Skip to main content

On the Security of a Threshold Anonymous Authentication Protocol for VANETs

  • Conference paper
  • First Online:
Security, Privacy, and Anonymity in Computation, Communication, and Storage (SpaCCS 2016)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10066))

Abstract

VANETs is a promising mobile ad hoc networks, it can significantly improve the traffic safety and efficiency. But it also raises some formidable challenges, where security assurance and privacy protection are two primary concerns. Without the security and privacy guarantees, attackers could track their interested vehicles by collecting and analyzing their traffic messages. Hence, anonymous message authentication is an essential requirement of VANETs. Recently, Shao et al. proposed a new threshold anonymous authentication protocol, and they claim that these protocol can achieve identity tracing of a malicious vehicle. Unfortunately, in this letter, we demonstrate that the protocol cannot satisfy traceability. A malicious vehicle is able to arbitrarily send the false without being traced by the group tracer in their scheme. Finally, we analyze the reason to produce and give the corresponding advise to fix this flaw.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Shao, J., Lin, X., Lu, R., Zuo, C.: A threshold anonymous authentication protocol for VANETs. IEEE Trans. Veh. Technol. 65(3), 1711–1723 (2016)

    Article  Google Scholar 

  2. Raya, M., Hubaux, J.P.: Securing vehicular ad hoc networks. J. Comput. Secur. Spec. Issue Secur. Ad Hoc Sens. Netw. 15(1), 39–68 (2007)

    Google Scholar 

  3. Zhang, C., Lin, X., Lu, R., Ho, P.H., Shen, X.: An efficient message authentication scheme for vehicular communications. IEEE Trans. Veh. Technol. 57(6), 3357–3368 (2008)

    Article  Google Scholar 

  4. Lin, X., Chen, H.H.: A secure and efficient RSU-aided bundle forwarding protocol for vehicular delay tolerant networks. Wireless Commun. Mob. Comput. 11(2), 187–195 (2011)

    Article  Google Scholar 

  5. Lu, R., Lin, X., Zhu, H., Liang, X., Shen, X.: BECAN: a bandwidth-efficient cooperative authentication scheme for filtering injected false data in wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 23(1), 32–43 (2012)

    Article  Google Scholar 

  6. Guo, J., Baugh, J.P., Wang, S.: A group signature based secure and privacy-preserving vehicular communication framework. In: Proceedings Mobile Network Vehicular Environmental, pp. 103–108 (2007)

    Google Scholar 

  7. Xiong, H., Beznosov, K., Qin, Z, Ripeanu, M.: Efficient and spontaneous privacy-preserving protocol for secure vehicular communication. In: IEEE-ICC, pp. 1–6 (2010)

    Google Scholar 

  8. Babu, S., Patra, M., Murthy, C.S.R.: A novel context-aware variable interval MAC protocol to enhance event-driven message delivery in IEEE 802.11p/WAVE vehicular networks. Veh. Commun. 2(3), 172–183 (2016)

    Article  Google Scholar 

  9. Chen, L., Ng, S.-L., Wang, G.: Threshold anonymous announcement in VANETs. IEEE J. Sel. Areas Commun. 29(3), 605–612 (2011)

    Article  Google Scholar 

  10. Zhang, J., Mao, J.: Efficient multi-proxy signature scheme with short length in the standard model. J. Inf. Sci. Eng. 32(4), 1097–1112 (2016)

    Google Scholar 

  11. Zhang, L., Wu, Q., Qin, B., Domingo-Ferrer, J.: APPA: aggregate privacy-preserving authentication in vehicular ad hoc networks. In: Lai, X., Zhou, J., Li, H. (eds.) ISC 2011. LNCS, vol. 7001, pp. 293–308. Springer, Heidelberg (2011). doi:10.1007/978-3-642-24861-0_20

    Chapter  Google Scholar 

  12. Zhang, J., Yuwei, X.: Privacy-preserving authentication protocols with efficient verification in VANETs. Int. J. Commun. Syst. 27(12), 3676–3692 (2014)

    Article  Google Scholar 

  13. Lu, R., Lin, X., Liang, X., Shen, X.: A dynamic privacy-preserving key management scheme for location based services in VANETs. IEEE Trans. Intell. Transp. Syst. 13(1), 127–139 (2012)

    Article  Google Scholar 

  14. Zhang, J., Zhao, X., Mao, J.: Attack on Chen et al.’s certificateless aggregate signature scheme. Secur. Commun. Netw. 9(1), 54–59 (2016)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgments

This work was supported by Beijing Municipal Natural Science Foundation (No: 4162020,4132056) and The importation and development of High-Caliber Talents project of Beijing municipal Institutions (CIT&TCD201304004).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jianhong Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Zhang, J., Sun, Z., Liu, S., Liu, P. (2016). On the Security of a Threshold Anonymous Authentication Protocol for VANETs. In: Wang, G., Ray, I., Alcaraz Calero, J., Thampi, S. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2016. Lecture Notes in Computer Science(), vol 10066. Springer, Cham. https://doi.org/10.1007/978-3-319-49148-6_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-49148-6_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-49147-9

  • Online ISBN: 978-3-319-49148-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics