计算机科学 ›› 2019, Vol. 46 ›› Issue (4): 177-182.doi: 10.11896/j.issn.1002-137X.2019.04.028

• 信息安全 • 上一篇    下一篇

针对车联网认证方案CPAV和ABV的安全分析

王青龙, 乔瑞, 段宗涛   

  1. 长安大学信息工程学院 西安710064
  • 收稿日期:2018-02-26 出版日期:2019-04-15 发布日期:2019-04-23
  • 通讯作者: 王青龙(1970-),男,博士,副教授,主要研究方向为公钥密码学及应用,E-mail:qlwang@chd.edu.cn(通信作者)
  • 作者简介:乔 瑞(1994-),女,硕士生,主要研究方向为车联网信息安全;段宗涛(1977-),男,博士,教授,主要研究方向为可信交通信息服务。
  • 基金资助:
    本文受陕西省重点科技创新团队项目(2017KCT-29),陕西省重点研发计划项目(2017GY-072,2018GY-136,2018GY-022 ,2018GY-032),陕西省国际科技合作计划项目(2017KW-015),陕西省工业科技攻关项目(2015GY002)资助。

Security Analysis on VANETs Authentication Schemes:CPAV and ABV

WANG Qing-long, QIAO Rui, DUAN Zong-tao   

  1. School of Information Engineering,Chang’an University,Xi’an 710064,China
  • Received:2018-02-26 Online:2019-04-15 Published:2019-04-23

摘要: 为了实现车联网中车辆身份的隐私保护,近年来人们提出了很多不同的匿名认证方案。Vijayakumar等于2018年提出了针对车联网的计算有效的隐私保留匿名交互认证(CPAV)及批量认证(ABV)方案,该方案可以实现车辆与RSU之间的匿名互认证以及RSU对车辆的匿名批量认证,能够抵抗假冒攻击、伪造攻击以及关联攻击,并且在必要时TA(Trusted Agency)能够追踪出已注册车辆的真实身份。文中对CPAV和ABV方案的安全性进行了深入分析,在CPAV方案中外部攻击者完全能够成功实施假冒攻击和伪造攻击,进而证明该方案不满足不可否认性,也不能实现对车辆的条件追踪。另外,因为该方案中使用的匿名身份是唯一的,导致该方案不能抵抗关联攻击,这表明该方案也不具有所谓的不可连接性。此外,还证明了批量认证方案也不能抵抗伪造攻击。

关键词: 车联网, 关联攻击, 假冒攻击, 匿名认证, 条件追踪, 伪造攻击, 隐私保护

Abstract: Recently,many different anonymous authentication schemes have been proposed for privacy protection of vehicles in vehicular ad hoc networks (VANETs).In 2018,Vijayakumar et al.proposed a computationally efficient privacy preserving anonymous authentication scheme for VANETs (CPAV) and anonymous batch authentication scheme for VANETs (ABV).The schemes can achieve anonymous mutual authentication between the vehicle and the road side unit(RSU),as well as anonymous batch authentication of vehicle by the RSU,and resist bogus attacks,forgery attack,and associated attacks.TA (Trusted Agency) can track the true identity of registered vehicles when necessary.This paper deeply analyzed the security of CPAV and ABV.In CPAV scheme,the external attackers are fully able to successfully conduct bogus attack and forgery attack,which proves that this scheme does not satisfy non-repudiation,nor can it conduct conditional tracking for vehicles.In addition,because the anonymous identity used in the scheme is unique,the scheme cannot resist the associated attacks,which indicates that this scheme doesn’t possess the so-calledunlinkability.At last,it’s also proved that the anonymous batch authentication (ABV) scheme can’t resist forgery attack.

Key words: Anonymous authentication, Associated attack, Bogus attack, Conditional tracking, Forgery attack, Privacy preserving, Vehicular ad hoc networks (VANETs)

中图分类号: 

  • TP309.7
[1]AZIMI R,BHATIA G,RAJKUMAR R,et al.Vehicular networks for collision avoidance at intersections[C]∥SAE world congress & exhibition.Carnegie Mellon University:Priyantha Mudalige,2011:406-416.
[2]TANGADE S S,MANVI S S.A survey on attacks,security and trust management solutions in VANETs[C]∥4th IEEE International Conference on Computing,Communications nad Networking Technologies.Tiruchengode:IEEE Computer Society,2013:105-112.
[3]JIANG S R,ZHU X Y,WANG L M.An Efficient Anonymous Batch Authentication Scheme Based on HMAC for VANETs.IEEE Transactions on Intelligent Transportation Systems,2016,17(8):2193-2205.
[4]AI-SULTAN S M,AI-DOORI M H,AI-BAYATTI A,et al.A comprehensive survey on vehicular ad hoc network. Journal of Network and Computer Applications,2014,37(1):380-392.
[5]QU F Z,WU Z H,WANG F Y,et al.A security and privacy review of VANETs.IEEE Transactions on Intelligent Transportation Systems,2015,16(6):2985-2996.
[6]ZENG S K,HUANG Y,LIU X W.Privacy-preserving Communication for VANETs with Conditionally Anonymous Ring Signature[J].International Journal of Network Security,2015,9(12):135-141.
[7]JIANG Y C,JI Y,LIU T H.An Anonymous Communication Scheme based on Ring Signature in VANETs[OL].https://arxiv.org/pdf/1410.1639.pdf.
[8]LIN X,SUN X,HO P H,et al.GSIS:A secure and privacy pre- serving protocol for vehicular communications[J].IEEE Tran-sactions on Vehicular Technology,2007,56(6):3442-3456.
[9]ZHANG L,WU Q,SOLANS A,et al.A scalable robust authentication protocol for secure vehicular communications[J].IEEE Transactions On Vehicular Technology,2009,59(4):1606-1617.
[10]ZHANG C X,LU R X,LIN X D,et al.An efficient identity based batch verification scheme for vehicular sensor networks[C]∥International Conference on Computer Communications-2008.Phoenix:IEEE Press,2008:816-824.
[11]KILTZ E,PIETRZAK K.Leakage resilient elgamalencryption∥International Conference on the Theory and Application of Cryptology and Information Security.Springer:Computer Science,2010:595-612.
[12]ZHANG L,WU Q H,QIN B,et al.APPA:Aggregate privacy-preserving authentication in vehicular ad hoc networks∥International Conference on Information Security.Springer:Computer Science,2011:293-308.
[13]ZHANG L,WU Q H,DOMINGO-FERRER J,et al.Distributed Aggregate Privacy-Preserving Authentication in VANETs[J].IEEE Transactions on Intelligent Transportation Systems,2017,18(3):516-526.
[14]ZHU X Y,JIANG S R,WANG L G,et al.Efficient Privacy-Preserving Authentication for Vehicular Ad Hoc Networks[J].IEEE Transactions on Vehicular Technology,2014,63(2):907-918.
[15]JIANG S R,ZHU X Y,WANG L M.An Efficient Anonymous Batch Authentication Scheme Based on HMAC for VANETs[J].IEEE Transactions on Intelligent Transportation Systems,2016,17(8):2193-2204.
[16]LO N W,TSAI J L.An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks Without Pairings[J].IEEE Transactions on Intelligent Transportation Systems,2016,17(5):1319-1328.
[17]LU R,LIN X,ZHU H,et al.ECPP:Efficient conditional privacy-preservation protocol for secure vehicular communications[C]∥IEEE Conference on Computer Communications INFOCOM 2008.Phoenix:IEEE Press,2008:1229-1237.
[18]MARA M,HUBAUX J P.Securing vehicular ad hoc networks[J].Journal of Computer Security,2007,15(1):39-68.
[19]STUDER A,SHI E,BAI F,et al.Tacking together Efficient Authentication,Revocation,and Privacy in VANETs[C]∥Proceedings of the 6th Annual IEEE Communications Society Conference on Sensor,Mesh,and Ad Hoc Communications and Networks (SECON 2009).Rome:IEEE Press,2009:22-26.
[20]VIJAYAKUMAR P,CHANG V,JEGATHA DEBORAH L,et al.Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks[J].Future Generation Computer System,2018,78(3):943-995.
[1] 鲁晨阳, 邓苏, 马武彬, 吴亚辉, 周浩浩.
基于分层抽样优化的面向异构客户端的联邦学习
Federated Learning Based on Stratified Sampling Optimization for Heterogeneous Clients
计算机科学, 2022, 49(9): 183-193. https://doi.org/10.11896/jsjkx.220500263
[2] 汤凌韬, 王迪, 张鲁飞, 刘盛云.
基于安全多方计算和差分隐私的联邦学习方案
Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy
计算机科学, 2022, 49(9): 297-305. https://doi.org/10.11896/jsjkx.210800108
[3] 吕由, 吴文渊.
隐私保护线性回归方案与应用
Privacy-preserving Linear Regression Scheme and Its Application
计算机科学, 2022, 49(9): 318-325. https://doi.org/10.11896/jsjkx.220300190
[4] 陈晶, 吴玲玲.
多源异构环境下的车联网大数据混合属性特征检测方法
Mixed Attribute Feature Detection Method of Internet of Vehicles Big Datain Multi-source Heterogeneous Environment
计算机科学, 2022, 49(8): 108-112. https://doi.org/10.11896/jsjkx.220300273
[5] 王健.
基于隐私保护的反向传播神经网络学习算法
Back-propagation Neural Network Learning Algorithm Based on Privacy Preserving
计算机科学, 2022, 49(6A): 575-580. https://doi.org/10.11896/jsjkx.211100155
[6] 李利, 何欣, 韩志杰.
群智感知的隐私保护研究综述
Review of Privacy-preserving Mechanisms in Crowdsensing
计算机科学, 2022, 49(5): 303-310. https://doi.org/10.11896/jsjkx.210400077
[7] 宋涛, 李秀华, 李辉, 文俊浩, 熊庆宇, 陈杰.
大数据时代下车联网安全加密认证技术研究综述
Overview of Research on Security Encryption Authentication Technology of IoV in Big Data Era
计算机科学, 2022, 49(4): 340-353. https://doi.org/10.11896/jsjkx.210400112
[8] 王美珊, 姚兰, 高福祥, 徐军灿.
面向医疗集值数据的差分隐私保护技术研究
Study on Differential Privacy Protection for Medical Set-Valued Data
计算机科学, 2022, 49(4): 362-368. https://doi.org/10.11896/jsjkx.210300032
[9] 张振超, 刘亚丽, 殷新春.
适用于物联网环境的无证书广义签密方案
New Certificateless Generalized Signcryption Scheme for Internet of Things Environment
计算机科学, 2022, 49(3): 329-337. https://doi.org/10.11896/jsjkx.201200256
[10] 吕由, 吴文渊.
基于同态加密的线性系统求解方案
Linear System Solving Scheme Based on Homomorphic Encryption
计算机科学, 2022, 49(3): 338-345. https://doi.org/10.11896/jsjkx.201200124
[11] 孔钰婷, 谭富祥, 赵鑫, 张正航, 白璐, 钱育蓉.
基于差分隐私的K-means算法优化研究综述
Review of K-means Algorithm Optimization Based on Differential Privacy
计算机科学, 2022, 49(2): 162-173. https://doi.org/10.11896/jsjkx.201200008
[12] 张海波, 张益峰, 刘开健.
基于NOMA-MEC的车联网任务卸载、迁移与缓存策略
Task Offloading,Migration and Caching Strategy in Internet of Vehicles Based on NOMA-MEC
计算机科学, 2022, 49(2): 304-311. https://doi.org/10.11896/jsjkx.210100157
[13] 金华, 朱靖宇, 王昌达.
视频隐私保护技术综述
Review on Video Privacy Protection
计算机科学, 2022, 49(1): 306-313. https://doi.org/10.11896/jsjkx.201200047
[14] 雷羽潇, 段玉聪.
面向跨模态隐私保护的AI治理法律技术化框架
AI Governance Oriented Legal to Technology Bridging Framework for Cross-modal Privacy Protection
计算机科学, 2021, 48(9): 9-20. https://doi.org/10.11896/jsjkx.201000011
[15] 王辉, 朱国宇, 申自浩, 刘琨, 刘沛骞.
基于用户偏好和位置分布的假位置生成方法
Dummy Location Generation Method Based on User Preference and Location Distribution
计算机科学, 2021, 48(7): 164-171. https://doi.org/10.11896/jsjkx.200800069
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!