Certificateless ECC-based Authentication Protocol for Internet of Vehicles
管理學院 - 資訊管理系
Department of Information Management
|Thesis Publication Year:||2023|
|Graduation Academic Year:||111|
|Keywords (in Chinese):||無憑證 、身分鑑別 、橢圓曲線密碼學|
|Keywords (in other languages):||Certificateless, Authentication, Elliptic Curve Cryptography|
|Reference times:||Clicks: 27 Downloads: 0|
|School Collection Retrieve National Library Collection Retrieve Error Report|
The progress and extensive adoption of wireless communication technologies have led to significant growth in the development of Vehicular ad-hoc networks (VANET). VANET is mainly used to maintain traffic safety by exchanging data between vehicles and roadside units via Dedicated short-range communications (DSRC) technology. However, data exchange in the insecure channel is vulnerable to attacks and although many scholars have proposed relevant methods to satisfy authentication and security, there are still communication and computational performance problems, so how to effectively verify data sources and ensure data integrity in vehicles is an important issue.
In this thesis, we propose an elliptic curve cryptography-based certificateless identity authentication protocol in the internet of vehicle environment, we use certificateless to solve the problem of the certificate revocation list, the vehicle does not need to check the revocation list frequently so it can improve the communication efficiency. In addition, the existing literature has not explained how to establish a secure channel, so our registration stage is carried out in the insecure channel to increase flexibility in implementation. Finally, our proposed method effectively reduces computational and communication costs by utilizing elliptic curve cryptography and general hash functions, outperforming similar recent methods in terms of efficiency.
 M. N. Aman, U. Javaid, and B. Sikdar, “A Privacy-Preserving and Scalable
Authentication Protocol for the Internet of Vehicles,” IEEE Internet of Things Journal, vol. 8, no. 2, pp. 1123–1139, Jan. 2021.
 P. Bagga, A. K. Das, M. Wazid, J. J. P. C. Rodrigues, K.-K. R. Choo, and Y. Park,
“On the Design of Mutual Authentication and Key Agreement Protocol in Internet of Vehicles-Enabled Intelligent Transportation System,” IEEE Transactions on Vehicular Technology, vol. 70, no. 2, pp. 1736–1751, Feb. 2021.
 U. Javaid, M. N. Aman, and B. Sikdar, “A Scalable Protocol for Driving Trust Management in Internet of Vehicles With Blockchain,” IEEE Internet of Things Journal, vol. 7, no. 12, pp. 11815–11829, Feb. 2020.
 N. V. Abhishek, M. N. Aman, T. J. Lim, and B. Sikdar, “DRiVe: Detecting Malicious Roadside Units in the Internet of Vehicles With Low Latency Data Integrity,” IEEE Internet of Things Journal, vol. 9, no. 5, pp. 3270–3281, Mar. 2022.
 A. Brighente, M. Conti, and H. Vasudev, “SWAP: Secure Warning Messages Authentication and Propagation in Internet of Vehicles,” in 2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM), pp. 1–6, Sep. 2022.
 P. Bagga, A. K. Das, M. Wazid, J. J. P. C. Rodrigues, and Y. Park, “Authentication
Protocols in Internet of Vehicles: Taxonomy, Analysis, and Challenges,” IEEE Access, vol. 8, pp. 54314–54344, 2020.
 J. B. Kenney, “Dedicated Short-Range Communications (DSRC) Standards in the
United States,” Proceedings of the IEEE, vol. 99, no. 7, pp. 1162–1182, Jul. 2011.
 B. Ying and A. Nayak, “Anonymous and Lightweight Authentication for Secure Vehicular Networks,” IEEE Transactions on Vehicular Technology, vol. 66, no. 12, pp. 10626–10636, Feb. 2017.
 A. Sharma and A. Jaekel, “Machine Learning Based Misbehaviour Detection in VANET Using Consecutive BSM Approach,” IEEE Open Journal of Vehicular Technology, vol. 3, pp. 1–14, 2022.
 I. Ali, Y. Chen, N. Ullah, R. Kumar, and W. He, “An Efficient and Provably Secure ECC-Based Conditional Privacy-Preserving Authentication for Vehicle to Vehicle Communication in VANETs,” IEEE Transactions on Vehicular Technology, vol. 70, no. 2, pp. 1278–1291, Feb. 2021.
 P. Vijayakumar, V. Chang, L. Jegatha Deborah, B. Balusamy, and P. G. Shynu,
“Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks,” Future Generation Computer Systems, vol. 78, pp. 943–955, Jan. 2018.
 W. Othman, M. Fuyou, K. Xue, and A. Hawbani, “Physically Secure Lightweight and Privacy-Preserving Message Authentication Protocol for VANET in Smart City,” I IEEE Transactions on Vehicular Technology, vol. 70, no. 12, pp. 12902–12917, Feb. 2021.
 L. Malina, P. Seda, Z. Martinasek, J. Pokorny, M. Srotyr, M. Vanis, Z. Lokaj, “On
Security and Privacy in Vehicle Speed-Limiting Services in the Internet of Vehicles,” IEEE Intelligent Transportation Systems Magazine, vol. 15, no. 1, pp.8–22, Jan. 2023.
 X. Li, T. Liu, M. Obaidat, F. Wu, P. Vijayakumar, and N. Kumar, “A Lightweight
Privacy-Preserving Authentication Protocol for VANETs,” IEEE Systems Journal, vol. PP, pp. 1–11, May 2020.
 M. Azees, P. Vijayakumar, and L. J. Deboarh, “EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks,” IEEE Transactions on Intelligent Transportation Systems, vol. 18, no. 9, pp. 2467–2476, Sep. 2017.
 U. Rajput, F. Abbas, H. Eun, and H. Oh, “A Hybrid Approach for Efficient
Privacy-Preserving Authentication in VANET,” IEEE Access, vol. 5, pp. 12014–12030,2017.
 M. Asghar, R. R. M. Doss, and L. Pan, “A Scalable and Efficient PKI Based Authentication Protocol for VANETs,” in 2018 28th International Telecommunication Networks and Applications Conference (ITNAC), pp. 1–3, Jan. 2018.
 A. Shamir, “Identity-Based Cryptosystems and Signature Schemes,” in Advances
in Cryptology, G. R. Blakley and D. Chaum, Eds., in Lecture Notes in Computer Science. Berlin, Heidelberg: Springer, pp. 47–53, 1985.
 K.-A. Shim, “CPAS: An Efficient Conditional Privacy-Preserving Authentication
Scheme for Vehicular Sensor Networks,” IEEE Transactions on Vehicular Technology, vol. 61, no. 4, pp. 1874–1883, May 2012.
 J.-L. Tsai and N.-W. Lo, “A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services,” IEEE Systems Journal, vol. 9, no. 3, pp. 805–815, Sep. 2015.
 S. S. Al-Riyami and K. G. Paterson, “Certificateless Public Key Cryptography,” in Advances in Cryptology - ASIACRYPT 2003, C.-S. Laih, Ed., in Lecture Notes in Computer Science. Berlin, Heidelberg: Springer, pp. 452–473, 2003.
 W. Xiong, R. Wang, Y. Wang, F. Zhou, and X. Luo, “CPPA-D: Efficient Conditional Privacy-Preserving Authentication Scheme With Double-Insurance in VANETs,” IEEE Transactions on Vehicular Technology, vol. 70, no. 4, pp. 3456–3468, Apr. 2021.
 I. Ali, Y. Chen, C. Pan, and A. Zhou, “ECCHSC: Computationally and Bandwidth Efficient ECC-Based Hybrid Signcryption Protocol for Secure Heterogeneous Vehicle-to-Infrastructure Communications,” IEEE Internet of Things Journal, vol. 9, no. 6, pp. 4435–4450, Mar. 2022.
 C. Lyu, D. Gu, Y. Zeng, and P. Mohapatra, “PBA: Prediction-Based Authentication for Vehicle-to-Vehicle Communications,” IEEE Transactions on Dependable and Secure Computing, vol. 13, no. 1, pp. 71–83, Jan. 2016.
 M. A. Al-Shareeda, M. Anbar, I. H. Hasbullah, S. Manickam, and S. M. Hanshi, “Efficient Conditional Privacy Preservation With Mutual Authentication in Vehicular Ad Hoc Networks,” IEEE Access, vol. 8, pp. 144957–144968, 2020.
 T. Nandy, M.Y.I. Idris, R. M. Noor, A. W. A. Wahab, S. Bhattacharyya, R. Kolandaisamy, M. Yahuza, “A Secure, Privacy-Preserving, and Lightweight Authentication Scheme for VANETs,” IEEE Sensors Journal, vol. 21, no. 18, pp. 20998–21011, Sep. 2021.
 Z. Wang, Y. Zhou, Z. Qiao, B. Yang, C. Gu, Y. Xu, M. Zhang, “An Anonymous
and Revocable Authentication Protocol for Vehicle-to-Vehicle Communications,”
IEEE Internet of Things Journal, vol. 10, no. 6, pp. 5114–5127, Mar. 2023.
 V. S. Miller, “Use of Elliptic Curves in Cryptography,” in Advances in Cryptology
— CRYPTO ’85 Proceedings, H. C. Williams, Ed., in Lecture Notes in Computer
Science. Berlin, Heidelberg: Springer, pp. 417–426, 1986.
 K. Ravi and S. A. Kulkarni, “A secure message authentication scheme for VANET
using ECDSA,” in 2013 Fourth International Conference on Computing,
Communications and Networking Technologies (ICCCNT), pp. 1–6, Jul. 2013.
 M. Thant and T. M. Zaw, “Authentication Protocols and Authentication on the
Base of PKI and ID-Based,” in 2018 Wave Electronics and its Application in
Information and Telecommunication Systems (WECONF), pp. 1–8, Jan. 2018.
 A. K. Sutrala, P. Bagga, A. K. Das, N. Kumar, J. J. P. C. Rodrigues, and P. Lorenz, “On the Design of Conditional Privacy Preserving Batch Verification-Based Authentication Scheme for Internet of Vehicles Deployment,” IEEE Transactions on Vehicular Technology, vol. 69, no. 5, pp. 5535–5548, May 2020.
 J. Zhang, H. Zhong, J. Cui, Y. Xu, and L. Liu, “An Extensible and Effective
Anonymous Batch Authentication Scheme for Smart Vehicular Networks,” IEEE Internet Things J., vol. 7, no. 4, pp. 3462–3473, Apr. 2020.
 C. J. F. Cremers, “The Scyther Tool: Verification, Falsification, and Analysis of
Security Protocols,” Computer Aided Verification, A. Gupta and S. Malik, Eds., in Lecture Notes in Computer Science. Berlin, Heidelberg: Springer, pp. 414–418.2008.
 C. J. F. Cremers, “Scyther : semantics and verification of security protocols,” Phd Thesis 1 (Research TU/e / Graduation TU/e), Technische Universiteit Eindhoven,
 J. Cao, M. Ma, Y. Fu, H. Li, and Y. Zhang, “CPPHA: Capability-Based Privacy-Protection Handover Authentication Mechanism for SDN-Based 5G HetNets,” IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 3, pp. 1182–1195, May 2021.
 N. Z. Almuzaini and I. Ahmad, “Formal Analysis of the Signal Protocol Using the
Scyther Tool,” in 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS), pp. 1–6, May 2019.