PBAS: Batch Authentication Scheme for Vehicular Ad Hoc Network using Proxy Vehicle
Keywords:
Proxy vehicle, Proxy based authentication, Privacy preservation, Vehicular ad-hoc networkAbstract
In vehicular ad-hoc networks for authentication Public Key Infrastructure (PKI) was used as Vehicular Signature application. Using PKI scheme integrity of message and identity of senders can be verified. In this scheme task of Road Side Unit (RSU) is to verify received messages one by one, and if this is the case then it is difficult to guess the identity of a vehicle by RSU i.e. from which vehicle particular message is being sent. So Proxy Based Batch Authentication Scheme is being proposed in order to reduce computational overhead of RSU in distributed computing system. In PBAS, each proxy vehicle authenticates multiple messages simultaneously using verification function at the same time, so that RSU can independently verify the outputs given by each proxy vehicles within its range.
References
Chim T.W, Yiu, S.M, Hui Li, “VSPN: VANET-Based Secure and Privacy Preserving Navigation”, IEEE Transactions on Computers, vol.63, no.2, (2014):pp.510-524
Xiaoyan Zhu, Shunrong Jiang, Liangmin Wang and Hui Li, “Efficient Privacy-Preserving Authentication for Vehicular Ad Hoc Networks”, IEEE Transactions on Vehicular Technology, vol.63, no.2,(2014): pp.907-919
Richard Gilles Engoulou, Martine Bellaïche, Samuel Pierre, Alejandro Quintero “VANET security surveys”, in Computer Communications, vol.44, no.4,(2014): pp 1–13
Lamba S; Sharma M., “An Efficient Elliptic Curve Digital Signature Algorithm (ECDSA)”, International Conference on Machine Intelligence and Research Advancement (ICMIRA), (2013): pp.179-183
Wasef, A.; Xuemin Shen, “EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks”, IEEE Transactions on Mobile Computing, vol.12, no.1,(2013): pp.78-89
Xiaodong Lin; Xu Li, “Achieving Efficient Cooperative Message Authentication in Vehicular Ad Hoc Networks”, IEEE Transactions on Vehicular Technology, vol.62, no.7, (2013):pp.3339-3348
Shi-Jinn Horng; Shiang-Feng Tzeng; Yi Pan; Pingzhi Fan; Xian Wang; Tianrui Li; Khan, M.K., “ b-SPECS+: Batch Verification for Secure Pseudonymous Authentication in VANET ”, IEEE Transactions on Information Forensics and Security, vol.8, no.11,(2013): pp.1860-1875
IEEE Standard for “Wireless Access in Vehicular Environments Security Services for Applications and Management Messages”, on IEEE Std 1609.2-2013 (Revision of IEEE Std 1609.2-2006) , (2013):pp.1-289
Rongxing Lu; Xiaodong Lin; Zhiguo Shi; Shen, X.S., “A Lightweight Conditional Privacy-Preservation Protocol for Vehicular Traffic-Monitoring Systems” IEEE in Intelligent Systems , vol.28, no.3(2013): pp.62-65
Dietzel, S.; Petit, J.; Heijenk, G.; Kargl, F., “ Graph-Based Metrics for Insider Attack Detection in VANET Multihop Data Dissemination Protocols”, IEEE Transactions on Vehicular Technology, vol.62, no.4,(2013): pp.1505-1518
Xiaojun Li; Liangmin Wang, “A Rapid Certification Protocol from Bilinear Pairings for Vehicular Ad Hoc Networks” in Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on , (2012):pp.890-895
Rongxing Lu; Xiaodong Li; Luan, T.H.; Xiaohui Liang; Xuemin Shen, “ Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs” , IEEE Transactions on Vehicular Technology , vol.61, no.1,( 2012): pp.86-96
Kyung-Ah Shim, “ CPAS : An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks”, IEEE Transactions on Vehicular Technology, vol.61, no.4, (2012):pp.1874-1883
Jiun-Long Huang; Lo-Yao Yeh; Hung-Yu Chien, “ ABAKA: An Anonymous Batch Authenticated and Key Agreement Scheme for Value-Added Services in Vehicular Ad Hoc Networks”, in Vehicular Technology, IEEE Transactions on , vol.60, no.1, pp.248-262, Jan. 2011
Lingbo Wei; Jianwei Liu; Tingge Zhu, “ On a Group Signature Scheme Supporting Batch Verification for Vehicular Networks”, in Multimedia Information Networking and Security (MINES), 2011 Third International Conference on ,( 2011):pp.436-440
T. W. Chim, S. M. Yiu, C. K. Hui, and O. K. Li, “SPECS: Secure and privacy enhancing communications schemes for VANETs”, Ad Hoc Networks, vol.9, Issue.2,(2011): pp.189-203
Isaac, J.T.; Zeadally, S.; Camara, J.S., “Security attacks and solutions for vehicular ad hoc networks”, IEEE Transaction in Communications, vol.4, no.7,(2010):pp.894-903
Yipin Sun; Rongxing Lu; Xiaodong Lin; Xuemin Shen; Jinshu Su, “An Efficient Pseudonymous Authentication Scheme With Strong Privacy Preservation for Vehicular Communications”, IEEE Transactions on Vehicular Technology, vol.59, no.7, (2010):pp.3589-3603
Ghassan Samara, Wafaa A. H. Al-Salihy, R. Sures., ”Security analysis of vehicular ad hoc networks (VANET)”, in IEEE Conf. Network Applications Protocols and Services (NETAPPS), (2010):pp.55-60
Wasef, A.; Rongxing Lu; Xiaodong Lin; Xuemin Shen, “Complementing public key infrastructure to secure vehicular ad hoc networks [Security and Privacy in Emerging Wireless Networks]” , IEEE Transaction on Wireless Communications, vol.17, no.5,( 2010): pp.22-28
Wasef, A.; Yixin Jiang; Xuemin Shen, ”DCS: An Efficient Distributed-Certificate-Service Scheme for Vehicular Networks” IEEE Transactions on Vehicular Technology, vol.59, no.2,(2010): pp.533-549
C. Zhang; R. Lu; X. Lin; P. Ho; X. Shen., “An efficient identity-based batch verification scheme for vehicular sensor networks”, IEEE INFOCOM in Proc.,(2008):pp. 246-250
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
