An Efficient Anonymous Authentication Scheme for Internet of Vehicles

Internet of Vehicles (IoV) is an intelligent application of IoT in smart transportation, which can make intelligent decisions for passengers. It has drawn extensive attention to improve traffic safety and efficiency and create a more comfortable driving and riding environment. Vehicular cloud computing is a variant of mobile cloud computing, which can process local information quickly. The cooperation of the Internet and vehicular cloud can make the communication more efficient in IoV. In this paper, we mainly focus on the secure communication between vehicles and roadside units. We first propose a new certificateless short signature scheme (CLSS) and prove the unforgeability of it in random oracle model. Then, by combining CLSS and a regional management strategy we design an efficient anonymous mutual quick authentication scheme for IoV. Additionally, the quantitative performance analysis shows that the proposed scheme achieves higher efficiency in terms of interaction between vehicles and roadside units compared with other existing schemes.

[1]  Song Guo,et al.  Fool Me If You Can: Mimicking Attacks and Anti-Attacks in Cyberspace , 2015, IEEE Transactions on Computers.

[2]  Mohsen Guizani,et al.  Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.

[3]  Gwoboa Horng,et al.  Strong non-repudiation based on certificateless short signatures , 2013, IET Inf. Secur..

[4]  Ying-Hao Hung,et al.  A Revocable Certificateless Short Signature Scheme and Its Authentication Application , 2016, Informatica.

[5]  Fei Hu,et al.  Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter , 2014, IEEE Transactions on Control of Network Systems.

[6]  Li Xu,et al.  Cost-Effective Authentic and Anonymous Data Sharing with Forward Security , 2015, IEEE Transactions on Computers.

[7]  Chase Qishi Wu,et al.  Secure cell relay routing protocol for sensor networks , 2005, PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005..

[8]  Yi Mu,et al.  Certificateless Signature Revisited , 2007, ACISP.

[9]  Chin-Teng Lin,et al.  Internet of Vehicles: Motivation, Layered Architecture, Network Model, Challenges, and Future Aspects , 2016, IEEE Access.

[10]  Qing Yang,et al.  On the Security of Information Dissemination in the Internet-of-Vehicles , 2017 .

[11]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[12]  Song Guo,et al.  Utility Based Data Computing Scheme to Provide Sensing Service in Internet of Things , 2019, IEEE Transactions on Emerging Topics in Computing.

[13]  Jianhua Chen,et al.  New certificateless short signature scheme , 2013, IET Inf. Secur..

[14]  Wanlei Zhou,et al.  Modeling malicious activities in cyber space , 2015, IEEE Network.

[15]  Ch. Ramesh Babu,et al.  Internet of Vehicles: From Intelligent Grid to Autonomous Cars and Vehicular Clouds , 2016 .

[16]  Jie Wu,et al.  Robust Network Traffic Classification , 2015, IEEE/ACM Transactions on Networking.

[17]  Xiaojiang Du,et al.  Internet Protocol Television (IPTV): The Killer Application for the Next-Generation Internet , 2007, IEEE Communications Magazine.

[18]  Song Guo,et al.  Incentive Scheme for Cyber Physical Social Systems Based on User Behaviors , 2020, IEEE Transactions on Emerging Topics in Computing.

[19]  Willy Susilo,et al.  Strongly secure certificateless short signatures , 2012, J. Syst. Softw..

[20]  Fei Hu,et al.  Optimized scheduling for data aggregation in wireless sensor networks , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[21]  Mohsen Guizani,et al.  Secure and Efficient Time Synchronization in Heterogeneous Sensor Networks , 2008, IEEE Transactions on Vehicular Technology.

[22]  Mohsen Guizani,et al.  An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.

[23]  Song Guo,et al.  Malware Propagation in Large-Scale Networks , 2015, IEEE Transactions on Knowledge and Data Engineering.

[24]  Xiaojiang Du,et al.  Maintaining Differentiated Coverage in Heterogeneous Sensor Networks , 2005, EURASIP J. Wirel. Commun. Netw..

[25]  Xiangguo Cheng,et al.  An Efficient Identity-based Signature Scheme and Its Applications , 2007, Int. J. Netw. Secur..

[26]  Haibin Zhang,et al.  When Smart Wearables Meet Intelligent Vehicles: Challenges and Future Directions , 2017, IEEE Wireless Communications.

[27]  Rajasekhar Mungara,et al.  A Routing-Driven Elliptic Curve Cryptography based Key Management Scheme for Heterogeneous Sensor Networks , 2014 .

[28]  Jiajia Liu,et al.  In-Vehicle Network Attacks and Countermeasures: Challenges and Future Directions , 2017, IEEE Network.

[29]  Raylin Tso,et al.  Efficient ID-Based Digital Signatures with Message Recovery , 2007, CANS.

[30]  Xiaojiang Du,et al.  A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..

[31]  Mario Gerla,et al.  Vehicular Cloud Computing , 2012, 2012 The 11th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net).

[32]  Yang Xiang,et al.  Modeling the Propagation of Worms in Networks: A Survey , 2014, IEEE Communications Surveys & Tutorials.