An Efficient Privacy-Preserving Mutual Authentication Scheme for Secure V2V Communication in Vehicular Ad Hoc Network

Recent years have witnessed that the new mobility Intelligent Transportation System is booming, especially the development of Vehicular Ad Hoc Networks (VANETs). It brings convenience and a good experience for drivers. Unfortunately, VANETs are suffering from potential security and privacy issues du...

Full description

Saved in:
Bibliographic Details
Published in:IEEE access Vol. 7; pp. 55050 - 55063
Main Authors: Wu, Libing, Sun, Qianqian, Wang, Xinpei, Wang, Jing, Yu, Shui, Zou, Yifei, Liu, Bingyi, Zhu, Zike
Format: Journal Article
Language:English
Published: Piscataway IEEE 2019
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Recent years have witnessed that the new mobility Intelligent Transportation System is booming, especially the development of Vehicular Ad Hoc Networks (VANETs). It brings convenience and a good experience for drivers. Unfortunately, VANETs are suffering from potential security and privacy issues due to the inherent openness of VANETs. In the past few years, to address security and privacy-preserving problems, many identity-based privacy-preserving authentication schemes have been proposed by researchers. However, we found that these schemes fail to meet the requirements of user privacy protection and are vulnerable to attacks or have high computational complexity. Hence, we focus on enhancing privacy-preserving via authentication and achieving better performance. In this paper, first, we describe the vulnerabilities of the previous scheme. Furthermore, to enhance privacy protection and achieve better performance, we propose an efficient privacy-preserving mutual authentication protocol for secure V2V communication in VANETs. Through security analysis and comparison, we formally demonstrate that our scheme can accomplish security goals under dynamic topographical scenario compared with the previous scheme. Finally, the efficiency of the scheme is showed by performance evaluation. The results of our proposed scheme are computationally efficient compared with the previously proposed privacy-preserving authentication scheme.
ISSN:2169-3536
2169-3536
DOI:10.1109/ACCESS.2019.2911924