Establishing Trust on VANET Safety Messages

作者: Subir Biswas , Jelena Mišić

DOI: 10.1007/978-3-642-17994-5_21

关键词: Elliptic curve cryptographyReplay attackVehicular ad hoc networkElliptic Curve Digital Signature AlgorithmComputer networkComputer scienceReliability (computer networking)Message authentication code

摘要: We introduce a new scheme for safety message authentication in VANETs. For practical implementation of VANET, we anticipate that road side units (RSUs) are not physically protected and prone to several different attacks including node compromise attacks. Thus, an RSU should be automatically trusted by on vehicles. In our proposed scheme, controller (RSC) is responsible controlling all the RSUs, delivering messages through RSUs vehicles given area, where each uses proxy signature mechanism based Elliptic Curve Cryptography (ECC), which variation known ECDS-based schemes modified according VANET’s criteria security requirements. The underlying network constraints properties from VANET standards have been taken into consideration along with security, reliability other related issues.We also discuss potential forgery attack scenarios scheme. analysis simulation results prove strength adaptability future

参考文章(26)
Seungjoo Kim, Sangjoon Park, Dongho Won, Proxy signatures, Revisited international conference on information and communication security. pp. 223- 232 ,(1997) , 10.1007/BFB0028478
Don B. Johnson, Alfred J. Menezes, Elliptic curve DSA (ECSDA): an enhanced DSA usenix security symposium. pp. 13- 13 ,(1998)
Qingshui Xue, Fengying Li, Yuan Zhou, Jiping Zhang, Zhenfu Cao, Haifeng Qian, An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System security and privacy in mobile information and communication systems. ,vol. 17, pp. 58- 70 ,(2009) , 10.1007/978-3-642-04434-2_6
Lang Wei-min, Yang Zong-kai, Cheng Wen-qing, Tan Yun-meng, A new ID-based proxy blind signature scheme Wuhan University Journal of Natural Sciences. ,vol. 10, pp. 555- 558 ,(2005) , 10.1007/BF02831144
Paulo S. L. M. Barreto, Benoît Libert, Noel McCullagh, Jean-Jacques Quisquater, Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps Lecture Notes in Computer Science. ,vol. 3788, pp. 515- 532 ,(2005) , 10.1007/11593447_28
Jinhua Guo, John P. Baugh, Shengquan Wang, A Group Signature Based Secure and Privacy-Preserving Vehicular Communication Framework 2007 Mobile Networking for Vehicular Environments. pp. 103- 108 ,(2007) , 10.1109/MOVE.2007.4300813
Kewei Sha, Yong Xi, Weisong Shi, Loren Schwiebert, Tao Zhang, Adaptive Privacy-Preserving Authentication in Vehicular Networks international conference on communications. pp. 1- 8 ,(2006) , 10.1109/CHINACOM.2006.344746
Don Johnson, Alfred Menezes, Scott Vanstone, The Elliptic Curve Digital Signature Algorithm (ECDSA) International Journal of Information Security. ,vol. 1, pp. 36- 63 ,(2001) , 10.1007/S102070100002
Mian Cai, Li Kang, Jia Jia, A Multiple Grade Blind Proxy Signature Scheme intelligent information hiding and multimedia signal processing. ,vol. 2, pp. 130- 133 ,(2007) , 10.1109/IIH-MSP.2007.37
Ahren Studer, Fan Bai, Bhargav Bellur, Adrian Perrig, Flexible, extensible, and efficient VANET authentication Journal of Communications and Networks. ,vol. 11, pp. 574- 588 ,(2009) , 10.1109/JCN.2009.6388411