期刊文献+

一种后向撤销隐私安全的车载自组织网络快速匿名消息认证协议 被引量:8

An Efficient Anonymity Message Authentication with Backward Secure Revocation for Vehicular Ad Hoc Networks
下载PDF
导出
摘要 该文提出适用于车载自组织网络的快速匿名消息认证协议。通过使用基于身份的签密技术,车辆行驶至某区域后,与该区域中心相互认证,获取其所维护的周期性群签名系统密钥材料。之后,该车辆能够使用获取的密钥材料对向网络中广播的携带有群签名的消息,实现消息的匿名认证。网络中的车辆收到其它车辆广播消息之后,仅需验证群签名的合法性,避免验证消息的签发者是否是撤销用户。此外,所采用的群签名算法支持批验证运算,能够快速处理短期内收到的多个消息。除了避免撤销验证特性之外,与已有的文献相比,文中的方案能够完善地保护撤销用户的后向隐私安全性。 This paper presents an efficient anonymous message authentication scheme for vehicular ad hoc networks. By using identity-based sign-encryption technique, a vehicular user can first authenticate with a region center to obtain a group signature key material, where the group is managed by the region center. Then, the user can employ the key material to sign a message and broadcast it into the network. Other vehicular users can directly check the signature without revocation verification. In addition, the used group signature supports batch verification, which significantly reduces the verification overhead. Compared with the existing schemes, the proposed scheme can achieve backward secure revocation.
出处 《电子与信息学报》 EI CSCD 北大核心 2014年第1期94-100,共7页 Journal of Electronics & Information Technology
基金 国家自然科学基金(61272481)资助课题
关键词 密码学 车辆网络 认证 匿名性 后向撤销隐私安全 Cryptography Vehicular networks Message authentication Privacy-preserving Backward securerevocation
  • 相关文献

参考文献19

  • 1Chen M,Chen J,Chang T. Android/OSGi-based vehicular network management system[J].{H}Computer Communications,2011,(2):169-183.
  • 2Lu R,Lin X,Liang X. A dynamic privacy-preserving key management scheme for location based services in VANETs[J].{H}IEEE Transactions on Intelligent Transportation Systems,2012,(1):127-139.
  • 3Zhang W,Chen Y,Yang Y. Multi-hop connectivity probability in infrastructure-based vehicular networks[J].{H}IEEE Journal on Selected Areas in Communications,2012,(4):740-747.
  • 4Liu X,Zhang Y,Wang B. Mona:secure multi-owner data sharing for dynamic groups in the Cloud[J].{H}IEEE Transactions on Parallel and Distributed Systems,2013,(6):1182-1191.
  • 5Liu X,Zhang Y. A privacy-preserving acceleration authentication protocol for mobile pay-TV systems[J].Security and Communication Networks,2013,(3):361-372.
  • 6汤一亮.截至 2 月底:我机动车保有量达 2.11 亿辆.
  • 7Raya M,Hubaux J. Securing vehicular ad hoc networks[J].Journal of Computer Security,2007,(1):39-68.
  • 8Haas J,Hu Y,Laberteaux K. Design and analysis of a lightweight certificate revocation mechanism for VANET[A].New York,2009.89-98.
  • 9Wasef A,Jiang Y,Shen X. DCS:an efficient distributed certificate service scheme for vehicular networks[J].{H}IEEE Transactions on Vehicular Technology,2010,(2):533-549.
  • 10Lu R,Lin X,Zhu H. ECPP:efficient conditional privacy preservation protocol for secure vehicular communications[A].Arizona,2008.1229-1237.

同被引文献60

  • 1杨卫东,冯琳琳,刘伎昭,朱红松.车载自组织网络中网络连通特性研究[J].通信学报,2012,33(S1):48-52. 被引量:8
  • 2MERSHAD K, ARTAIL H, GERLA M. We can deliver messages to far vehicles[ J]. IEEE Trans on Intelligent Transportation Systems, 2012,13(3) :1099-1115.
  • 3AN N, GAUGEL T, HARTENSTEIN H. VANET: is 95% probability of packet reception safe [ C ]//Proc of the 11 th International Confe- rence on ITS Telecommunications. 2011:113-119.
  • 4SIKDAR B. Comparison of broadcasting schemes for infrastructure to vehicular communications[ J]. IEEE Trans on Intelligent Transpor- tation Systems,2012,13 (2) :492 - 502.
  • 5BOUKERCHE A,OLIVEIRA H,NAKAMURA E,et al. Secure locali- zation algorithms for wireless sensor networks [ J]. IEEE Communi- cation Magazine,2008,46(4) :96-101.
  • 6LAZOS L,POOVENDRAN REAPKUN S. ROPE:robust position es- timation in wireless sensor networks[ C]//Proc of the 4th Internation- al Symposium on Information Processing in Sensor Networks. 2005: 324-331.
  • 7DU Wen-liang, FANG Lei, NING Peng. LAD: localization anomaly detection for wireless sensor networks[ C]//Proc of the 19th IEEE International ParalM and Distributed Processing Symposium. [ S. 1. ] : ]EEE Press,2005:41.
  • 8GENG Yi-shuang,HE Jie, PAHLAVAN K. Modeling the effect of hu- man body on TOA based indoor human tracking [ J ]. International Journal of Wireless Information Networks,2013,20(4) :306-317.
  • 9SASTRY N, SHANKAR U, WAGNER D. Secure verification of loca- tion claims[ C]//Proc of the 2nd ACM Workshop on Wireless Securi- ty. 2003:1-10.
  • 10SINGELEE D, PRENEEL B. Location verification using secure dis- tance hounding protocols [ C ]//Proe of IEEE International Conference on Mobile Ad hoc and Sensor Systems. 2005 : 834-840.

引证文献8

二级引证文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部