEE Trans Veh Technol 66(4):3235–3248
Xie Y, Wu L, Zhang Y, Shen J (2016) Efficient and secure authentication scheme with conditional privacy-preserving for VANETs. Chin J Electron 25(5):950–956
Zhong H, Wen J, Cui J, Zhang S (2016) Efficient conditional privacy-preserving and authentication scheme for secure service provision in VANET. Tsinghua Sci Technol 21(6):620–629
Wu L, Fan J, Xie Y, Wang J, Liu Q (2017) Efficient location-based conditional privacy-preserving authentication scheme for vehicle ad hoc networks. Int J Distrib Sens Netw 13(3):1–13
Alazzawi MA, Lu H, Yassin AA, Chen K (2019) Efficient conditional anonymity with message integrity and authentication in a vehicular ad-hoc network. IEEE Access 7:71424–71435
Vijayakumar P, Azees M, Chang V, Deborah J, Balusamy B (2017) Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks. Clust Comput 20(3):2439–2450
Zhang C, Lu R, Lin X, Ho PH, Shen X (2008) An efficient identity-based batch verification scheme for vehicular sensor networks. In: IEEE INFOCOM 2008-the 27th conference on computer communications pp 246–250
Kenney JB (2011) Dedicated short-range communications (DSRC) standards in the United States. Proc IEEE 99(7):1162–1182
Xie K, Ning X, Wang X, He S, Ning Z, Liu X, Wen J, Qin Z (2017) An efficient privacy-preserving compressive data gathering scheme in WSNs. Inf Sci 390:82–94
Rathore S, Park JH (2018) Semi-supervised learning based distributed attack detection framework for IoT. Appl Soft Comput 72:79–89
Singh SK, Rathore S, Park JH (2019) Blockiotintelligence: a blockchain-enabled intelligent IoT architecture with artificial intelligence. Fut Gener Comput Syst. https://doi.org/10.1016/j.future.2019.09.002
Fan B, Andersen DG, Kaminsky M, Mitzenmacher MD (2014) Cuckoo filter: Practically better than bloom. In: Proceedings of the 10th ACM international on conference on emerging networking experiments and technologies. pp 75–88
Burrows M, Abadi M, Needham RM (1990) A logic of authentication. ACM Trans Comput Syst 8(1):18–36