Abstract

Research related to vehicular ad hoc networks (VANETs) has received some significant attention in recent years. Despite all the advantages, the security and privacy in VANETs still become the main challenge that is widely open to discussion. The authentication scheme plays a substantial role to guarantee the security and privacy of information circulation and verification efficiency in VANETs. In this high-density environment, a scalability issue would emerge when the number of message-signature pairs received by a roadside unit (RSU) or vehicles becomes large. This issue happens because those entities cannot sequentially verify each received signature according to the required time limit. Some researchers believe that the symmetric cryptography-based authentication scheme provides a lightweight verification operation, which leads to low computation and communication costs. Combined with the batch verification process, this approach can be very beneficial. However, to the best of our knowledge, not many of those related schemes provide a realistic scenario regarding some illegal signatures’ appearance. Could the system identify the forged messages? Is it still efficient enough to do such an operation? In this paper, we propose a lightweight binary tree-based (BT-based) authentication scheme with a batch verification mechanism, that could efficiently identify a modest amount of illegal signatures in the sum of messages. To even improve the operation, we combine our BT-based batch verification scheme with our vehicle reputation scoring system. Given any <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">n</i> received messages with <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">b</i> ≥ 1 illegal ones, the computation cost to verify all these messages only requires approximately (2[⌈lg <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">n</i> ⌉ - lg(⌈ b/2 ⌉2)] + 2 <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">⌈lg(⌈ b/2 ⌉2)⌉+1</sup> - 1) pairing operations, as the best-case scenario. By this approach, we can guarantee the best-case scenario (the most desirable condition) in our BT-based identification appear as much as possible. Hence, the computation cost can be kept low.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call