LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication (original) (raw)

Access this article

Log in via an institution

Subscribe and save

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. Weiland RJ, Purser LB (2000) Intelligent transportation systems. Transportation in the new millennium. http://trid.trb.org/view.aspx?id=639268
  2. Taylor MAP (2001) Intelligent transport systems. Handbook of transport systems and traffic control. p 461. http://scholar.google.com/scholar?q=Handbook+of+transport+systems+and+traffic+control+TAYLOR&btnG=&hl=en&as_sdt=0%2C5
  3. Wang F, Zeng D, Yang L (2006) Smart cars on smart roads: an IEEE intelligent transportation systems society update. IEEE Pervasive Comput 5(4):68–69
    Article MathSciNet Google Scholar
  4. Dedicated Short Range Communications (DSRC) Home. http://trid.trb.org/view.aspx?id=725762. Accessed 31 Dec 2002
  5. Msn, TV. http://www.msntv.com/. Accessed 20 May 2007
  6. Raya M, Hubaux J (2005) The security of vehicular ad Hoc networks. In: Proceedings of the 3rd ACM workshop on security of ad hoc and sensor networks, pp 11–21
  7. Raya M, Papadimitratos P, Hubaux JP (2006) Securing vehicular communications. IEEE Wirel Commun 13(1):8–15
    Article Google Scholar
  8. Sun Y, Lu R, Lin X, Shen XS (2010) An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. IEEE Trans Veh Technol 59(1):3589–3603
    Article Google Scholar
  9. Mao W (2003) Modern cryptography: theory and practice. Prentice-Hall, Englewood Cliffs
    Google Scholar
  10. Libert B, Vergnaud D (2008) Multi-use unidirectional proxy re-signatures. In: Proceedings of ACM CCS, Alexandria, pp 511–520
  11. Lu R, Lin X, Zhu H, Ho P, Shen XS (2008) ECPP: efficient conditional privacy preservation protocol for secure vehicular communications. In: Proceedings of 2008 INFOCOM, pp 1229–1237
  12. Zhang C, Lu R, Lin X, Ho P, Shen XS (2008) An efficient identity-based batch verification scheme for vehicular sensor networks. In: Proceedings of 2008 INFOCOM, pp 246–250
  13. Fiat A (1990) Batch RSA. In: Proceedings of CRYPTO’89, pp 175–185
  14. Camenisch J, Hohenberger S, Pedersen M (2007) Batch verification of short signatures. In: Proceedings of EUROCRYPT’07, pp 246–263
  15. Lin X, Sun X, Ho P, Shen XS (2007) GSIS: a secure and privacy preserving protocol for vehicular communications. IEEE Trans Veh Technol 56(1):3442–3456
    Google Scholar
  16. Cham D, Heyst EV (1991) Group signatures. In: Proceedings of 1991 advances in cryptology- EUROCRYPT, pp 257–265
  17. Boneh D, Boyen X, Shacham H (2004) Short group signatures. In: Proceedings of 2004 CRYPTO, pp 227–242
  18. Shamir A (1984) Identity-based cryptosystems and signature schemes. In: Proceedings of 1984 advances in CryptologyCrypto. Springer, New York, pp 47–53
  19. Wang F, Xu YJ, Wu L, Dan Liu, Zhu LH (2013) Authenticating and tracing biological anonym of VANET based on KMC decentralization and two-factor. In: Proceedings of the 11th annual international conference on mobile systems, applications, and services (MobiSys ’13). ACM, New York, pp 519–520
  20. Zhang L, Wu Q, Solanas A, Domingo FJ (2010) A scalable robust authentication protocol for secure vehicular communications. IEEE Trans Veh Technol 59(1):1606–1617
    Article Google Scholar
  21. Sampigethaya K, Li M, Huang L, Poovendran R (2007) AMOEBA: robust location privacy scheme for VANET. IEEE J Sel Areas Commun 25(1):1569–1589
    Article Google Scholar
  22. Calandriello G, Papadimitratos P, Hubaux J, Lioy A (2007) Efficient and robust pseudonymous authentication in VANET. In: Proceedings of 2007 the fourth ACM international workshop on Vehicular, ad hoc networks, pp 19–28
  23. Studer A, Bai F, Bellur B, Perrig A (2008) Flexible, extensible, and efficient VANET authentication. J Commun Netw 11(6):574–588
    Article Google Scholar
  24. Perrig A, Canetti R, Tygar JD, Song D (2002) The TESLA broadcast authentication protocol. In: Proceedings of RSA CryptoBytes’02
  25. Lin X, Sun X, Wang X, Zhang C, Ho P, Shen XS (2008) TSVC—timed efficient and secure vehicular communications with privacy preserving. IEEE Trans Wirel Commun 7(1):4987–4998
    Article Google Scholar
  26. Ren K, Lou W, Deng RH, Kim K (2006) A novel privacy preserving authentication and access control scheme in pervasive computing environments. IEEE Trans Veh Technol 55(4):1373–1384
    Article Google Scholar
  27. Sampigethava K, Huang L, Li M, Poovendran R, Matsuura K, Sezaki K (2006) CARAVAN: providing location privacy for VANET. In: Proceedings of International workshop on vehicular ad hoc networks
  28. Daemen J, Rijmen V (1998) AES Proposal: Rijndael. In: Proceedings of the first advanced encryption standard candidate conference, National Institute of Standards and Technology (NIST)
  29. Bellare M, Canetti R, Krawczyk H (1996) Message authentication using hash functions the HMAC construction. RSA Lab CryptoBytes 2(1):12–15
    MATH Google Scholar
  30. Hess F (2003) Efficient identity based signature schemes based on pairings. Sel Areas Cryptogr 2595:310–324
    Google Scholar
  31. Boneh D, Lynn B, Shacham H (2001) Short signatures from the Weil pairing. In: Proceedings of 2001 ASIACRYPT, pp 514–532
  32. Katz J, Lindell Y (2007) Introduction to modern cryptography: principles and protocols. Chapman & Hall/CRC, Boca Raton, Florida
    MATH Google Scholar
  33. Scott M (2007) Efficient implementation of cryptographic pairings. http://www.pairing-conference.org/2007/invited/Scott_slide.pdf
  34. Zhang C, Lin X, Lu R, Ho P, Shen XS (2008) An efficient message authentication scheme for vehicular communications. IEEE Trans Veh Technol 57(1):3357–3368
    Article Google Scholar
  35. Keranen A, Ott J, Karkkainen T (2009) The ONE simulator for DTN protocol evaluation. In: Proceedings of the 2nd international conference on simulation tools and techniques
  36. Papadimitratos P, Levente B, Schoch E, Freudiger J, Raya M, Ma Z (2008) Secure vehicular communication systems: design and architecture. Commun Mag IEEE 46(1):100–109
    Article Google Scholar
  37. Hsiao H, Studer A, Chen C, Perrig A, Bai F, Bellur B (2011) Flooding-resilient broadcast authentication for VANETs. In: Proceedings of the 17th annual international conference on mobile computing and networking, pp 193–204
  38. Zhang X, Liu C, Nepal S, Pandey S, Chen J (2013) A privacy leakage upper-bound constraint based approach for cost-effective privacy preserving of intermediate datasets in cloud. IEEE Trans Parallel Distrib Syst 24(6):1192–1202
    Article Google Scholar
  39. Zhang X, Yang LT, Liu C, Chen J (2014) A scalable two-phase top-down specialization approach for data anonymization using MapReduce on cloud. IEEE Trans Parallel Distrib Syst 25(2):363–373
    Article Google Scholar
  40. Zhang X, Liu C, Nepal S, Chen J (2013) An efficient quasi-identifier index based approach for privacy preservation over incremental data sets on cloud. J Comput Syst Sci 79(5):542–555
    Article MathSciNet MATH Google Scholar

Download references