Comments on "A Cross-Layer Approach to Privacy-Preserving Authentication in WAVE-Enabled VANETs" by Biswas and Misic

被引:6
|
作者
Shim, Kyung-Ah [1 ]
机构
[1] Natl Inst Math Sci, Div Integrated Math, Daejeon 305811, South Korea
关键词
Anonymous authentication scheme; public-key signature scheme; secret key recovery attack;
D O I
10.1109/TVT.2017.2755739
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A WAVE-based cross-layer anonymous authentication scheme based on a variant of ECDSA (Biswas and Misic "A Cross-layer approach to privacy-preserving authentication in WAVE-enabled VANETs," IEEE Trans. Veh. Technol., vol. 62, no. 5, pp. 2182-2192, Jun. 2013.) was published for authenticity of vehicular safety application messages. Our result shows that, contrary to what is claimed, the scheme is entirely broken due to the insecurity of their underlying signature scheme: Their modification of ECDSA is insecure against secret key recovery attacks where anyone can recover OBUs' or mobile nodes' private keys from transmitted signed messages just eavesdropping.
引用
收藏
页码:10588 / 10589
页数:2
相关论文
共 7 条
  • [1] A Cross-Layer Approach to Privacy-Preserving Authentication in WAVE-Enabled VANETs
    Biswas, Subir
    Misic, Jelena
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2013, 62 (05) : 2182 - 2192
  • [2] An Improved Cross-Layer Privacy-Preserving Authentication in WAVE-Enabled VANETs
    Tsai, Jia-Lun
    IEEE COMMUNICATIONS LETTERS, 2014, 18 (11) : 1931 - 1934
  • [4] BCGS: Blockchain-assisted privacy-preserving cross-domain authentication for VANETs
    Chen, Biwen
    Wang, Zhongming
    Xiang, Tao
    Yang, Jiyun
    He, Debiao
    Choo, Kim-Kwang Raymond
    VEHICULAR COMMUNICATIONS, 2023, 41
  • [5] DBCPCA:Double-layer blockchain-assisted conditional privacy-preserving cross-domain authentication for VANETs
    Guo, Xian
    Lu, Xiangrong
    Jiang, Yongbo
    Fang, Junli
    Zhang, Di
    AD HOC NETWORKS, 2024, 163
  • [6] A reliable recommendation and privacy-preserving based cross-layer reputation mechanism for mobile cloud computing
    Lin, Hui
    Xu, Li
    Mu, Yi
    Wu, Wei
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2015, 52 : 125 - 136
  • [7] Resilient and privacy-preserving predictive intrusion-tolerant control under stealthy cyber attacks: a cross-layer detection and defense method
    Han, Kezhen
    Lu, Shaohang
    Chen, Changzhi
    Chen, Mengdi
    2022 41ST CHINESE CONTROL CONFERENCE (CCC), 2022, : 188 - 193