Table of Contents Author Guidelines Submit a Manuscript
Mobile Information Systems
Volume 2018, Article ID 4070283, 11 pages
https://doi.org/10.1155/2018/4070283
Research Article

An Efficient V2I Authentication Scheme for VANETs

1College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
2College of Computer Science, Chongqing University, Chongqing 400044, China
3School of Cyber Security and Information Law, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
4School of Electronic Engineering, Dublin City University, Dublin, Ireland

Correspondence should be addressed to Shaojiang Deng; nc.ude.uqc@gned_js

Received 27 July 2017; Revised 13 November 2017; Accepted 4 December 2017; Published 1 March 2018

Academic Editor: María Calderon

Copyright © 2018 Yousheng Zhou et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. C. K. Toh, Ad Hoc Mobile Wireless Networks: Protocols and Systems, Pearson Education, London, UK, 2001.
  2. S. Biswas, J. Mišić, and V. Mišić, “DDoS attack on WAVE-enabled VANET through synchronization,” in Proceedings of the Global Communications Conference (GLOBECOM), pp. 1079–1084, Anaheim, CA, USA, December 2012.
  3. H. Oh, C. Yae, D. Ahn, and H. Cho, “5.8 GHz DSRC packet communication system for ITS services,” in Proceedings of the Vehicular Technology Conference, pp. 2223–2227, Amsterdam, The Netherlands, September 1999.
  4. Y. Wang, H. Zhong, Y. Xu, and J. Cui, “ECPB: efficient conditional privacy-preserving authentication scheme supporting batch verification for VANETs,” International Journal of Network Security, vol. 18, no. 2, pp. 374–382, 2016. View at Google Scholar
  5. Z. Wang, “A privacy-preserving and accountable authentication protocol for IoT end-devices with weaker identity,” Future Generation Computer Systems, 2017, in press. View at Publisher · View at Google Scholar
  6. J. Shen, S. Chang, J. Shen, Q. Liu, and X. Sun, “A lightweight multi-layer authentication protocol for wireless body area networks,” Future Generation Computer Systems, vol. 78, no. 3, pp. 956–963, 2016. View at Publisher · View at Google Scholar · View at Scopus
  7. C. C. Lee and Y. M. Lai, “Toward a secure batch verification with group testing for VANET,” Wireless Networks, vol. 19, no. 6, pp. 1441–1449, 2013. View at Publisher · View at Google Scholar · View at Scopus
  8. M. Bayat, M. Barmshoory, M. Rahimi, and M. R. Aref, “A secure authentication scheme for VANETs with batch verification,” Wireless Networks, vol. 21, no. 5, pp. 1733–1743, 2015. View at Publisher · View at Google Scholar · View at Scopus
  9. S. Wang and N. Yao, “LIAP: a local identity-based anonymous message authentication protocol in VANETs,” Computer Communications, vol. 112, pp. 154–164, 2017. View at Publisher · View at Google Scholar · View at Scopus
  10. S. Jiang, X. Zhu, and L. Wang, “An efficient anonymous batch authentication scheme based on HMAC for VANETs,” IEEE Transactions on Intelligent Transportation Systems, vol. 17, no. 8, pp. 2193–2204, 2016. View at Publisher · View at Google Scholar · View at Scopus
  11. M. Azees, P. Vijayakumar, and L. J. Deboarh, “EAAP: efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad hoc networks,” IEEE Transactions on Intelligent Transportation Systems, vol. 18, no. 9, pp. 2467–2476, 2017. View at Publisher · View at Google Scholar · View at Scopus
  12. J. Cui, J. Zhang, H. Zhong, and Y. Xu, “SPACF: a secure privacy-preserving authentication scheme for VANET with cuckoo filter,” IEEE Transactions on Vehicular Technology, vol. 66, no. 11, pp. 10283–10295, 2017. View at Publisher · View at Google Scholar · View at Scopus
  13. Y. Xie, L. B. Wu, J. Shen, and A. Alelaiwi, “EIAS-CP: new efficient identity-based authentication scheme with conditional privacy-preserving for VANETs,” Telecommunication Systems, vol. 65, no. 2, pp. 229–240, 2017. View at Publisher · View at Google Scholar · View at Scopus
  14. N. W. Lo and J. L. Tsai, “An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings,” IEEE Transactions on Intelligent Transportation Systems, vol. 17, no. 5, pp. 1319–1328, 2016. View at Publisher · View at Google Scholar · View at Scopus
  15. D. He, S. Zeadally, B. Xu, and X. Huang, “An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 12, pp. 2681–2691, 2015. View at Publisher · View at Google Scholar · View at Scopus
  16. Y. Dodis, J. Katz, S. Xu, and M. Yung, “Key-insulated public key cryptosystems,” in Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, pp. 65–82, April-May 2002.
  17. Y. Dodis, J. Katz, S. Xu, and M. Yung, “Strong key-insulated signature schemes,” in Proceedings of the International Workshop on Public Key Cryptography, pp. 130–144, January 2003.
  18. N. Gonzlez-Deleito, O. Markowitch, and E. Dall’Olio, “A new key-insulated signature scheme,” in Proceedings of the International Conference on Information and Communications Security, pp. 465–479, Malaga, Spain, October 2004.
  19. Z. Le, Y. Ouyang, J. Ford, and F. Makedon, “A hierarchical key-insulated signature scheme in the CA trust model,” in Proceedings of the International Conference on Information Security, pp. 280–291, September 2004.
  20. G. Hanaoka, Y. Hanaoka, and H. Imai, “Parallel key-insulated public key encryption,” in Proceedings of the International Workshop on Public Key Cryptography, pp. 105–122, April 2006.
  21. D. H. Yum and P. J. Lee, “Efficient key updating signature schemes based on IBS,” in Proceedings of the IMA International Conference on Cryptography and Coding, pp. 167–182, Cirencester, UK, December 2003.
  22. J. Weng, S. Liu, K. Chen, and X. Li, “Identity-based key-insulated signature with secure key-updates,” in Proceedings of the International Conference on Information Security and Cryptology, pp. 13–26, Beijing, China, November-December 2006.
  23. Y. Zhou, Z. Cao, and Z. Chai, “Identity based key insulated signature,” in Proceedings of the International Conference on Information Security Practice and Experience, pp. 226–234, Hangzhou, China, April 2006.
  24. Z. Wan, J. Li, and X. Hong, “Parallel key-insulated signature scheme without random oracles,” Journal of Communications and Networks, vol. 15, no. 3, pp. 252–257, 2013. View at Publisher · View at Google Scholar · View at Scopus
  25. H. Zhao, J. Yu, S. Duan, X. Cheng, and R. Hao, “Key-insulated aggregate signature,” Frontiers of Computer Science, vol. 8, no. 5, pp. 837–846, 2014. View at Publisher · View at Google Scholar · View at Scopus
  26. J. Weng, X. Li, K. Chen, and S. L. Liu, “Identity-based parallel key-insulated signature without random oracles,” Journal of Information Science and Engineering, vol. 24, no. 4, pp. 1143–1157, 2008. View at Google Scholar
  27. J. Chen, W. Wang, and K. Yu, “Attribute-based threshold key-insulated signature,” Revista Tecnica de la Facultad de Ingenieria Universidad del Zulia, vol. 39, no. 5, pp. 378–386, 2016. View at Google Scholar
  28. C. Zhou, Z. Zhao, W. Zhou, and Y. Mei, “Certificateless key-insulated generalized signcryption scheme without bilinear pairings,” Security and Communication Networks, vol. 2017, Article ID 8405879, 17 pages, 2017. View at Publisher · View at Google Scholar
  29. H. Hong, Y. Xia, and Z. Sun, “Provably secure key insulated attribute based signature without bilinear pairings for wireless communications,” DEStech Transactions on Computer Science and Engineering, 2016. View at Publisher · View at Google Scholar
  30. H. Kun, D. Xuefeng, and L. Jing, “ID-based key-insulated encryption with message linkages for peer-to-peer network,” Computer Engineering, vol. 40, no. 4, pp. 124–129, 2014. View at Google Scholar
  31. Y. Shi, J. Lin, G. Xiong, X. Wang, and H. Fan, “Key-insulated undetachable digital signature scheme and solution for secure mobile agents in electronic commerce,” Mobile Information Systems, vol. 2016, Article ID 437507, 18 pages, 2016. View at Publisher · View at Google Scholar · View at Scopus
  32. V. Kumar and R. Kumar, “An optimal authentication protocol using certificateless ID-based signature in MANET,” in Proceedings of the International Symposium on Security in Computing and Communication, pp. 110–121, Kochi, India, August 2015.
  33. Y. Park, C. Sur, C. D. Jung, and K. H. Rhee, “Efficient anonymous authentication protocol using key-insulated signature scheme for secure VANET,” in Proceedings of the International Conference on Mobile Lightweight Wireless Systems, pp. 35–44, Athens, Greece, May 2009.
  34. P. Manzoni, C. T. Calafate, and J. C. Cano, Encyclopedia of Information Science and Technology, Information Resources Management Association, New York, NY, USA, 2nd edition, 2009.
  35. M. Bellare and P. Rogaway, “Optimal asymmetric encryption,” in Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques, pp. 92–111, Perugia, Italy, May 1994.
  36. D. Pointcheval and J. Stern, “Security proofs for signature schemes,” in Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, pp. 387–398, Saragossa, Spain, May 1996.
  37. E. Okamoto, N. Kanayama, A. Kanaoka, F. Rodrguez-Henrquez, and T. Teruya, “TEPLA (University of Tsukuba Elliptic Curve and Pairing Library) manual,” January 2013, http://www.cipher.risk.tsukuba.ac.jp/tepla/install_e.html. View at Google Scholar
  38. OpenSSL Management Committee, “Cryptography and SSL/TLS toolkit,” January 2017, https://www.openssl.org/. View at Google Scholar