4.8 Article

An Extensible and Effective Anonymous Batch Authentication Scheme for Smart Vehicular Networks

期刊

IEEE INTERNET OF THINGS JOURNAL
卷 7, 期 4, 页码 3462-3473

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2020.2970092

关键词

Certificate revocation list (CRL); conditional privacy protection; Industrial Internet of Things (IIoT); pseudonym authentication; smart vehicular networks

资金

  1. National Natural Science Foundation of China [6191101332, 61872001, U1936220, 61702005]
  2. Open Fund of Key Laboratory of Embedded System and Service Computing (Tongji University), Ministry of Education [ESSCKF2018-03]
  3. Open Fund for Discipline Construction, Institute of Physical Science and Information Technology, Anhui University
  4. Excellent Talent Project of Anhui University

向作者/读者索取更多资源

In recent years, research on the security of Industry 4.0 and the Internet of Things (IoT) has attracted a close attention from industry, government, and the scientific community. Smart vehicular networks, as a type of industrial IoT, inevitably exchange large amounts of security and privacy-sensitive data, which make them attractive targets for attackers. For protecting network security and privacy, we have proposed an extensible and effective anonymous batch authentication scheme. In contrast to traditional pseudonym authentication schemes, the same system private key need not to be preloaded in our scheme, effectively avoiding a system failure when destroying a vehicle. Besides, the certificate revocation list (CRL) size is merely related to the number of vehicles that have been revoked, regardless of the number of pseudonym certificates for revoked vehicles. Moreover, this scheme maintains the effectiveness of the traditional scheme, effectively reduces the scale of the CRL, and employs an identity revocation scheme that supports rapid distribution. The scheme supports conditional privacy protection, namely, only the trusted authority (TA) can uniquely trace and revoke vehicles. For illegal vehicles, the TA releases the two hashed seeds to facilitate traceability by all entities in its domain. Furthermore, security analysis indicates that our solution is secure under the random oracle model and fulfills a series of security requirements of vehicular networks. Compared to existing authentication schemes, performance evaluations show that the scheme offers relatively good performance in terms of time consumption.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据