scispace - formally typeset
Journal ArticleDOI

An Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETs

Reads0
Chats0
TLDR
In this scheme, the self-healing key distribution method with a certificateless signature in a semitrusted authority environment is combined, such that the receivers do not require to query the CRLs, thereby saving storage space and communication resources.
Abstract
With the development of intelligent transportation systems, vehicular ad hoc networks (VANETs) are widely used in safety driving, and so on. However, existing signature schemes, such as pseudonym- and group-based schemes, have certain problems, such as the need for a certificate distribution and certificate revocation lists (CRLs). With such schemes, the vehicle needs to store a valid certificate generated by the management center. Simultaneously, the receiver needs to check the CRLs prior to message authentication. CRLs require large amounts of storage space and computational and communication resources. In addition, many such schemes are built on a trusted authority and do not meet real-world needs. Thus, we propose an efficient authentication scheme based on semitrusted authority in VANETs. In this scheme, we combine the self-healing key distribution method with a certificateless signature in a semitrusted authority environment, such that the receivers do not require to query the CRLs. Therefore, the vehicles do not have to store the CRLs, thereby saving storage space and communication resources. This also reduces the computational costs and improves the efficiency of the message authentication. Since the proposed scheme is built on a semitrusted authority, it is a more realistic approach.

read more

Citations
More filters
Journal ArticleDOI

Secure and Lightweight Conditional Privacy-Preserving Authentication for Securing Traffic Emergency Messages in VANETs

TL;DR: An SSK updating algorithm is designed, which is constructed on Shamir’s secret sharing algorithm and secure pseudo random function, so that the TPDs of unrevoked vehicles can update SSK securely.
Journal ArticleDOI

On the Design of Mutual Authentication and Key Agreement Protocol in Internet of Vehicles-Enabled Intelligent Transportation System

TL;DR: In this article, the authors proposed a new mutual authentication and key agreement protocol in an IoV-enabled Intelligent Transportation System (ITS) using both formal and informal security analysis, as well as formal security verification using an automated verification tool.
Journal ArticleDOI

B-TSCA: Blockchain Assisted Trustworthiness Scalable Computation for V2I Authentication in VANETs

TL;DR: The proposed blockchain assisted trustworthiness scalable computation based V2I authentication (B-TSCA) scheme achieves rapid re-authentication of vehicles through secure ownership transfer between infrastructures through the use of blockchian technology.
Journal ArticleDOI

Black hole attack detection in vehicular ad-hoc network using secure AODV routing algorithm

TL;DR: A secure AODV routing protocol is developed for detection of black hole attack with improvements in the RREQ packet and RREP packet protocols with added security to verify the source and destination nodes.
Journal ArticleDOI

Secure Data Sharing and Customized Services for Intelligent Transportation Based on a Consortium Blockchain

TL;DR: Security analysis and performance evaluation demonstrate that the ciphertext-policy attribute-based proxy re-encryption algorithm has the function of keyword searching by dividing the key into an attribute key and a search key, which not only solves the problem that proxyReEncryption algorithm cannot retrieve data, but also realizes data sharing and data forwarding.
References
More filters

The omnet++ discrete event simulation system

TL;DR: OMNeT++ is fully programmable and modular, and it was designed from the ground up to support modeling very large networks built from reusable model components.
Book ChapterDOI

Certificateless Public Key Cryptography

TL;DR: In this article, the concept of certificateless public key cryptography (CL-PKC) was introduced and made concrete, which does not require certificates to guarantee the authenticity of public keys.
Journal Article

Certificateless public key cryptography

TL;DR: In this article, the concept of certificateless public key cryptography (CL-PKC) was introduced and made concrete, which does not require certificates to guarantee the authenticity of public keys.
Proceedings Article

SUMO - Simulation of Urban MObility An Overview

TL;DR: The current state of the SUMO package, an open source traffic simulation package including net import and demand modeling components, is described as well as future developments and extensions.
Journal ArticleDOI

Bidirectionally Coupled Network and Road Traffic Simulation for Improved IVC Analysis

TL;DR: The hybrid simulation framework Veins (Vehicles in Network Simulation), composed of the network simulator OMNeT++ and the road traffic simulator SUMO, is developed and can advance the state-of-the-art in performance evaluation of IVC and provide means to evaluate developed protocols more accurately.
Related Papers (5)