Journal
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
Volume 18, Issue 2, Pages 722-735Publisher
IEEE COMPUTER SOC
DOI: 10.1109/TDSC.2019.2904274
Keywords
Authentication; Servers; Protocols; Privacy; Cathode ray tubes; Ad hoc networks; Vehicular Ad-hoc networks (VANETs); chinese remainder theorem (CRT); authentication; conditional privacy-preserving; elliptic curve
Categories
Funding
- National Natural Science Foundation of China [61872001, 61572001, 61702005]
- Open Fund of Key Laboratory of Embedded System and Service Computing (Tongji University), Ministry of Education [ESSCKF2018-03]
- Open Fund for Discipline Construction, Institute of Physical Science and Information Technology, Anhui University
- Excellent Talent Project of Anhui University
Ask authors/readers for more resources
The proposed conditional privacy-preserving authentication scheme based on Chinese remainder theorem aims to address the challenge of fast authentication in Vehicular Ad-hoc Networks. By using realistic TPDs, the scheme enhances the security of the entire system.
Existing security and identity-based vehicular communication protocols used in Vehicular Ad-hoc Networks (VANETs) to achieve conditional privacy-preserving mostly rely on an ideal hardware device called tamper-proof device (TPD) equipped in vehicles. Achieving fast authentication during the message verification process is usually challenging in such strategies and further they suffer performance constraints from resulting overheads. To address such challenges, this paper proposes a novel Chinese remainder theorem (CRT)-based conditional privacy-preserving authentication scheme for securing vehicular authentication. The proposed protocol only requires realistic TPDs, and eliminates the need for pre-loading the master key onto the vehicle's TPDs. Chinese remainder theorem can dynamically assist the trusted authorities (TAs) whilst generating and broadcasting new group keys to the vehicles in the network. The proposed scheme solves the leakage problem during side channel attacks, and ensures higher level of security for the entire system. In addition, the proposed scheme avoids using the bilinear pairing operation and map-to-point hash operation during the authentication process, which helps achieving faster verification even under increasing number of signature. Moreover, the security analysis shows that our proposed scheme is secure under the random oracle model and the performance analysis shows that our proposed scheme is efficient in reducing computation and communication overheads.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available