Message Authentication Scheme for Vehicular Ad-Hoc Wireless Networks without RSU

Studies were conducted on vehicular ad-hoc network (VANET) in recent years. VANET is a network that combines on-board wireless equipment (On-Board Unit, OBU) and roadside fixed wireless equipment (Road Side Unit, RSU) through wireless communication technology. When vehicles broadcast messages, the traditional systems usually use RSU to do message authentication that we can ensure messages are integrity (message authentication) and broadcasted by legitimate vehicles (identity verification). But the cover range of RSU is limit and the cost is expensive, so these systems cannot work without RSU. In this paper, we propose the mechanism based on chameleon hashing and HMAC to do identity verification and message authentication under the environ- ment without RSU. In the proposed scheme, two secret values are retained by TA, and TA will use these secret values to create and pre-load a public identity and a secret value to every registered vehicle. Based on the public identity and the secret value, a vehicle can broadcast message and make secure communication with other vehicles. The other vehicles can also make the message authentication and identity verification based on the techniques of chameleon hash, HMAC and Diffie-Hellman key exchange. The security and performance analysis show that the proposed scheme is secure and its performance is more superior than the related works.

[1]  Pin-Han Ho,et al.  An Efficient Message Authentication Scheme for Vehicular Communications , 2008, IEEE Transactions on Vehicular Technology.

[2]  Pin-Han Ho,et al.  ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[3]  Yi Mu,et al.  Efficient Generic On-Line/Off-Line Signatures Without Key Exposure , 2007, ACNS.

[4]  Yuguang Fang,et al.  An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks , 2010, IEEE Transactions on Parallel and Distributed Systems.

[5]  Tibor Juhas The use of elliptic curves in cryptography , 2007 .

[6]  Xuemin Shen,et al.  DCS: An Efficient Distributed-Certificate-Service Scheme for Vehicular Networks , 2010, IEEE Transactions on Vehicular Technology.

[7]  Hugo Krawczyk,et al.  Chameleon Hashing and Signatures , 1998, IACR Cryptol. ePrint Arch..

[8]  Xiaodong Lin,et al.  An Efficient Pseudonymous Authentication Scheme With Strong Privacy Preservation for Vehicular Communications , 2010, IEEE Transactions on Vehicular Technology.