| Literature DB >> 29735941 |
Jie Cui1,2, Wenyu Xu3,4, Hong Zhong5,6, Jing Zhang7,8, Yan Xu9,10, Lu Liu11.
Abstract
The Internet of Vehicles (IoV) plays an important role in smart transportation to reduce the drivers’s risk of having an accident and help them manage small emergencies. Therefore, security and privacy issues of the message in the tamper proof device (TPD) broadcasted to other vehicles and roadside units (RSUs) have become an important research subject in the field of smart transportation. Many authentication schemes are proposed to tackle the challenges above and most of them are heavy in computation and communication. In this paper, we propose a novel authentication scheme that utilizes the double pseudonym method to hide the real identity of vehicles and adopts the dynamic update technology to periodically update the information (such as member secret, authentication key, internal pseudo-identity) stored in the tamper-proof device to prevent the side-channel attack. Because of not using bilinear pairing, our scheme yields a better performance in terms of computation overhead and communication overhead, and is more suitable to be applied in the Internet of Vehicles.Entities:
Keywords: IoV; TPD; batch verification; privacy-preserving authentication
Year: 2018 PMID: 29735941 PMCID: PMC5981257 DOI: 10.3390/s18051453
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
List of notations and definitions.
| Notation | Definitions |
|---|---|
|
| A trusted authority |
|
| The |
|
| The |
|
| the private key and public key of TA |
|
| A certificate of |
|
| The real identity of |
|
| The validity period of |
|
| An internal pseudonym identity of |
|
| The public pseudonym identity of |
|
| A hash-based message authentication code generated by |
|
| A symmetric encryption scheme, where |
Figure 1System model.
Figure 2Graphical representation of our scheme.
The security comparisons of each scheme.
| sr1 | sr2 | sr3 | sr4 | sr5 | |
|---|---|---|---|---|---|
| Zhang et al. [ |
| × |
|
| × |
| Bayat et al. [ |
| × |
|
| × |
| Zhang et al. [ |
|
|
|
|
|
| He et al. [ |
|
|
|
| × |
| Our Scheme |
|
|
|
|
|
Different execution time of each cryptographic operations.
| Cryptographic Operation | Execution Time |
|---|---|
|
| 4.211 ms |
|
| 1.709 ms |
|
| 4.406 ms |
|
| 0.442 ms |
The computation overhead of each scheme.
| Scheme | PSGH | SMVH | MMVH |
|---|---|---|---|
| Zhang et al. [ | |||
| Bayat et al. [ | |||
| Zhang et al. [ | |||
| He et al. [ | |||
| Our Scheme |
Figure 3Computation overhead comparison of signing and verifying a single message.
Figure 4Computation overhead comparison of verifying multiple message.
The communication overhead of each scheme.
| Scheme | Sending a Single Message | Sending n Messages |
|---|---|---|
| Zhang et al. [ | 388 bytes | 388 n bytes |
| Bayat et al. [ | 388 bytes | 388 n bytes |
| Zhang et al. [ | 148 bytes | 148 n bytes |
| He et al. [ | 144 bytes | 144 n bytes |
| Our Scheme | 80 bytes | 80 n bytes |