Using IBC and Chameleon Hash for the Confidentiality and Message Authentication in VANET

Article Preview

Abstract:

The transport information security provided by vehicles under VANET environment is quite important. The advantages of the method proposed in the essay are as follows: 1. Communication equipments could validate the information mutually through IBC; 2. Vehicles could validate the legality of public/private key. 3. Vehicles need not show any certificates to validate the identity, so as to avoid the certificates from attacking owing to long-term exposure; 4. The vehicle information could be validated through chameleon method, without waiting for RSU to validate the information, which could improve the instantaneity of the information; 5. The vehicles need not revalidate the identities and consult common key during the time of Hand-off within different RSU ranges.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3135-3140

Citation:

Online since:

December 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] IEEE P802.11p/D6: Draft Amendment for Wireless Access in Vehicular Environments (WAVE) ,March 2009.

Google Scholar

[2] DSRC Information on http://grouper.ieee.org/groups/scc32/dsrc/index.html.

Google Scholar

[3] Lu, R., Lin, X., Zhu, H. and Shen, X. in: An Intelligent Secure and Privacy-Preserving Parking Scheme Through Vehicular Communications, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY , VOL. 59, NO. 6, July 2010.

DOI: 10.1109/tvt.2010.2049390

Google Scholar

[4] Wasef, A., Yixin Jiang and Xuemin Shen, in:DCS: An Efficient Distributed-Certificate-Service Scheme for Vehicular Networks, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 59, NO. 2, FEBRUARY 2010.

DOI: 10.1109/tvt.2009.2028893

Google Scholar

[5] Gina Kounga, Member, IEEE, Thomas Walter, Member, IEEE, and Sven Lachmund, Member, IEEE, in: Proving Reliability of Anonymous Information in VANETs, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY ,VOL. 58, NO. 6, July 2009.

DOI: 10.1109/tvt.2008.2010325

Google Scholar

[6] Jinyuan Sun, Chi Zhang, Yanchao Zhang,and Yuguang Fang, in: An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 21, NO. 9, SEPTEMBER 2010.

DOI: 10.1109/tpds.2010.14

Google Scholar

[7] Lei Zhang, Qianhong Wu, Agusti Solanas, Josep Domingo-Ferrer, in: A Scalable Robust Authentication Protocol for Secure Vehicular Communications, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 59, NO. 4, MAY 2010.

DOI: 10.1109/tvt.2009.2038222

Google Scholar

[8] D. Boneh and M. Franklin, in: Identity-Based Encryption from the Weil Pairings, Advances in Cryptology-Asiacrypt, Springer-Verlag, pp.514-532, 2001.

Google Scholar

[9] H. Krawczyk and T. Rabin, in: Chameleon signatures, in Proc. NDSS, 2000, pp.143-154, 2000.

Google Scholar

[10] Jaeduck Choi and Souhwan Jung, in: A Handover Authentication Using Credentials Based on Chameleon hashinging, IEEE COMMUNICATIONS LETTERS, VOL. 14, NO. 1, JANUARY (2010)

DOI: 10.1109/lcomm.2010.01.091607

Google Scholar

[11] ECC and Bilinear Pairing on http://www.cs.cityu.edu.hk/~ecc/software/lib_about.htm.

Google Scholar