An efficient key agreement and anonymous privacy preserving scheme for vehicular ad-hoc networks with handover authentication

被引:2
|
作者
Priyadharshini, A. [1 ]
Dannana, Suresh [2 ]
Rajasekaran, Arun Sekar [3 ]
Maria, Azees [4 ]
机构
[1] Coimbatore Inst Technol, Dept Comp Sci & Engn, Coimbatore, Tamil Nadu, India
[2] GMR Inst Technol, Dept ECE, Rajam, Andhra Prades, India
[3] SR Univ, Dept ECE, Warangal, Telangana, India
[4] VIT AP Univ, Sch Comp Sci & Engn, AP Secretariat, Inavolu, Andhra Prades, India
来源
关键词
anonymous authentication; handover authentication; privacy; security; vehicular ad-hoc networks (VANETs);
D O I
10.1002/cpe.7979
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Vehicular ad-hoc networks (VANETs) have gained significant attention in recent years due to their potential to improve the safety and efficiency of transportation systems. VANETs are a type of wireless ad-hoc network that enables communication between vehicles and between vehicles and roadside infrastructure. VANETs can also improve the efficiency of transportation systems by reducing traffic congestion and improving traffic flow. In addition to improving safety and efficiency, VANETs also face several challenges. One of the biggest challenges is ensuring the security and privacy of the data transmitted over the network. In this manuscript, an anonymous authentication scheme for VANET users is proposed along with privacy preservation and confidentiality. An efficient session key agreement protocol is designed for transferring location-based information between the vehicle user and the roadside unit (RSU). Further, updated session keys are transferred to the subsequent RSU, when the vehicle user moves to another location. Moreover, re-authentication of VANET users is completely evaded during to handover authentication, thus reducing the computational overhead. In addition, Resistance to different security assaults is discussed in this work through informal analysis. Finally, performance is compared with different relevant schemes and validated through Cygwin software.
引用
收藏
页数:13
相关论文
共 50 条
  • [31] An Efficient Group Key Agreement Scheme for Mobile Ad-Hoc Networks
    Yang, Yang
    Hu, Yupu
    Sun, Chunhui
    Lv, Chao
    Zhang, Leyou
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2013, 10 (01) : 10 - 17
  • [32] Efficient Anonymous Data Authentication for Vehicular Ad Hoc Networks
    Yu, Ping
    Ni, Wei
    Yu, Guangsheng
    Zhang, Hua
    Liu, Ren Ping
    Wen, Qiaoyan
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [33] Secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks
    Li, Chun-Ta
    Hwang, Min-Shiang
    Chu, Yen-Ping
    COMPUTER COMMUNICATIONS, 2008, 31 (12) : 2803 - 2814
  • [34] A Blockchain enabled location-privacy preserving scheme for vehicular ad-hoc networks
    Chaudhary, Bhawna
    Singh, Karan
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (05) : 3198 - 3212
  • [35] A Blockchain enabled location-privacy preserving scheme for vehicular ad-hoc networks
    Bhawna Chaudhary
    Karan Singh
    Peer-to-Peer Networking and Applications, 2021, 14 : 3198 - 3212
  • [36] An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks
    He, Debiao
    Zeadally, Sherali
    Xu, Baowen
    Huang, Xinyi
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (12) : 2681 - 2691
  • [37] Quantum Identity Authentication Scheme of Vehicular Ad-Hoc Networks
    Chen, Zhiya
    Zhou, Kunlin
    Liao, Qin
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2019, 58 (01) : 40 - 57
  • [38] Quantum Identity Authentication Scheme of Vehicular Ad-Hoc Networks
    Zhiya Chen
    Kunlin Zhou
    Qin Liao
    International Journal of Theoretical Physics, 2019, 58 : 40 - 57
  • [39] An Efficient Anonymous Authenticated Key Agreement Protocol for Vehicular Ad-Hoc Networks Based on Ring Signatures and the Elliptic Curve Integrated Encryption Scheme
    Buettner, Carsten
    Huss, Sorin A.
    INFORMATION SYSTEMS SECURITY AND PRIVACY, ICISSP 2015, 2015, 576 : 139 - 159
  • [40] A Realistic Distributed Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks
    Liu, Zhi-Cai
    Xiong, Ling
    Peng, Tu
    Peng, Dai-Yuan
    Liang, Hong-Bin
    IEEE ACCESS, 2018, 6 : 26307 - 26317