Abstract

Several group signature or identity schemes have been proposed for addressing the issues of security in a vehicular ad hoc network (VANET). Nonetheless, none of these schemes suitably cope with the performance efficient during the signing and verifying safety-messages. Furthermore, adversaries could acquire sensitive data stored in a tamper-proof device (TPD) by utilizing side-channel attacks. An efficient conditional privacy-preserving authentication scheme is proposed for the prevention of side-channel attacks and reducing the performance efficiency of the system in this paper. Moreover, to resist side-channel attacks, critical data stored in the TPD is frequently and periodically updated. Lastly, due to our work employs the one-way hash function and the elliptic curve cryptography, its performance evaluation has lower computation and communication cost compared to other schemes.

Highlights

  • Each year, more than 1 million person are caused to affect by a road incident

  • This vehicle forms a specific kind of ad hoc network, where the vehicle is considered the network’s node. Such networks are known as vehicular ad hoc networks (VANETs) that are a type of the mobile ad hoc networks (MANETs) that utilizes the technology of wireless for proximity and communication of vehicle for fixing infrastructures [6]

  • RELATED WORK we review and discuss the related schemes since VANETs have suffered from issues of mutual authentication and conditional privacy-preserving

Read more

Summary

INTRODUCTION

More than 1 million person are caused to affect by a road incident. The harm of driving environment is the ninth causing of mortality universally and afford a loss at more than 2% or 1 USD trillion of the Gross Domestic Product (GDP) world [1], [2]. To enhance the traffic road of vehicular in the future, ITSs provide innovative and comprehensive applications for controlling these unpleasant events [3] It is being constructed for building smart vehicle via the fast development of wireless communication technology [4], [5]. New vehicle telcos and manufacturers have introduced the fact that wireless tools will be an integral part of each vehicle, allowing them for communicating with other vehicles and with infrastructures of road. This vehicle forms a specific kind of ad hoc network, where the vehicle is considered the network’s node.

RELATED WORK
THE PROPOSED SCHEME
PHASE OF MUTUAL AUTHENTICATION
PHASE OF UPDATE PARAMETERS
FORMAL ANALYSIS
SECURITY REQUIREMENTS
E C CTpm hT
PERFORMANCE EVALUATION
COMMUNICATION COST ANALYSIS
Findings
CONCLUSION AND FUTURE WORK
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call