Real-world evaluation of an anonymous authenticated key agreement protocol for vehicular ad-hoc networks

Vehicles in Vehicular Ad-Hoc NETworks (VANETs) use applications which require an exchange of application-specific confidential data between vehicles. This data must be protected from vehicles not using the application. To achieve this, the vehicles have to authenticate each other in a way that the other communication partner is convinced that the vehicle is eligible to exchange the data. Furthermore, both partners have to agree on an encryption key. This kind of protocols is known as approaches to authenticated key agreement. The proprietary protocol implemented and evaluated in this paper supports these properties and, in addition, preserves the privacy of the vehicles. After executing the protocol, neither one of the participating vehicles nor an eavesdropping third vehicle in communication range can unveil the identity of the vehicles. This important property is achieved by combining the Elliptic Curve Integrated Encryption Scheme (ECIES) with ring signatures. Furthermore, we demonstrate how this protocol can be applied within a GeoNetworking message. We present a prototype of the protocol and discuss evaluation results produced from a test setup with real vehicles. The results show that a feasible ring size can be established to reliably protect the privacy of the vehicles. We also analyse the execution time of the complete protocol, of the constituent protocol steps as well as of the different components like security and transmission. The presented results clearly show that the protocol can be completed on time, even when the communicating vehicles have a high relative velocity and poor communication range.

[1]  Diana K. Smetters,et al.  Secret handshakes from pairing-based key agreements , 2003, 2003 Symposium on Security and Privacy, 2003..

[2]  David Chaum,et al.  Group Signatures , 1991, EUROCRYPT.

[3]  Frank Kargl,et al.  Efficient and secure storage of private keys for pseudonymous vehicular communication , 2013, CyCAR '13.

[4]  Wayne Gramlich,et al.  Cryptographic Protocol for Trustable Match Making , 1985, 1985 IEEE Symposium on Security and Privacy.

[5]  Yael Tauman Kalai,et al.  How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.

[6]  Pedro M. d'Orey,et al.  Empirical Evaluation of Cooperative Awareness in Vehicular Communications , 2014, 2014 IEEE 79th Vehicular Technology Conference (VTC Spring).

[7]  Jan Camenisch,et al.  An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation , 2001, IACR Cryptol. ePrint Arch..

[8]  Pin-Han Ho,et al.  ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks , 2007, 2007 IEEE International Conference on Communications.

[9]  Maxim Raya,et al.  Self-organized Anonymous Authentication in Mobile Ad Hoc Networks , 2009, SecureComm.

[10]  Sorin A. Huss,et al.  A novel anonymous authenticated key agreement protocol for vehicular ad hoc networks , 2015, 2015 International Conference on Information Systems Security and Privacy (ICISSP).

[11]  Cengis Hasan,et al.  2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) , 2013 .