Computer Science ›› 2013, Vol. 40 ›› Issue (9): 152-155.

Previous Articles     Next Articles

Certificateless Anonymous Authentication Protocol for Vehicle Ad-hoc Network

XU Jun-feng,DING Xue-feng,SI Cheng-xiang and ZHANG Wei   

  • Online:2018-11-16 Published:2018-11-16

Abstract: Vehicular Ad-hoc networks (VANET)have acquired more and more applications in dealing the aggravating traffic problems all over world.And their security is receiving increasing attention.Based on discrete logarithm problem,a certificateless secure vehicle-to-roadside anonymous authentication protocol was proposed.The proposed protocol combines the advantages of the protocol based on traditional public key cryptosystem (no key escrow)and that based on ID-PKC(implicit authentication).Compared with the protocol at the same security level,the efficiency of the proposed approach is much more efficient.So it is more appropriate for VANET.

Key words: Vehicular ad-hoc network,Implicit authentication,Anonymous authentication

[1] Raya M,Hubaux J P.Securing Vehicular Ad Hoc Networks[J].Journal of Computer Security,Special Issue on Security of Ad Hoc and Sensor Networks,2007,15(1):39-68
[2] Misener J A.Vehicle- infrastructure integration(VII)[J].Intellimotion,2005,11(2):1-3
[3] Lin X,Sun X,Ho P-H,et al.GSIS:A Secure and Privacy-Preserving Protocol for Vehicular Communications[J].IEEE Transactions on Vehicular Technology,2007,56(6):3442-3456
[4] Lin X,Lu R,Zhang C,et al.Security in Vehicular Ad Hoc Networks[J].IEEE Communications Magazine,2008,46(4):88-95
[5] Lin X,Sun X,Wang X,et al.TSVC:Timed Efficient and Secure Vehicular Communications with Privacy Preserving[J].IEEE Transactions on Wireless Communications,2008,7(12):4987-4998
[6] Lu R,Lin X,Zhu H,et al.ECPP:Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications[A]∥The 27th IEEE International Conference on Computer Communications,2008[C].Phoenix,Arizona,USA:Springer-Verlag,2008:15-17
[7] Zhang C,Lin X,Lu R,et al.RAISE:An Efficient RSU-aided Message Authentication Scheme in Vehicular Communication Networks[A]∥IEEE International Conference on Communications (ICC’08),2008[C].Beijing,China:Springer-Verlag,2008:19-23
[8] Zhang C,Lin X,Lu R,et al.An Efficient Message Authentication Scheme for Vehicular Communications[J].IEEE Transactions on Vehicular Technology,2008,57(6):3357-3368
[9] Xi Y,Sha K,Shi W,et al.Enforcing Privacy Using Symmetric Random Key-Set in Vehicular Networks[A]∥Eighth International Symposium on Autonomous Decentralized Systems (ISADS’07),2007[C].New york:Springer-Verlag,2007:344-351
[10] Mak T K,Laberteaux K P,Sengupta R.A Multi-Channel VANET Providing Concurrent Safety and Commercial Services[A]∥Proceedings of 2nd ACM International Workshop on Vehicular Ad Hoc Networks,2005[C].Cologne,Germany:Sringer-Verlag,2005:1-9
[11] Raya M,Hubaux J P.The security of vehicular ad hoc networks[A]∥3rd ACM workshop on Security of ad hoc and sensor networks,2005[C].New York:Springer-Verlag,2005:11-21
[12] Xu Q,Mak T,Ko J,et al.Medium Access Control Protocol Design for Vehicle-Vehicle Safety Messages[J].IEEE Transactions on Vehicular Technology,2007,56(2):499-518
[13] Hubaux J P,Capkun S,Jun L.The Security and Privacy ofSmart Vehicles[J].IEEE Security and Privacy Magazine,2004,2(3):49-55
[14] Xiong Hu,Qin Zhi-guang,Li Fa-gen.Secure Vehicle-to-roadside Communication Protocol Using Certificate-based Cryptosystem [J].IETE Technical Review,2010,27(3):214-219
[15] Shamus Software Ltd.,Miracl library.http://www.sha- mus.ie/index.php?page=home
[16] Ren K, Lou W,Zeng K,et al.On broadcast authentication in wireless sensornetworks[J].IEEE Trans.on Wireless Commun.,2007,6(11):4136-4144
[17] Boneh D,Franklin M.Identity-based encryption from the Weilpairing[A]∥CRYPTO 2001,1[C].New York:Springer-Verlag,2001:213-229
[18] Barreto P,Kim H,Bynn B,et al.Efficient algorithms for pairing-based cryptosystems[A]∥CRYPTO 2002,2002[C].New York:Springer-Verlag,2002:354-368
[19] Bao F,Deng R H,Zhu H.Variations of Diffie-Hellman problem[A]∥Proc.ICS,2003[C].New York:Springer-Verlag,2003:301-312

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!