Skip to main content

Secure and Pairing-Free Identity-Based Batch Verification Scheme in Vehicle Ad-Hoc Networks

  • Conference paper
  • First Online:
Intelligent Computing Methodologies (ICIC 2016)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 9773))

Included in the following conference series:

Abstract

Identity-based batch verification (IBBV) scheme is very desirable to solve efficiency, security and privacy preservation issues for vehicular ad hoc network (VANET). In 2015, Tzeng et al. proposed an IBBV scheme which was published in IEEE Transaction on Vehicular Technology. Their scheme has superior performance than other existing similar schemes in terms of security, computation cost and transmission overhead by performance evaluations. However, one time signature verification of their scheme needs two bilinear pairing operations. As it is well known, bilinear pairing is one of the most time-consuming operation in modern cryptography. Therefore, some efforts can be made to prevent the appearance of pairing and obtain better efficiency. In this paper, we propose an improved scheme of Tzeng et al.’s IBBV. Our improved IBBV scheme needs not use bilinear pairing without the lack of security and privacy-preserving. The total computation cost for signing and verifying is the constant 1.2 ms for single message and n messages respectively, which is far better performance than Tzeng et al. scheme and other similar schemes. So our improved IBBV scheme is more suitable for practical use. Finally, we apply the recovering technology of the vehicle’s real identity of Tzeng et al.’s IBBV scheme to a public key authentication scheme for mobile Ad-hoc networks to address an improved pairing-free authentication scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ying, L., Yang, S., Srikant, R.: Optimal delay-throughput tradeoffs in mobile ad hoc networks. IEEE Trans. Inf. Theor. 54(9), 4119–4143 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  2. Eissa, T., Razak, S., Ngadi, M.: A novel lightweight authentication scheme for mobile ad hoc networks. Arab. J. Sci. Eng. 37(8), 2179–2192 (2012)

    Article  Google Scholar 

  3. Zhang, Y., Liu, W., Wei, W., et al.: Location-based compromise-tolerant security mechanisms for wireless sensor networks. IEEE J. Sel. Areas Commun. 24(2), 247–260 (2013)

    Article  MathSciNet  Google Scholar 

  4. Shabnam, K., Mazleena, S.: A novel authentication scheme for mobile environments in the context of elliptic curve cryptography. In: Proceeding I4CT 2015, pp. 506–510. IEEE press, New York (2015)

    Google Scholar 

  5. Lin, X., Lu, R., Zhang, C., et al.: Security in vehicular ad hoc networks. IEEE Commun. Mag. 46(4), 88–95 (2008)

    Article  Google Scholar 

  6. Tzeng, S., Horng, S., Li, T., et al.: Enhancing security and privacy for identity-based batch verification scheme in VANET. IEEE Trans. Veh. Technol. 99, 1–12 (2015)

    Google Scholar 

  7. Papadimitratos, P., Hubaux, J.: Report on the secure vehicular communications: results and challenges ahead workshop. ACM SIGMOBILE Mobile Comput. Commun. Rev. 12(2), 53–64 (2008)

    Article  Google Scholar 

  8. Chim, T., Yiu, S., Hui, C., et al.: SPECS: secure and privacy enhancing communications schemes for VANETs. Ad Hoc Netw. 9(2), 189–203 (2011)

    Article  Google Scholar 

  9. Horng, S., Tzeng, S., Pan, Y., et al.: b-SPECS+: batch verification for secure pseudonymous authentication in VANET. IEEE Trans. Inf. Forensics Secur. 8(11), 1860–1875 (2013)

    Article  Google Scholar 

  10. Nithya, D., Kumari, N.: A survey of routing protocols for VANET in Urban scenarios. In: Proceeding Pattern Recognition, Informatics and Mobile Engineering PRIME 2013, pp. 464–467. IEEE Press, New York (2013)

    Google Scholar 

  11. Mokhtar, B., Azab, M.: Survey on security issues in vehicular ad hoc networks. Alexandria Eng. J. 54, 1115–1126 (2015)

    Article  Google Scholar 

  12. Thenmozhi, T., Somasundaram, R.: Towards modelling a trusted and secured centralised reputation system for VANET’s. Wireless Pers. Commun. 88(2), 357–370 (2016)

    Article  Google Scholar 

  13. Zhang, C., Lu, R., Lin, X., et al.: An efficient identity-based batch verification scheme for vehicular sensor networks. In: Proceeding INFOCOM 2008, pp. 816–824. IEEE Press, New York (2008)

    Google Scholar 

  14. Zhang, C., Ho, P., Tapolcai, J.: On batch verification with group testing for vehicular communications. Wireless Netw. 17(8), 1851–1865 (2011)

    Article  Google Scholar 

  15. Lee, C., Lai, Y.: Toward a secure batch verification with group testing for VANET. Wireless Netw. 19(6), 1441–1449 (2013)

    Article  MathSciNet  Google Scholar 

  16. IEEE Trial-Use Standard for Wireless Access in Vehicular Environment-Security Services for Applications and Management Messages. In: IEEE standard 1609, 2 July 2006

    Google Scholar 

  17. Huang, J., Yeh, L., Chien, H.: ABAKA: an anonymous batch authenticated and key agreement scheme for value-add services in vehicular ad hoc networks. IEEE Trans. Veh. Technol. 60(1), 248–262 (2011)

    Article  Google Scholar 

  18. Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. J. Cryptology 17(4), 297–319 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  19. Pointcheval, D., Stern, J.: Security arguments for digital signatures and blind signatures. J. Cryptology. 13(3), 361–396 (2000)

    Article  MATH  Google Scholar 

Download references

Acknowledgements

This work was supported by the Innovation Program of Shanghai Municipal Education Commission (No.14ZZ167), the National Natural Science Foundation of China (No.61103213), the Guangxi Natural Science Foundation (No.2014GXNSFAA11838-2) and the Key Disciplines of Computer Science and Technology of Shanghai Polytechnic University under Grant No. XXKZD1604.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaoming Hu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Hu, X., Wang, J., Xu, H., Liu, Y., Zhang, X. (2016). Secure and Pairing-Free Identity-Based Batch Verification Scheme in Vehicle Ad-Hoc Networks. In: Huang, DS., Han, K., Hussain, A. (eds) Intelligent Computing Methodologies. ICIC 2016. Lecture Notes in Computer Science(), vol 9773. Springer, Cham. https://doi.org/10.1007/978-3-319-42297-8_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-42297-8_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-42296-1

  • Online ISBN: 978-3-319-42297-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics