| Literature DB >> 29762511 |
Abstract
Vehicle ad hoc networks (VANETs) is a promising network scenario for greatly improving traffic efficiency and safety, in which smart vehicles can communicate with other vehicles or roadside units. For the availability of VANETs, it is very important to deal with the security and privacy problems for VANETs. In this paper, based on certificateless cryptography and elliptic curve cryptography, we present a certificateless signature with message recovery (CLS-MR), which we believe are of independent interest. Then, a practical certificateless conditional privacy preserving authentication (PCPA) scheme is proposed by incorporating the proposed CLS-MR scheme. Furthermore, the security analysis shows that PCPA satisfies all security and privacy requirements. The evaluation results indicate that PCPA achieves low computation and communication costs because there is no need to use the bilinear pairing and map-to-point hash operations. Moreover, extensive simulations show that PCPA is feasible and achieves prominent performances in terms of message delay and message loss ratio, and thus is more suitable for the deployment and adoption of VANETs.Entities:
Keywords: authentication; certificateless signature; conditional privacy preserving; security; vehicular ad hoc networks
Year: 2018 PMID: 29762511 PMCID: PMC5982737 DOI: 10.3390/s18051573
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Notations.
| Symbol | Description |
|---|---|
|
| two large prime numbers |
|
| a finite field over |
|
| an additive group |
|
| a generator of |
| KGC | a key generation center |
|
| KGC’s public key and private key |
| hash functions: | |
|
| |
|
| the |
| RSU | roadside unit |
| OBU | onboard unit |
| TRA | a trace authority |
|
| TRA’s public key and private key |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| the valid period of |
| ⊕ | OR operation |
|
| current timestamp |
|
| a message sent from vehicle to RSU |
|
| |
|
| a signature on |
|
| a signature on |
Figure 1System model.
Security comparisons.
| Security | [ | [ | [ | [ | The Proposed Scheme |
|---|---|---|---|---|---|
| Authentication and Message integrity | ✗ | ✓ | ✗ | ✓ | ✓ |
| Identity privacy preserving | ✓ | ✓ | ✓ | ✓ | ✓ |
| Traceability | ✓ | ✓ | ✓ | ✓ | ✓ |
| Unlinkability | ✓ | ✓ | ✓ | ✓ | ✓ |
| Role separation | ✓ | ✓ | ✗ | ✗ | ✓ |
| Key escrow resilience | ✓ | ✓ | ✗ | ✓ | ✓ |
| Resistance to attacks | ✗ | ✓ | ✗ | ✓ | ✓ |
Execution time of cryptographic operation (in Milliseconds).
| Cryptographic Operation | Execution Time |
|---|---|
| Bilinear pairing | 9.0791 |
| Scalar multiplication in bilinear pairing | 3.7770 |
| Scalar multiplication in ECC | 0.8310 |
| Map-to-point hash function in bilinear pairing | 9.7052 |
Comparison of computation cost.
| Scheme | A Message Signing | A Message Verification | ||
|---|---|---|---|---|
| Hong et al’s scheme [ | 7.5540 ms | 40.7195 ms | 7.5540 | 13.4822 |
| Li et al’s scheme [ | 17.2592 ms | 50.4247 ms | 17.2592 | 13.4822 |
| Malhi et al’s scheme [ | 15.1080 ms | 38.5683 ms | 15.1080 | 11.3310 |
| The proposed scheme | 0.8310 ms | 3.3240 ms | 0.8310 | 3.3240 |
Figure 2Computation cost. (a) computation cost in one message signing and verification; (b) signing cost versus number of messages; (c) verification cost versus number of messages.
Comparison of communication cost.
| Scheme | Send a Message | Send |
|---|---|---|
| Horng er al.’s scheme [ | 351 bytes | 351 |
| Li et al.’s scheme [ | 351 bytes | 351 |
| Malhi et al.’s scheme [ | 323 bytes | 323 |
|
|
|
|
Figure 3Communication cost. (a) communication cost of one message; (b) communication cost versus number of messages.
Figure 4Road scenario for simulation.
Simulation parameters.
| Parameters | Values |
|---|---|
| Simulation area | 1000 m×1000 m |
| Wireless protocol | 802.11 p |
| Channel bit rate | 6 Mbs |
| Buffer size | 1 M bytes |
| Number of RSU | 9 |
| Simulation time | 200s |
| Traffic simulation tool | SUMO |
| Network simulation tool | ns-3.26 |
| Vehicle speed | 10–50 m/s |
Figure 5Average message delay. (a) average message delay versus number of vehicles; (b) average message delay versus speed of vehicles.
Figure 6Average message loss ratio. (a) average message loss ratio versus number of vehicles; (b) average message loss ratio versus speed of vehicles.