Secure and efficient cache-based authentication scheme for vehicular ad-hoc networks

被引:4
|
作者
Kumar, Pankaj [1 ]
Om, Hari [1 ]
机构
[1] Indian Inst Technol, Dept Comp Sci & Engn, Dhanbad, Jharkhand, India
关键词
VANET; Authentication; Key agreement; Anonymity; Unlinkability; Security; PRIVACY-PRESERVING AUTHENTICATION; KEY AGREEMENT SCHEME; PROTOCOL; VANETS;
D O I
10.1007/s11276-022-03003-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the emerging Vehicular Ad-hoc Network (VANET), real-time applications have come into existence nowadays. However, because of the wireless environment used in VANET, ensuring vehicle user (V-i) authentication and securing the communication against various active and passive attacks are essential. Traditionally, such challenges have been addressed with the help of a Trusted Authority (TA). Each time Roadside Unit (RSU) needs to authenticate V-i (newly/previously visited), it has to communicate with TA. We believe that this kind of arrangement will lead to unnecessary computation and communication overheads. This article introduces a secure and efficient cache-based authentication scheme for vehicular ad-hoc networks. Our proposed scheme utilizes Elliptic Curve Cryptography and divided into two different phases. The first phase (cache miss) deals with caching of identities (pseudonyms) of newly visited V-i into at RSU. During this process RSU authenticates such V-i through TA. The second phase (cache hit) deals with authentication of any previously visited V-i based on the RSU's cache entries (without communicating with TA). Due to this arrangement, the proposed protocol requires relatively less authentication delay as compare to the traditional authentication schemes without affecting desired security and design properties. Additionally, the performance analysis section shows that our protocol may be considered for low-power practical applications of VANET due to its enhanced security and reduced computation and communication overheads.
引用
收藏
页码:2821 / 2836
页数:16
相关论文
共 50 条
  • [41] An efficient certificateless aggregate signature scheme for vehicular ad-hoc networks
    Computer Science and Engineering Dep., Thapar University, Patiala, Punjab, India
    Discrete Math. Theor. Comput. Sci., 1 (317-338):
  • [42] An Efficient Certificateless Aggregate Signature Scheme for Vehicular Ad-Hoc Networks
    Malhi, Avleen Kaur
    Batra, Shalini
    DISCRETE MATHEMATICS AND THEORETICAL COMPUTER SCIENCE, 2015, 17 (01): : 317 - 338
  • [43] An enhanced and secure trust-extended authentication mechanism for vehicular ad-hoc networks
    Kumari, Saru
    Karuppiah, Marimuthu
    Li, Xiong
    Wu, Fan
    Das, Ashok Kumar
    Odelu, Vanga
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4255 - 4271
  • [44] SARP: secure routing protocol using anonymous authentication in vehicular Ad-hoc networks
    Yelure, Bhushan
    Sonavane, Shefali
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 14 (4) : 3567 - 3581
  • [45] Secure Biometric-Based Authentication Protocol for Vehicular Ad-hoc Network
    Ismail, Md
    Chatterjee, Santanu
    Sing, Jamuna Kanta
    2018 IEEE 4TH INTERNATIONAL SYMPOSIUM ON SMART ELECTRONIC SYSTEMS (ISES 2018), 2018, : 229 - 234
  • [46] Secure authentication and privacy-preserving techniques in Vehicular Ad-hoc NETworks (VANETs)
    Manivannan, D.
    Moni, Shafika Showkat
    Zeadally, Sherali
    VEHICULAR COMMUNICATIONS, 2020, 25
  • [47] RSU-based message authentication for vehicular ad-hoc networks
    Hsin-Te Wu
    Wen-Shyong Hsieh
    Multimedia Tools and Applications, 2013, 66 : 215 - 227
  • [48] DASSR: A Distributed Authentication Scheme for Secure Routing in Wireless Ad-hoc Networks
    Phung, Phu H.
    Quang Tran Minh
    FUTURE DATA AND SECURITY ENGINEERING, FDSE 2016, 2016, 10018 : 219 - 236
  • [49] RSU-based message authentication for vehicular ad-hoc networks
    Wu, Hsin-Te
    Hsieh, Wen-Shyong
    MULTIMEDIA TOOLS AND APPLICATIONS, 2013, 66 (02) : 215 - 227
  • [50] Toward Secure Vehicular Ad-hoc Networks: A Survey
    Moharrum, Mohammed A.
    Al-Daraiseh, Ahmad A.
    IETE TECHNICAL REVIEW, 2012, 29 (01) : 80 - 89