期刊论文详细信息
International Journal of Interactive Mobile Technologies
Privacy Preservation Authentication Model for a Secure Infrastructure over Vehicular Communications
article
Soukayna Riffi Boualam1  Mariyam Ouaissa2  Mariya Ouaissa2  Abdellatif Ezzouhairi1 
[1] Engineering, Systems and Applications Laboratory, National School of Applied Sciences, Sidi Mohamed Ben Abdellah University;Moulay Ismail University Meknes
关键词: ITS;    VANET;    Privacy Preservation;    Authentication;    ECDH;    EdDSA;   
DOI  :  10.3991/ijim.v16i12.31533
学科分类:社会科学、人文和艺术(综合)
来源: International Association of Online Engineering
PDF
【 摘 要 】

Vehicle Ad-hoc Networks (VANET) are considered among recent wireless communication technologies. Nowadays, vehicles are no more than simple means of transport, they are endowed with a source of intelligence through their interaction with the road environment due to embedded equipment on board vehicles and integrated into stations along roads and highways. The mechanisms of security and protection of messages exchanged in VANET, thus preserving the privacy of users and satisfying the various security requirements, are a prerequisite for the deployment of vehicle networks. Increasingly, several research have been proposed to improve protocols for maintaining security and preserving privacy. This paper presents a hierarchical revocable infrastructure based privacy preservation authentication protocol for vehicles that involves authentication of each vehicle and the corresponding Road Side Unit (RSU) by a Certification Authority (CA). The proposed protocol used Elliptic Curve Diffie Hellman (ECDH) algorithm for reliable key exchange and Edwards-curve Digital Signature Algorithm (EdDSA) to speed up the execution of the authentication process especially at the key management level, message signing and verification of this signature. On the other hand, the creation of sub-lists of revoked certificates based on vehicle type makes it possible to minimize the response time by looking for a certificate if it is revoked or not. Our solution was checked by the security verification tool, Automated Validation of Internet Security Protocols and Applications (AVISPA), which indicated that it is a very secure level. Performance analysis illustrates that the protocol greatly saves computation resources.

【 授权许可】

CC BY   

【 预 览 】
附件列表
Files Size Format View
RO202306300002812ZK.pdf 1378KB PDF download
  文献评价指标  
  下载次数:18次 浏览次数:8次