EASPSC: Efficient authentication of SignRecryption protocol using shareable clouds in VANET groups

Vehicular ad hoc networks (VANET) is one of the most awaited and ambitious projects of Intelligent Transport System (ITS), where vehicles are permitted to talk with each other. The ultimate goal of the network is to develop a connected network of automobiles, and eventually to reduce traffic and accidents. However, VANET is an ad hoc network without any infrastructure. Apart from architectural issues, there are plenty of security and performance issues, which makes it difficult to be implemented. Therefore, we are using fully authenticated Signcryption technique along with re-cryptography and shareable cloud to make the network safe, reliable and robust. Signcryption combines signature and encryption in a single step, hence decreasing the number of computations. Re-cryptography allows alternative authorities to take charge of the primary authority while maintaining communication transparency. Group signature facilitates secure communication within the group. Security has been verified using Burrows-Abadi-Needham (BAN) logic and Automated Validation of Internet Security Protocols and Applications (AVISPA).

[1]  Narendra S. Chaudhari,et al.  Integrating group signature scheme with Non-transitive Proxy Re-encryption in VANET , 2016, 2016 International Conference on Computing, Analytics and Security Trends (CAST).

[2]  Jean-Jacques Quisquater,et al.  Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups , 2004, Public Key Cryptography.

[3]  Martín Abadi,et al.  A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.

[4]  Qin Li,et al.  Private reputation retrieval in public - a privacy-aware announcement scheme for VANETs , 2015, IET Inf. Secur..

[5]  Ran Canetti,et al.  Chosen-ciphertext secure proxy re-encryption , 2007, CCS '07.

[6]  Muhammad Khurram Khan,et al.  More secure smart card-based remote user password authentication scheme with user anonymity , 2014, Secur. Commun. Networks.

[7]  Jianhua Li,et al.  A Secure Mechanism for Big Data Collection in Large Scale Internet of Vehicle , 2017, IEEE Internet of Things Journal.

[8]  Chandrima Chakrabarti,et al.  Intention aware misbehavior detection for post-disaster opportunistic communication over peer-to-peer DTN , 2018, Peer-to-Peer Netw. Appl..

[9]  Hideki Imai,et al.  How to Construct Efficient Signcryption Schemes on Elliptic Curves , 1998, Inf. Process. Lett..

[10]  Joonsang Baek,et al.  Formal Proofs for the Security of Signcryption , 2002, Journal of Cryptology.

[11]  Narendra S. Chaudhari,et al.  SEGB: Security Enhanced Group Based AKA Protocol for M2M Communication in an IoT Enabled LTE/LTE-A Network , 2018, IEEE Access.

[12]  Jianhong Zhang,et al.  On the Security of a Secure Batch Verification with Group Testing for VANET , 2014, Int. J. Netw. Secur..

[13]  John Malone-Lee,et al.  Identity-Based Signcryption , 2002, IACR Cryptol. ePrint Arch..

[14]  Xavier Boyen,et al.  Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography) , 2003, CRYPTO.

[15]  Matt Blaze,et al.  Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.

[16]  Narendra S. Chaudhari,et al.  SRCPR: SignReCrypting Proxy Re-Signature in Secure VANET Groups , 2018, IEEE Access.

[17]  Jun Ao,et al.  Group-based Proxy Re-encryption Scheme Secure Against Chosen Ciphertext Attack , 2009, Int. J. Netw. Secur..

[18]  Pin-Han Ho,et al.  GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.

[19]  Deepti D. Shrimankar,et al.  Dynamic Group Based Efficient Access Authentication and Key Agreement Protocol for MTC in LTE-A Networks , 2018, Wirel. Pers. Commun..

[20]  Yuliang Zheng,et al.  Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.

[21]  Youngho Park,et al.  An efficient and secure navigation protocol based on vehicular cloud , 2016, Int. J. Comput. Math..

[22]  Tsung-Min Kuo,et al.  Dynamic reversed accumulator , 2018, International Journal of Information Security.

[23]  Mohammad Reza Aref,et al.  A secure authentication scheme for VANETs with batch verification , 2015, Wirel. Networks.

[24]  Xia Feng,et al.  A method for defensing against multi-source Sybil attacks in VANET , 2017, Peer-to-Peer Netw. Appl..

[25]  Kejie Lu,et al.  Cloud-Assisted Safety Message Dissemination in VANET–Cellular Heterogeneous Wireless Network , 2017, IEEE Systems Journal.

[26]  Sebastian Mödersheim,et al.  The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications , 2005, CAV.

[27]  Liqun Chen,et al.  Improved Identity-Based Signcryption , 2005, Public Key Cryptography.

[28]  Narendra S. Chaudhari,et al.  Re-encrypting secure and efficient routing in VANET groups using sharable clouds , 2018, 2018 4th International Conference on Recent Advances in Information Technology (RAIT).

[29]  Paulo S. L. M. Barreto,et al.  Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps , 2005, ASIACRYPT.

[30]  Mianxiong Dong,et al.  FCSS: Fog-Computing-based Content-Aware Filtering for Security Services in Information-Centric Social Networks , 2019, IEEE Transactions on Emerging Topics in Computing.

[31]  Omprakash Kaiwartya,et al.  Real traffic-data based evaluation of vehicular traffic environment and state-of-the-art with future issues in location-centric data dissemination for VANETs , 2017, Digit. Commun. Networks.

[32]  Matthew Green,et al.  Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.

[33]  Kang Kai,et al.  Fog computing for vehicular Ad-hoc networks: paradigms, scenarios, and issues , 2016 .