Efficient Anonymous Data Authentication for Vehicular Ad Hoc Networks

Vehicular ad hoc network (VANET) encounters a critical challenge of efficiently and securely authenticating massive on-road data while preserving the anonymity and traceability of vehicles. This paper designs a new anonymous authentication approach by using an attribute-based signature. Each vehicle...

Full description

Bibliographic Details
Main Authors: Ping Yu, Wei Ni, Guangsheng Yu, Hua Zhang, Ren Ping Liu, Qiaoyan Wen
Format: Article
Language:English
Published: Hindawi-Wiley 2021-01-01
Series:Security and Communication Networks
Online Access:http://dx.doi.org/10.1155/2021/6638453
id doaj-5a4501731fe24921bd610fd138e93b11
record_format Article
spelling doaj-5a4501731fe24921bd610fd138e93b112021-03-08T02:01:20ZengHindawi-WileySecurity and Communication Networks1939-01222021-01-01202110.1155/2021/6638453Efficient Anonymous Data Authentication for Vehicular Ad Hoc NetworksPing Yu0Wei Ni1Guangsheng Yu2Hua Zhang3Ren Ping Liu4Qiaoyan Wen5State Key Laboratory of Networking and Switching TechnologyCSIROGlobal Big Data Technologies CentreState Key Laboratory of Networking and Switching TechnologyGlobal Big Data Technologies CentreState Key Laboratory of Networking and Switching TechnologyVehicular ad hoc network (VANET) encounters a critical challenge of efficiently and securely authenticating massive on-road data while preserving the anonymity and traceability of vehicles. This paper designs a new anonymous authentication approach by using an attribute-based signature. Each vehicle is defined by using a set of attributes, and each message is signed with multiple attributes, enabling the anonymity of vehicles. First, a batch verification algorithm is developed to accelerate the verification processes of a massive volume of messages in large-scale VANETs. Second, replicate messages captured by different vehicles and signed under different sets of attributes can be dereplicated with the traceability of all the signers preserved. Third, the malicious vehicles forging data can be traced from their signatures and revoked from attribute groups. The security aspects of the proposed approach are also analyzed by proving the anonymity of vehicles and the unforgeability of signatures. The efficiency of the proposed approach is numerically verified, as compared to the state of the art.http://dx.doi.org/10.1155/2021/6638453
collection DOAJ
language English
format Article
sources DOAJ
author Ping Yu
Wei Ni
Guangsheng Yu
Hua Zhang
Ren Ping Liu
Qiaoyan Wen
spellingShingle Ping Yu
Wei Ni
Guangsheng Yu
Hua Zhang
Ren Ping Liu
Qiaoyan Wen
Efficient Anonymous Data Authentication for Vehicular Ad Hoc Networks
Security and Communication Networks
author_facet Ping Yu
Wei Ni
Guangsheng Yu
Hua Zhang
Ren Ping Liu
Qiaoyan Wen
author_sort Ping Yu
title Efficient Anonymous Data Authentication for Vehicular Ad Hoc Networks
title_short Efficient Anonymous Data Authentication for Vehicular Ad Hoc Networks
title_full Efficient Anonymous Data Authentication for Vehicular Ad Hoc Networks
title_fullStr Efficient Anonymous Data Authentication for Vehicular Ad Hoc Networks
title_full_unstemmed Efficient Anonymous Data Authentication for Vehicular Ad Hoc Networks
title_sort efficient anonymous data authentication for vehicular ad hoc networks
publisher Hindawi-Wiley
series Security and Communication Networks
issn 1939-0122
publishDate 2021-01-01
description Vehicular ad hoc network (VANET) encounters a critical challenge of efficiently and securely authenticating massive on-road data while preserving the anonymity and traceability of vehicles. This paper designs a new anonymous authentication approach by using an attribute-based signature. Each vehicle is defined by using a set of attributes, and each message is signed with multiple attributes, enabling the anonymity of vehicles. First, a batch verification algorithm is developed to accelerate the verification processes of a massive volume of messages in large-scale VANETs. Second, replicate messages captured by different vehicles and signed under different sets of attributes can be dereplicated with the traceability of all the signers preserved. Third, the malicious vehicles forging data can be traced from their signatures and revoked from attribute groups. The security aspects of the proposed approach are also analyzed by proving the anonymity of vehicles and the unforgeability of signatures. The efficiency of the proposed approach is numerically verified, as compared to the state of the art.
url http://dx.doi.org/10.1155/2021/6638453
work_keys_str_mv AT pingyu efficientanonymousdataauthenticationforvehicularadhocnetworks
AT weini efficientanonymousdataauthenticationforvehicularadhocnetworks
AT guangshengyu efficientanonymousdataauthenticationforvehicularadhocnetworks
AT huazhang efficientanonymousdataauthenticationforvehicularadhocnetworks
AT renpingliu efficientanonymousdataauthenticationforvehicularadhocnetworks
AT qiaoyanwen efficientanonymousdataauthenticationforvehicularadhocnetworks
_version_ 1714797248918847488