An Efficient (t, n) Threshold Authentication Scheme for Vehicular Ad Hoc Networks

被引:0
|
作者
Kong, Wenhui [1 ,2 ,3 ]
Wen, Pengfei [1 ,2 ,3 ]
Zheng, Xinran [1 ,3 ]
Yang, Shuo [1 ]
Hu, Ning [2 ]
Wang, Xingjun [1 ,3 ]
机构
[1] Tsinghua Univ, Shenzhen Int Grad Sch, Shenzhen, Peoples R China
[2] Peng Cheng Lab, Shenzhen, Peoples R China
[3] Tsinghua Univ, Dept Elect Engn, Beijing, Peoples R China
关键词
VANET; Decentralized; Threshold; Secret Share; PRIVACY; SECURITY;
D O I
10.1109/WCNC57260.2024.10570881
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Vehicular Ad Hoc Network(VANET) is a hot topic, how to design an efficient authentication scheme is the core problem in this field. With the considerable progress in computing capability and side-channel attack capability, some seemingly safe third parties have also become less safe. Our paper focuses on weakening the use of trusted authority(TA) and improving the fault tolerance of authentication schemes. At first, all private keys are generated by users. Next, the ephemeral Diffie-Hellman key exchange scheme is used to construct a PID authentication. Moreover, we build a partial key delivery method without a secure channel. In the batch message authentication part, we use the Shamir secret share method to build a (t, n) threshold signature scheme that guarantees batch signatures cannot be tampered with fewer than t people involved. Finally, we make a comparison of time cost and communication cost with the other four schemes. Our scheme has a remarkable advantage over other schemes by comparing experimental data.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] A new and efficient authentication scheme for vehicular ad hoc networks
    Bayat, Majid
    Barmshoory, Mostafa
    Pournaghi, S. Morteza
    Rahimi, Majid
    Farjami, Yaghoub
    Aref, Mohammad Reza
    JOURNAL OF INTELLIGENT TRANSPORTATION SYSTEMS, 2020, 24 (02) : 171 - 183
  • [2] An Efficient Successive Authentication Scheme for Vehicular Ad-hoc Networks
    Saha, Sanjay
    Elahi, Md. Mamun
    Islam, Md. Mahfuzul
    Ahmed, Shabbir
    2017 20TH INTERNATIONAL CONFERENCE OF COMPUTER AND INFORMATION TECHNOLOGY (ICCIT), 2017,
  • [3] ANEL: A novel efficient and lightweight authentication scheme for vehicular ad hoc networks
    Benyamina, Zakarya
    Benahmed, Khelifa
    Bounaama, Fateh
    COMPUTER NETWORKS, 2019, 164
  • [4] An Efficient Cooperative Message Authentication Scheme in Vehicular Ad-hoc Networks
    Sarencheh, Amirreza
    Asaar, Maryam Rajabzadeh
    Salmasizadeh, Mahmoud
    Aref, Mohammad Reza
    2017 14TH INTERNATIONAL ISC (IRANIAN SOCIETY OF CRYPTOLOGY) CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2017, : 111 - 118
  • [5] A Secure and Efficient Authentication Scheme for Fog-Based Vehicular Ad Hoc Networks
    Lee, Sangjun
    Son, Seunghwan
    Kwon, Deokkyu
    Park, Yohan
    Park, Youngho
    APPLIED SCIENCES-BASEL, 2025, 15 (03):
  • [6] An Optimized and Secure Authentication Scheme for Vehicular Ad Hoc Networks
    Rekik, M.
    Obaidat, Mohammad S.
    Makhlouf, A.
    Zarai, F.
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [7] Efficient Anonymous Data Authentication for Vehicular Ad Hoc Networks
    Yu, Ping
    Ni, Wei
    Yu, Guangsheng
    Zhang, Hua
    Liu, Ren Ping
    Wen, Qiaoyan
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [8] Privacy protection for vehicular ad hoc networks by using an efficient revocable message authentication scheme
    Fan, Chun-I
    Hsu, Ruei-Hau
    Chen, Wei-Kuei
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (05) : 462 - 478
  • [9] CPAV: Computationally Efficient Privacy Preserving Anonymous Authentication Scheme for Vehicular Ad Hoc Networks
    Vijayakumar, P.
    Azees, M.
    Deborah, L. Jegatha
    2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, : 62 - 67
  • [10] An Efficient Message-Authentication Scheme Based on Edge Computing for Vehicular Ad Hoc Networks
    Cui, Jie
    Wei, Lu
    Zhang, Jing
    Xu, Yan
    Zhong, Hong
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2019, 20 (05) : 1621 - 1632