Abstract
Route planning helps a vehicle to share a message with the roadside units (RSUs) on its path in advance, which greatly speeds the authentication between the vehicle and the RSUs when the vehicle enters the RSUs’ coverage. In addition, since only a small amount of necessary information needs to be shared between the vehicle and the RSUs, route planning can reduce the storage overhead of the vehicle’s on-board unit (OBU) and the RSUs. However, the message sharing requires the assistance of the certification authority (CA), which will lead CA easily to obtain the vehicle’s planning route. Although CA knows the vehicle’s registration information and helps the vehicle to communicate with RSUs, it is unacceptable that the path of their vehicle is obtained by CA for most drivers. In fact, vehicle’s sensitive information such as planning route, starting time, stop place, should be privacy for others including CA. Inspired with the method of oblivious transfer, a preserving-privacy route planning scheme in VANETs is proposed in this article, in which, a vehicle deduces the information of RSUs on its path with the help of CA, while CA knows nothing about which RSUs’ information has been deduced by the vehicle. Later, fast authentication or other service is easily achieved between the vehicle and the RSUs (V2R) with the pre-shared information. After V2R authentication, vehicles could easily communicate with adjacent vehicles with the help of RSUs (V2V). Finally, compared with related schemes, performance evaluation illustrates the proposed scheme is better in terms of time consumption.
- . 2019. Real-time route planning and data dissemination for urban scenarios using the internet of things. IEEE Wireless Communications 26, 6 (
December 2019), 50–55. Google ScholarCross Ref
- . 2018. Vulnerability analysis for the authentication protocols in trusted computing platforms and a proposed enhancement of the offpad protocol. IEEE Access 6 (2018), 6071–6081. Google Scholar
Cross Ref
- 2019. Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A survey. Vehicular Communications 16 (
April 2019), 45–61.Google ScholarDigital Library
- . 2007. Efficient and robust pseudonymous authentication in VANET. In Proceedings of the 4th ACM International Workshop on Vehicular ad hoc Networks. 19–28.Google Scholar
Digital Library
- . 2020. An improved RSU-based authentication scheme for VANET. Journal of Internet Technology 21, 4 (
July 2020).Google Scholar - . 2019. An efficient authentication scheme based on semi-trusted authority in VANETs. IEEE Transactions on Vehicular Technology 68, 3 (2019), 2972–2986.Google Scholar
- . 2010. Strong and affordable location privacy in VANETs: Identity diffusion using time-slots and swapping. In Proceedings of the 2010 IEEE Vehicular Networking Conference. IEEE, 174–181.Google Scholar
- . 2018. Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives. CRC Press.Google Scholar
- . 2015a. An efficient identity-based conditional privacy-preserving authentication scheme for vehicular adhoc networks. IEEE Transactions on Information Forensics & Security 10, 12 (
December 2015), 2681–2691.Google ScholarDigital Library
- . 2015b. An efficient identity-based conditional privacy preserving authentication scheme for vehicular ad hoc networks. IEEE Transactions on Information Forensics & Security 10, 12 (
December 2015), 2681–2691. Google ScholarCross Ref
- . 2018. Passenger condition based route-planning for cognitive vehicle system. International Journal of Software Science and Computational Intelligence 10, 2 (2018), 25–35. Google Scholar
Cross Ref
- . 2015. Development of a cloud-based service framework for energy conservation in a sustainable intelligent transportation system. International Journal of Production Economics 164 (
June 2015), 454–461.Google ScholarCross Ref
- . 2019. Using vehicles as fog infrastructures for transportation cyber-physical systems (T-CPS): Fog computing for vehicular networks. International Journal of Software Science and Computational Intelligence (IJSSCI) 11, 1 (2019), 47–69.Google Scholar
Cross Ref
- . 2008. IEEE 802.11p: Towards an international standard for wireless access in vehicular environments. In Proceedings of the Vehicular Technology Conference. IEEE, Singapore, 2036–2040.Google Scholar
Cross Ref
- . 2019. An improved certificateless aggregate signature scheme without bilinear pairings for vehicular ad hoc networks. Journal of Information Security and Applications 44 (
February 2019), 184–200.Google ScholarCross Ref
- . 2019. Ensure hierarchal identity based data security in cloud environment. International Journal of Cloud Applications and Computing (IJCAC), 9, 4 (2019), 21–36.Google Scholar
- . 2011. Dedicated short-range communications (DSRC) standards in the united states. In Proceedings of the IEEE. 99, 7 (
July 2011), 1162–1182.Google Scholar - . 1987. Elliptic curve cryptosystems. Mathematics of Computation 48, 177 (1987), 203–209. Google Scholar
Cross Ref
- . 2020. RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing. Vehicular Communications 22 (
April 2020), 100213.1–100213.13.Google ScholarDigital Library
- . 2007. A secure and privacy preserving protocol for vehicular communication. IEEE Trans. Veh. Technol 56 (2007), 3442–3456.Google Scholar
Cross Ref
- . 2014. Improvements on an authentication scheme for vehicular sensor networks. Expert Systems with Applications 41, 5 (2014), 2559–2564.Google Scholar
Digital Library
- . 2015. Message authentication using proxy vehicles in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology 64, 8 (
August 2015), 3697–3710.Google ScholarCross Ref
- . 2003. Robust non-interactive oblivious transfer. IEEE Communications Letters 7, 4 (
April 2003), 153–155. Google ScholarCross Ref
- . 2011. An analytical model for random changing pseudonyms scheme in VANETs. In Proceedings of the International Conference on Network Computing & Information Security. 141–145. Google Scholar
Cross Ref
- . 2019. Vulnerability of the synchronization process in the quantum key distribution system. International Journal of Cloud Applications and Computing 9, 1 (2019), 50–58. Google Scholar
Cross Ref
- . 2018. NECPPA: A novel and efficient conditional privacy-preserving authentication scheme for VANET. Computer Networks 134, 7 (
April 2018), 78–92.Google ScholarDigital Library
- . 2005. The security of vehicular ad hoc networks. In Proceedings of the 3rd ACM Workshop on Security of ad Hoc and Sensor Networks. ACM Press, 11–21.Google Scholar
Digital Library
- . 2016. A threshold anonymous authentication protocol for VANETs. IEEE Transactions on Vehicular Technology 65, 3 (
March 2016), 1711–1720. Google ScholarCross Ref
- . 2012. An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Transactions on Vehicular Technology 61, 4 (
May 2012), 1874–1883. Google ScholarCross Ref
- . 2020. A dynamic membership data aggregation (DMDA) protocol for smart grid. IEEE Systems Journal 14, 1 (
March 2020), 900–908. Google ScholarCross Ref
- . 2019. A practical authentication framework for VANETs. Security and Communication Networks 2019 (
May 2019), 1–11. Google ScholarCross Ref
- . 2020. Oblivious transfer for privacy-preserving in VANET’s feature matching. IEEE Transactions on Intelligent Transportation Systems, 22, 7 (2020), 4359–4366.Google Scholar
- . 2016. Efficient extensible conditional privacy-preserving authentication scheme supporting batch verification for VANETs. Security and Communication Networks 9, 18 (2016), 5460–5471.Google Scholar
Cross Ref
- . 2019. A lightweight authentication scheme for vehicular ad hoc networks based on MSR. Vehicular Communications 15 (January 2019), 16–27.Google Scholar
Cross Ref
- . 2008. An efficient identity-based batch verification scheme for vehicular sensor networks. In Proceedings of the IEEE INFOCOM 2008-The 27th Conference on Computer Communications. IEEE, 246–250.Google Scholar
Cross Ref
- . 2010. A scalable robust authentication protocol for secure vehicular communications. IEEE Transactions on Vehicular Technology 59, 4 (
May 2010), 1606–1617. Google ScholarCross Ref
- . 2015. An efficient revocable group signature scheme in vehicular ad hoc networks. Ksii Transactions on Internet & Information Systems 9, 10 (
October 2015), 4250–4267.Google Scholar - . 2015. PTFA: A secure and privacy-preserving traffic flow analysis scheme for intelligent transportation system. International Journal of Embedded Systems 8, 1 (
December 2015), 8–86.Google Scholar
Index Terms
PPRP: Preserving-Privacy Route Planning Scheme in VANETs
Recommendations
Green wave-based virtual traffic light management scheme with VANETs
Green intelligent transportation systems GITS have received significant attention in recent years. Traffic congestion, which is an important research topic on intelligent transportation systems ITS, is rapidly becoming one of the most serious problems ...
Privacy-preserving Authentication Scheme for VANETs using Blockchain Technology
AbstractRoad accidents and traffic congestion severely impact road safety, resulting in significant loss of life and property. Therefore, there is a need for road safety and traffic management. The wireless networks of connected vehicles called Vehicular ...
A trust based adaptive privacy preserving authentication scheme for VANETs
AbstractIn vehicular ad hoc networks (VANETs), the exchanged messages among vehicles can effectively improve traffic safety and efficiency. Since the nature of open communication in VANETs, it is necessary to verify the legitimacy of vehicles ...






Comments