4.5 Article

A conditional privacy-preserving and desynchronization-resistant authentication protocol for vehicular ad hoc network

期刊

JOURNAL OF SUPERCOMPUTING
卷 78, 期 16, 页码 17657-17688

出版社

SPRINGER
DOI: 10.1007/s11227-022-04562-9

关键词

Privacy; Authentication; Session key agreement; Desynchronization attack; Security; VANET

向作者/读者索取更多资源

Vehicular ad hoc network (VANET) is crucial in smart cities, but security and privacy issues during communication pose threats. Existing protocols fail to meet requirements, hence this paper proposes a new authentication protocol for VANET, addressing forward/backward secrecy and desynchronization attacks effectively.
Vehicular ad hoc network (VANET) has become an indispensable requirement in smart cities. The major applications are acquiring traffic information, vehicular surveillance, infotainment, etc. However, due to the use of unguided media, several security and privacy issues may arise during an ongoing communication. Attackers may conduct numerous passive/active attacks and cause threat to privacy, confidentiality, integrity and availability of the communication system, hence requiring a secure and efficient authentication system to address such vulnerabilities. Recently, various protocols have been proposed to address these challenges. Unfortunately, none could fulfill such requirements. In addition, the existing protocols are mostly based on public key cryptography. Thus, they may not be suitable for energy efficiency requirements of the evolving technologies such as LTE, LTE-Advanced, 5G and next-generation mobile networks. On the other hand, the security of the symmetric key-based protocols depends on a long-term shared secret key. This may introduce threat to forward/backward secrecy. In this paper, we propose a conditional privacy-preserving and desynchronization-resistant authentication protocol for VANET. The proposed protocol is appropriate with present and future generation mobile networks as it is based on symmetric key cryptography. The protocol employs an efficient approach to address forward/backward secrecy. In addition, our protocol does not require any re-synchronization between the communicating parties under desynchronization attack. We have verified the security properties using formal and informal analysis. Finally, a comparative performance analysis has been presented to show its efficiency.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据