Efficient Anonymous Data Authentication for Vehicular Ad Hoc Networks
Vehicular ad hoc network (VANET) encounters a critical challenge of efficiently and securely authenticating massive on-road data while preserving the anonymity and traceability of vehicles. This paper designs a new anonymous authentication approach by using an attribute-based signature. Each vehicle...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2021-01-01
|
Series: | Security and Communication Networks |
Online Access: | http://dx.doi.org/10.1155/2021/6638453 |
id |
doaj-5a4501731fe24921bd610fd138e93b11 |
---|---|
record_format |
Article |
spelling |
doaj-5a4501731fe24921bd610fd138e93b112021-03-08T02:01:20ZengHindawi-WileySecurity and Communication Networks1939-01222021-01-01202110.1155/2021/6638453Efficient Anonymous Data Authentication for Vehicular Ad Hoc NetworksPing Yu0Wei Ni1Guangsheng Yu2Hua Zhang3Ren Ping Liu4Qiaoyan Wen5State Key Laboratory of Networking and Switching TechnologyCSIROGlobal Big Data Technologies CentreState Key Laboratory of Networking and Switching TechnologyGlobal Big Data Technologies CentreState Key Laboratory of Networking and Switching TechnologyVehicular ad hoc network (VANET) encounters a critical challenge of efficiently and securely authenticating massive on-road data while preserving the anonymity and traceability of vehicles. This paper designs a new anonymous authentication approach by using an attribute-based signature. Each vehicle is defined by using a set of attributes, and each message is signed with multiple attributes, enabling the anonymity of vehicles. First, a batch verification algorithm is developed to accelerate the verification processes of a massive volume of messages in large-scale VANETs. Second, replicate messages captured by different vehicles and signed under different sets of attributes can be dereplicated with the traceability of all the signers preserved. Third, the malicious vehicles forging data can be traced from their signatures and revoked from attribute groups. The security aspects of the proposed approach are also analyzed by proving the anonymity of vehicles and the unforgeability of signatures. The efficiency of the proposed approach is numerically verified, as compared to the state of the art.http://dx.doi.org/10.1155/2021/6638453 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Ping Yu Wei Ni Guangsheng Yu Hua Zhang Ren Ping Liu Qiaoyan Wen |
spellingShingle |
Ping Yu Wei Ni Guangsheng Yu Hua Zhang Ren Ping Liu Qiaoyan Wen Efficient Anonymous Data Authentication for Vehicular Ad Hoc Networks Security and Communication Networks |
author_facet |
Ping Yu Wei Ni Guangsheng Yu Hua Zhang Ren Ping Liu Qiaoyan Wen |
author_sort |
Ping Yu |
title |
Efficient Anonymous Data Authentication for Vehicular Ad Hoc Networks |
title_short |
Efficient Anonymous Data Authentication for Vehicular Ad Hoc Networks |
title_full |
Efficient Anonymous Data Authentication for Vehicular Ad Hoc Networks |
title_fullStr |
Efficient Anonymous Data Authentication for Vehicular Ad Hoc Networks |
title_full_unstemmed |
Efficient Anonymous Data Authentication for Vehicular Ad Hoc Networks |
title_sort |
efficient anonymous data authentication for vehicular ad hoc networks |
publisher |
Hindawi-Wiley |
series |
Security and Communication Networks |
issn |
1939-0122 |
publishDate |
2021-01-01 |
description |
Vehicular ad hoc network (VANET) encounters a critical challenge of efficiently and securely authenticating massive on-road data while preserving the anonymity and traceability of vehicles. This paper designs a new anonymous authentication approach by using an attribute-based signature. Each vehicle is defined by using a set of attributes, and each message is signed with multiple attributes, enabling the anonymity of vehicles. First, a batch verification algorithm is developed to accelerate the verification processes of a massive volume of messages in large-scale VANETs. Second, replicate messages captured by different vehicles and signed under different sets of attributes can be dereplicated with the traceability of all the signers preserved. Third, the malicious vehicles forging data can be traced from their signatures and revoked from attribute groups. The security aspects of the proposed approach are also analyzed by proving the anonymity of vehicles and the unforgeability of signatures. The efficiency of the proposed approach is numerically verified, as compared to the state of the art. |
url |
http://dx.doi.org/10.1155/2021/6638453 |
work_keys_str_mv |
AT pingyu efficientanonymousdataauthenticationforvehicularadhocnetworks AT weini efficientanonymousdataauthenticationforvehicularadhocnetworks AT guangshengyu efficientanonymousdataauthenticationforvehicularadhocnetworks AT huazhang efficientanonymousdataauthenticationforvehicularadhocnetworks AT renpingliu efficientanonymousdataauthenticationforvehicularadhocnetworks AT qiaoyanwen efficientanonymousdataauthenticationforvehicularadhocnetworks |
_version_ |
1714797248918847488 |