Verification of Privacy Preserving Authentication Protocol for VANETs

The paper presents verification of privacy preserving authentication protocol for VANETs using SPIN tool. The authentication process involves authentication of the moving vehicle and the corresponding road side unit (RSU) by a fixed infrastructure from (CTA) through RSU. The whole process needs only one request and reply between different entities. The work described the impact of known attack on the protocol, graphically specification, its behavior in terms of reliability and its correctly verification using the integrated specification verifying JSPIN tool.

[1]  Brijesh Kumar Chaurasia,et al.  Infrastructure Aided Privacy Preserving-Authentication in VANETs , 2010, ISA.

[2]  Gerard J. Holzmann,et al.  The Model Checker SPIN , 1997, IEEE Trans. Software Eng..

[3]  Stephan Merz,et al.  Model Checking , 2000 .

[4]  Mordechai Ben-Ari,et al.  Principles of concurrent and distributed programming , 2005, PHI Series in computer science.

[5]  Martin Peschke,et al.  Design and Validation of Computer Protocols , 2003 .

[6]  Benjamin Cox,et al.  NetBill Security and Transaction Protocol , 1995, USENIX Workshop on Electronic Commerce.

[7]  Giovanni Maria Sacco,et al.  Timestamps in key distribution protocols , 1981, CACM.

[8]  Brijesh Kumar Chaurasia,et al.  Infrastructure Aided Privacy Preserving-Authentication in VANETs , 2010, FGIT.

[9]  Madhavan Mukund,et al.  Generic Verification of Security Protocols , 2005, SPIN.

[10]  Chuck Yoo,et al.  Comments on 'The Model Checker SPIN' , 2001, IEEE Trans. Software Eng..

[11]  Shekhar Verma,et al.  Prediction of Lane Change Trajectories through Neural Network , 2010, 2010 International Conference on Computational Intelligence and Communication Networks.

[12]  Jörg Brauer,et al.  Model checking embedded software of an industrial knitting machine , 2011, Int. J. Inf. Technol. Commun. Convergence.

[13]  Hartmut König,et al.  Designing and Verifying Communication Protocols Using Model Driven Architecture and Spin Model Checker , 2008, 2008 International Conference on Computer Science and Software Engineering.

[14]  Insup Lee,et al.  A Complete Axiomatization of Finite-State ACSR Processes , 1997, Inf. Comput..

[15]  Roger M. Needham,et al.  Using encryption for authentication in large networks of computers , 1978, CACM.

[16]  James E. Rumbaugh,et al.  Object-Oriented Modelling and Design , 1991 .

[17]  S. Yousefi,et al.  Vehicular Ad Hoc Networks (VANETs): Challenges and Perspectives , 2006, 2006 6th International Conference on ITS Telecommunications.

[18]  Maxim Raya,et al.  Securing vehicular ad hoc networks , 2007, J. Comput. Secur..

[19]  Gerard J. Holzmann,et al.  The SPIN Model Checker - primer and reference manual , 2003 .

[20]  Nhut Nguyen,et al.  Authentication and Privacy , 2008 .

[21]  Chris McDonald,et al.  Kerberos Assisted Authentication in Mobile Ad-hoc Networks , 2004, ACSC.

[22]  Siu-Ming Yiu,et al.  SPECS: Secure and privacy enhancing communications schemes for VANETs , 2011, Ad Hoc Networks.

[23]  Yixian Yang,et al.  Information system security function validating using model checking , 2010, 2010 2nd International Conference on Computer Engineering and Technology.

[24]  Sudhan Majhi,et al.  The Design of a Wireless Access for Vehicular Environment (WAVE) Prototype for Intelligent Transportation System (ITS) and Vehicular Infrastructure Integration (VII) , 2008, 2008 IEEE 68th Vehicular Technology Conference.

[25]  Qin Li,et al.  Formal Modeling and Analyzing Kerberos Protocol , 2009, 2009 WRI World Congress on Computer Science and Information Engineering.

[26]  Mordechai Ben-Ari,et al.  Principles of the spin model checker , 2008 .