4.7 Article

Efficient Privacy-Preserving Authentication for Vehicular Ad Hoc Networks

期刊

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
卷 63, 期 2, 页码 907-919

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TVT.2013.2294032

关键词

Batch group signature; cooperation; hash message authentication code (HMAC); privacy-preserving authentication; vehicular ad hoc networks (VANETs)

资金

  1. National Natural Science Foundation of China [61003300, 61272457]
  2. Fundamental Research Funds for the Central Universities [K5051201041]
  3. China 111 Project [B08038]

向作者/读者索取更多资源

In this paper, we present an efficient privacy-preserving authentication scheme based on group signature for vehicular ad hoc networks (VANETs). Although group signature is widely used in VANETs to realize anonymous authentication, the existing schemes based on group signatures suffer from long computation delay in the certificate revocation list (CRL) checking and in the signature verification process, leading to high message loss. As a result, they cannot meet the requirement of verifying hundreds of messages per second in VANETs. In our scheme, we first divide the precinct into several domains, in which roadside units (RSUs) are responsible for distributing group private keys and managing vehicles in a localized manner. Then, we use a hash message authentication code (HMAC) to avoid time-consuming CRL checking and to ensure the integrity of messages before batch group authentication. Finally, we adopt cooperative message authentication among entities, in which each vehicle only needs to verify a small number of messages, thus greatly alleviating the authentication burden. The security and performance analysis show that our scheme is more efficient in terms of authentication speed, while keeping conditional privacy in VANETs.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Engineering, Electrical & Electronic

A Truthful Online Incentive Mechanism for Nondeterministic Spectrum Allocation

Xuewen Dong, Zhichao You, Liangmin Wang, Sheng Gao, Yulong Shen, Jianfeng Ma

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2020)

Article Computer Science, Information Systems

Efficient attribute-based encryption with repeated attributes optimization

Fawad Khan, Hui Li, Yinghui Zhang, Haider Abbas, Tahreem Yaqoob

Summary: The Internet of Things (IoT) integrates various technologies to provide technological enhancements. A new CP-ABE scheme has been proposed to address the challenge of access control in IoT environments, which employs a Repeated Attributes Optimization algorithm to manage attributes more effectively. Security and performance analysis demonstrate that the proposed construction achieves desired security goals with low communication overhead and computational cost for resource-constrained devices.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2021)

Article Computer Science, Information Systems

Aggregation-based location privacy: An information theoretic approach

Wenjing Zhang, Bo Jiang, Ming Li, Ravi Tandon, Qiao Liu, Hui Li

COMPUTERS & SECURITY (2020)

Article Computer Science, Information Systems

Covert Communications in D2D Underlaying Cellular Networks With Power Domain NOMA

Yu'e Jiang, Liangmin Wang, Hui Zhao, Hsiao-Hwa Chen

IEEE SYSTEMS JOURNAL (2020)

Article Automation & Control Systems

Multilevel Identification and Classification Analysis of Tor on Mobile and PC Platforms

Liangmin Wang, Hantao Mei, Victor S. Sheng

Summary: The article proposes a Tor traffic identification and multilevel classification framework based on network flow features, realizing the identification of anonymous traffic, traffic types of anonymous traffic, and applications. Differences between mobile and PC platforms are analyzed, with the conclusion that it is more challenging to identify and classify Tor types and specific Tor applications on mobile platforms. Solutions for this challenge are also discussed.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Engineering, Electrical & Electronic

Physical Layer Security Assisted Computation Offloading in Intelligently Connected Vehicle Networks

Yiliang Liu, Wei Wang, Hsiao-Hwa Chen, Feng Lyu, Liangmin Wang, Weixiao Meng, Xuemin Shen

Summary: The proposed SCOS in ICV networks aims to minimize overall latency by offloading computational tasks to nearby servers in SBSs and securing the information through physical layer security. The scheme utilizes ergodic secrecy rate to determine task offloading, proposes adaptive wiretap code rates, secure beamforming, and artificial noise to improve secrecy rates, showing shorter system delay compared to strategies neglecting time-varying characteristics.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2021)

Article Computer Science, Information Systems

RBP: a website fingerprinting obfuscation method against intelligent fingerprinting attacks

Tao Luo, LiangMin Wang, ShangNan Yin, Hao Shentu, Hui Zhao

Summary: The development and challenges of edge computing and website fingerprinting were discussed, and a novel website fingerprinting defense technology called RBP was proposed, which effectively defended against intelligent fingerprinting attacks.

JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS (2021)

Article Computer Science, Hardware & Architecture

Multi-timescale and multi-centrality layered node selection for efficient traffic monitoring in SDNs

Li Feng, Yiru Yao, Liangmin Wang, Geyong Min

Summary: This study introduces a two-stage parameter-rectifying-based selection scheme (TSPRS) for efficient traffic monitoring in SDNs. By establishing the MMLVN model and using the TEMC method, the scheme effectively identifies the smallest subset of switch nodes in two stages, improving monitoring efficiency and accuracy.

COMPUTER NETWORKS (2021)

Article Computer Science, Theory & Methods

ReliableBox: Secure and Verifiable Cloud Storage With Location-Aware Backup

Tao Jiang, Wenjuan Meng, Xu Yuan, Liangmin Wang, Jianhua Ge, Jianfeng Ma

Summary: This article explores location-aware data backup verification in clouds with the design of a secure framework called ReliableBox, enabling clients to verify data backup at specific geolocations. By leveraging proof-of-storage techniques and geolocation measurement, ReliableBox supports data integrity and backup location verification, preventing attacks like network delay manipulation.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2021)

Article Automation & Control Systems

SMA: SRv6-Based Multidomain Integrated Architecture for Industrial Internet

Liangmin Wang, Fan Wen, Keyang Cheng, Xia Feng, Hao Shen-Tu

Summary: This study proposes a SRv6-based multidomain integrated architecture (SMA) to address the drawbacks in the current Industrial Internet network systems. The SMA utilizes multilayer controllers to achieve high network scalability and efficient data transmission. Through periodic detection and passive feedback, faulty nodes can be quickly and accurately identified, and a hop count constraint helps to avoid long-path forwarding, improving network resource utilization.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Computer Science, Information Systems

Blockchain-Based Reliable and Privacy-Aware Crowdsourcing With Truth and Fairness Assurance

Haiqin Wu, Boris Dudder, Liangmin Wang, Shipu Sun, Guoliang Xue

Summary: This article presents BRPC, a decentralized system based on blockchain for general crowdsourcing, which integrates a confident-aware truth discovery algorithm and a privacy-aware verification protocol. It also defines three user roles and utilizes smart contracts to enforce a comprehensive reputation evaluation model, providing high security and practicality.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Theory & Methods

P2BA: A Privacy-Preserving Protocol With Batch Authentication Against Semi-Trusted RSUs in Vehicular Ad Hoc Networks

Xia Feng, Qichen Shi, Qingqing Xie, Liangmin Wang

Summary: This paper proposes a novel privacy-preserving authentication protocol in bilinear groups, where registered vehicles sign traffic-related messages and send them to nearby Roadside Units (RSUs) along with blinded certificates to reduce computation time and storage overhead. The protocol provides privacy properties such as anonymity and unlinkability, showing improved performance in terms of computation overhead and latency compared to existing schemes.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Computer Science, Information Systems

Secure k-NN Query on Encrypted Cloud Data with Multiple Keys

Ke Cheng, Liangmin Wang, Yulong Shen, Hua Wang, Yongzhi Wang, Xiaohong Jiang, Hong Zhong

Summary: This paper proposes a novel scheme for secure k-NN query on encrypted cloud data with multiple keys, which protects data confidentiality and query privacy, and supports offline data owner.

IEEE TRANSACTIONS ON BIG DATA (2021)

Article Engineering, Electrical & Electronic

Towards Flexible and Truthful Incentive for Multichannel Allocation in DSA

Xuewen Dong, Liangmin Wang, Qingsong Yao, Yongzhi Wang, Junwei Zhang, Yulong Shen

Summary: DSA is a promising platform to solve the spectrum shortage problem caused by wireless applications proliferation, and auction based mechanisms have been extensively studied for their efficiency and fairness. However, existing spectrum auction mechanisms do not consider noncontinuous demands for channels. THIMBLE is proposed as the first truthful incentive mechanism for flexible multichannel allocation, considering bidders' continuous/noncontinuous demands and spatial reusability, achieving truthfulness in both continuous and noncontinuous channel demand cases.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2021)

Article Computer Science, Information Systems

A Collaborative Auditing Blockchain for Trustworthy Data Integrity in Cloud Storage System

Pei Huang, Kai Fan, Hanzhe Yang, Kuan Zhang, Hui Li, Yintang Yang

IEEE ACCESS (2020)

暂无数据