| Literature DB >> 29324719 |
Congcong Li1, Xi Zhang2, Haiping Wang3, Dongfeng Li4.
Abstract
Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes.Entities:
Keywords: authentication; certificateless; identity-based; vehicular sensor network (VSN)
Year: 2018 PMID: 29324719 PMCID: PMC5796306 DOI: 10.3390/s18010194
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Network architecture on the main roadways.
Figure 2Network architecture in a desolate environment.
List of notations.
| Symbol | Descriptions | Symbol | Descriptions |
|---|---|---|---|
| RSU | A roadside unit | A secret key of a user | |
| TA | A Trusted Authority | The partial secret keys of a user issued by the PKG | |
| PKG | A Private Key Generator | A public key of a user | |
| A k-bit prime number | A public key of users issued by the PKG | ||
| A finite field with | A private key of the TA | ||
| An Elliptic Curve over a finite field | A private key of the PKG | ||
| A secret number in a smart card | The password of the smart card | ||
| An additive group with the order | A public key of the TA | ||
| The order of the group | A public key of the PKG | ||
| The point generator of the group | A timestamp | ||
| The pseudo identity of a user | Exclusive-OR operation | ||
| The real identity of a user | Message concatenation operation |
Figure 3The vehicle to RSU (vehicle) registration process.
Figure 4The vehicle to RSU (vehicle) authentication process.
Figure 5The RSU to vehicle (RSU) authentication process.
Figure 6Comparison of two different schemes.
Figure 7Freshness of timestamp and coordinates.
Security Comparisons of Related Schemes and Our Scheme.
| The Types of Attacks | Calandriello ’s Scheme | Shim’s Scheme | Lo’s Scheme | Our Scheme |
|---|---|---|---|---|
| Traceability | No | YES | YES | YES |
| Unlinkability | YES | YES | YES | YES |
| Resistance to impersonation attack | YES | YES | YES | YES |
| Resistance to node replication attack | No | No | No | YES |
| Resistance to node compromise attack | No | No | No | YES |
| Resistance against replay attack | No | YES | YES | YES |
Execution Time of Different Operations.
| Operation | Execution Time (Microsecond) |
|---|---|
| 2000 | |
| 4.398 | |
| 6.552 | |
| 2.294 | |
| 11.072 a | |
| 3460 | |
| 7634 |
a 2.649 × 4 + 0.1584 × 2 + 0.0272 × 4 + 0.0486 = 11.072 μs.
Comparisons of the execution time of five schemes.
| Method | Signing a Single Message (μs) | Verify a Single Message (μs) | Verify |
|---|---|---|---|
| Giorgio’s scheme | |||
| Shim’s scheme | |||
| Lo’s scheme | |||
| Horng’s scheme | |||
| Our scheme | Vehicle: | ||
| RSU: |
a is the number of messages.
Figure 8Comparison of execution time for the batch verification.
Communication costs of the proposed scheme.
| Timestamp | - | ||||||||
| 256 | 512 | 512 | 256 | 512 | 256 | 32 | 32 | - | |
| Timestamp | |||||||||
| 32 | 256 | 512 | 512 | 256 | 512 | 32 | 32 | 256 |
Comparison of communication costs.
| Method | Communication Overhead | After Reduction (byte) |
|---|---|---|
| 512 + 512 + 32 + 256 + 32 + 512 + 512 + 512 = 2880 bits = 360 bytes | 232 | |
| 512 + 512 + 32 + 256 + 32 + 512 + 512 + 256 = 2624 bits = 328 bytes | 232 | |
| 512 + 512 + 512 + 256 + 512 = 2304 bits = 288 bytes | 224 | |
| For a vehicle: 296 bytes | 200 | |
| For a RSU: 300 bytes | 204 |
Figure 9Comparison of the communication overhead.