SRCPR: SignReCrypting Proxy Re-Signature in Secure VANET Groups

Vehicular Ad hoc Network is an emerging area as a key component of the intelligent transport system. Despite the immense researches going on in this area, it is yet to be deployed at its full scale due to lack of trust, safety, and confidentiality in the network. Moreover, the security algorithms proposed till now are complex, and calculations involved are difficult to be completed within the strict real-time constraints. This paper introduces the SignReCrypting Proxy Re-signature scheme, which reduces the time taken for encryption at sender side as well as for decryption at receiver side. Signcryption reduces the computation cost by converting two steps of signature and encryption into one, whereas re-encryption and re-signature enable Alice to decrypt and sign a message on behalf of Bob. These three terminologies altogether with group signature make the proposed algorithm robust, secure, and efficient. The compromised vehicle is revoked from group using dynamic accumulators, and security is verified using automated validation of Internet security protocols and applications.

[1]  Hyoung-Kee Choi,et al.  A group-based security protocol for machine-type communications in LTE-advanced , 2013, Wireless Networks.

[2]  Jan Camenisch,et al.  Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials , 2002, CRYPTO.

[3]  Jin Li,et al.  Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks , 2014, Comput. Networks.

[4]  Ran Canetti,et al.  Chosen-ciphertext secure proxy re-encryption , 2007, CCS '07.

[5]  Aiqing Zhang,et al.  Security, Privacy, and Fairness in Fog-Based Vehicular Crowdsensing , 2017, IEEE Communications Magazine.

[6]  Susan Hohenberger,et al.  Proxy re-signatures: new definitions, algorithms, and applications , 2005, CCS '05.

[7]  Xiaoyan Zhu,et al.  An Efficient Anonymous Batch Authentication Scheme Based on HMAC for VANETs , 2016, IEEE Transactions on Intelligent Transportation Systems.

[8]  Martín Abadi,et al.  A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.

[9]  Chao Liu,et al.  Multi-message and multi-receiver heterogeneous signcryption scheme for ad-hoc networks , 2017, Inf. Secur. J. A Glob. Perspect..

[10]  Balu L. Parne,et al.  ESAP: Efficient and secure authentication protocol for roaming user in mobile communication networks , 2018 .

[11]  Jun Ao,et al.  Group-based Proxy Re-encryption Scheme Secure Against Chosen Ciphertext Attack , 2009, Int. J. Netw. Secur..

[12]  Pin-Han Ho,et al.  GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.

[13]  Elaine Shi,et al.  TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[14]  Zoubir Mammeri,et al.  Authentication and consensus overhead in vehicular ad hoc networks , 2013, Telecommun. Syst..

[15]  Laura Savu Signcryption scheme based on schnorr digital signature , 2012, ArXiv.

[16]  Narendra S. Chaudhari,et al.  Re-encrypting secure and efficient routing in VANET groups using sharable clouds , 2018, 2018 4th International Conference on Recent Advances in Information Technology (RAIT).

[17]  Narendra S. Chaudhari,et al.  DGBES: Dynamic Group Based Efficient and Secure Authentication and Key Agreement Protocol for MTC in LTE/LTE-A Networks , 2018, Wirel. Pers. Commun..

[18]  Matthew Green,et al.  Identity-Based Proxy Re-encryption , 2007, ACNS.

[19]  Kshirasagar Naik,et al.  Evaluating Electric Vehicles’ Response Time to Regulation Signals in Smart Grids , 2018, IEEE Transactions on Industrial Informatics.

[20]  Tsung-Min Kuo,et al.  Dynamic reversed accumulator , 2018, International Journal of Information Security.

[21]  David Chaum,et al.  Group Signatures , 1991, EUROCRYPT.

[22]  Mohammad Reza Aref,et al.  A secure authentication scheme for VANETs with batch verification , 2015, Wirel. Networks.

[23]  Susan Hohenberger,et al.  Key-Private Proxy Re-encryption , 2009, CT-RSA.

[24]  Yi Mu,et al.  Designated Verifier Proxy Re-signature for Deniable and Anonymous Wireless Communications , 2017, Wirel. Pers. Commun..

[25]  Yuliang Zheng,et al.  Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.

[26]  Youngho Park,et al.  An efficient and secure navigation protocol based on vehicular cloud , 2016, Int. J. Comput. Math..

[27]  Muhammad Khurram Khan,et al.  More secure smart card-based remote user password authentication scheme with user anonymity , 2014, Secur. Commun. Networks.

[28]  Hyoung-Kee Choi,et al.  A group-based security protocol for machine-type communications in LTE-advanced , 2015, Wirel. Networks.

[29]  Matt Blaze,et al.  Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.

[30]  Sebastian Mödersheim,et al.  The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications , 2005, CAV.

[31]  Omprakash Kaiwartya,et al.  Real traffic-data based evaluation of vehicular traffic environment and state-of-the-art with future issues in location-centric data dissemination for VANETs , 2017, Digit. Commun. Networks.

[32]  Matthew Green,et al.  Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.

[33]  Jindan Zhang,et al.  Non-transitive Bidirectional Proxy Re-encryption Scheme , 2009, 2009 International Conference on Networking and Digital Society.

[34]  Narendra S. Chaudhari,et al.  Integrating group signature scheme with Non-transitive Proxy Re-encryption in VANET , 2016, 2016 International Conference on Computing, Analytics and Security Trends (CAST).

[35]  Ahmed Ahmim,et al.  ESSPR: an efficient secure routing scheme based on searchable encryption with vehicle proxy re-encryption for vehicular peer-to-peer social network , 2017, Telecommun. Syst..

[36]  AtenieseGiuseppe,et al.  Improved proxy re-encryption schemes with applications to secure distributed storage , 2006 .

[37]  Chin-Ling Chen,et al.  A secure payment system for multimedia on demand on mobile VANET clouds , 2016, Secur. Commun. Networks.

[38]  Jianhong Zhang,et al.  On the Security of a Secure Batch Verification with Group Testing for VANET , 2014, Int. J. Netw. Secur..