A Lightweight Privacy-Preserving Protocol for VANETs Based on Secure Outsourcing Computing

In the VANET systems, the leakage of some sensitive data or communication information will cause heavy losses for life and property. Then, a higher security level is required in the VANET systems. Meanwhile, fast computation powers are needed by devices with limited computing resources. Thus, a secure and lightweight privacy-preserving protocol for VANETs is urgent. In this paper, we first propose an identity-based signature that achieves unforgeability against chosen-message attack without random oracle. In order to reduce the computational cost, we design two secure and efficient outsourcing algorithms for the exponential operations, where a homomorphic mapping based on matrices conjugate operation is used to achieve the security of both exponent and base numbers. Furthermore, we construct a privacy-preserving protocol for VANETs by using outsourcing computing and the proposed IBS, where a proxy re-signature scheme is presented for authentications. In the VANET privacy-preserving protocol, TA authorizes RSU to act as an agent and RUS converts OBU’s signature into TA’s signature, which effectively hides the real identity of vehicle OBU. Meanwhile, TA has access to trace the real identity of OBU using its secret key when malicious messages are found. Then, the protocol provides anonymity, traceability, and privacy. In addition, with respect to the efficiency, our scheme does not need pairing operations and exponential operations. Thus, the calculation burdens for the VANET system can be significantly reduced.

[1]  Sherali Zeadally,et al.  Vehicular ad hoc networks (VANETS): status, results, and challenges , 2010, Telecommunication Systems.

[2]  Jin Li,et al.  Outsourcing computation of modular exponentiations in cloud computing , 2013, Cluster Computing.

[3]  Dieter Hogrefe,et al.  EPA-CPPA: An efficient, provably-secure and anonymous conditional privacy-preserving authentication scheme for vehicular ad hoc networks , 2018, Veh. Commun..

[4]  Jie Cui,et al.  HCPA-GKA: A hash function-based conditional privacy-preserving authentication and group-key agreement scheme for VANETs , 2018, Veh. Commun..

[5]  Witold Pedrycz,et al.  Publicly verifiable privacy-preserving aggregation and its application in IoT , 2019, J. Netw. Comput. Appl..

[6]  Hsiao-Hwa Chen,et al.  Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks , 2015, IEEE Transactions on Vehicular Technology.

[7]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[8]  Xiaoyu Zhang,et al.  Verifiable privacy-preserving single-layer perceptron training scheme in cloud computing , 2018, Soft Comput..

[9]  Fatos Xhafa,et al.  L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing , 2015, Knowl. Based Syst..

[10]  G. Lakpathi,et al.  Identity-Based Encryption with Outsourced Revocation in Cloud Computing , 2016 .

[11]  Mazliza Othman,et al.  Internet of Things security: A survey , 2017, J. Netw. Comput. Appl..

[12]  Sherali Zeadally,et al.  VANET-cloud: a generic cloud computing model for vehicular Ad Hoc networks , 2015, IEEE Wireless Communications.

[13]  Jianfeng Ma,et al.  New Algorithms for Secure Outsourcing of Modular Exponentiations , 2014, IEEE Trans. Parallel Distributed Syst..

[14]  Jin Li,et al.  Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack , 2018, Inf. Sci..

[15]  Wenbin Chen,et al.  Lattice-based linearly homomorphic signatures in the standard model , 2016, Theor. Comput. Sci..

[16]  Muthu Ramachandran,et al.  Efficient location privacy algorithm for Internet of Things (IoT) services and applications , 2017, J. Netw. Comput. Appl..

[17]  Jian Shen,et al.  An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain , 2018, IEEE Access.

[18]  Maxim Raya,et al.  The security of vehicular ad hoc networks , 2005, SASN '05.

[19]  Jin Li,et al.  Securely Outsourcing Attribute-Based Encryption with Checkability , 2014, IEEE Transactions on Parallel and Distributed Systems.

[20]  Pin-Han Ho,et al.  GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.

[21]  Pingzhi Fan,et al.  b-SPECS+: Batch Verification for Secure Pseudonymous Authentication in VANET , 2013, IEEE Transactions on Information Forensics and Security.

[22]  David Cash,et al.  Digital Signatures from Strong RSA without Prime Generation , 2015, Public Key Cryptography.

[23]  George K. Karagiannidis,et al.  Secure Multiple Amplify-and-Forward Relaying With Cochannel Interference , 2016, IEEE Journal of Selected Topics in Signal Processing.

[24]  Tamma Bheemarjuna Reddy,et al.  Enhanced class based dynamic priority scheduling to support uplink IoT traffic in LTE-A networks , 2018, J. Netw. Comput. Appl..

[25]  Jian Shen,et al.  Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks , 2018, J. Netw. Comput. Appl..

[26]  Jian Shen,et al.  A Short Linearly Homomorphic Proxy Signature Scheme , 2018, IEEE Access.

[27]  Xi Zhang,et al.  An Enhanced Secure Identity-Based Certificateless Public Key Authentication Scheme for Vehicular Sensor Networks , 2018, Sensors.

[28]  Jianfeng Ma,et al.  Verifiable Computation over Large Database with Incremental Updates , 2014, IEEE Transactions on Computers.

[29]  Pin-Han Ho,et al.  ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[30]  Josep Domingo-Ferrer,et al.  Balanced Trustworthiness, Safety, and Privacy in Vehicle-to-Vehicle Communications , 2010, IEEE Transactions on Vehicular Technology.

[31]  Yuanzhang Li,et al.  A Covert Channel Over VoLTE via Adjusting Silence Periods , 2018, IEEE Access.

[32]  Arun Kumar Sangaiah,et al.  Sensitivity Analysis of an Attack-Pattern Discovery Based Trusted Routing Scheme for Mobile Ad-Hoc Networks in Industrial IoT , 2018, IEEE Access.