Deploying Proxy Signature in VANETs

We introduce a verifiable, self authenticating, and anonymous message delivery protocol for VANET communications using different implementations of proxy signature scheme, where RSU-to-OBU, OBU-to- RSU, and OBU-to-OBU message delivery issues have been addressed. An RSU-to-OBU message delivery scheme is developed, in which a message is protected against potential forgery launched by a malicious RSU. Also, a new proxy signature based approach is provided for message integrity and anonymity for the OBU message delivery. The total process is accountable. The security analysis confirms the validity of the proposed protocol.

[1]  Jelena V. Misic,et al.  Privacy and Anonymity in VANETs: A Contemporary Study , 2010, Ad Hoc Sens. Wirel. Networks.

[2]  Dongho Won,et al.  Proxy signatures, Revisited , 1997, ICICS.

[3]  Hovav Shacham,et al.  Short Group Signatures , 2004, CRYPTO.

[4]  Pin-Han Ho,et al.  GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.

[5]  Claus-Peter Schnorr,et al.  Efficient signature generation by smart cards , 2004, Journal of Cryptology.

[6]  Eiji Okamoto,et al.  Proxy signatures for delegating signing operation , 1996, CCS '96.

[7]  Panagiotis Papadimitratos,et al.  SECURING VEHICULAR COMMUNICATIONS , 2006, IEEE Wireless Communications.

[8]  David Chaum,et al.  Group Signatures , 1991, EUROCRYPT.

[9]  Ji-Hye Park,et al.  A Proxy Blind Signature Scheme with Proxy Revocation , 2007, 2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007).

[10]  Jinhua Guo,et al.  A Group Signature Based Secure and Privacy-Preserving Vehicular Communication Framework , 2007, 2007 Mobile Networking for Vehicular Environments.

[11]  C. P. Schnorr,et al.  Efficient Identification and Signatures for Smart Cards (Abstract) , 1989, EUROCRYPT.

[12]  Bruce Schneier,et al.  Practical cryptography , 2003 .

[13]  Lang Wei-min,et al.  A new ID-based proxy blind signature scheme , 2005, Wuhan University Journal of Natural Sciences.

[14]  Hugo Krawczyk,et al.  HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.

[15]  Jia Jia,et al.  A Multiple Grade Blind Proxy Signature Scheme , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).