Premium
An improved EAAP scheme for vehicular ad hoc networks
Author(s) -
Gu Tianlong,
Yuan Bin,
Liu Yining,
Wang Peng,
Li Long,
Chang Liang
Publication year - 2020
Publication title -
international journal of communication systems
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.344
H-Index - 49
eISSN - 1099-1131
pISSN - 1074-5351
DOI - 10.1002/dac.4283
Subject(s) - computer science , anonymity , certificate , scheme (mathematics) , authentication (law) , wireless ad hoc network , computer security , traceability , computer network , identity (music) , encryption , mutual authentication , vehicular ad hoc network , wireless , telecommunications , algorithm , mathematical analysis , physics , mathematics , software engineering , acoustics
Summary Recently, Maria Azees et al proposed an “EAAP: efficient anonymous authentication with conditional privacy‐preserving scheme for Vehicular Ad Hoc Networks.” Their scheme is mainly to solve the problem of high computation time of anonymous certificate and signature authentication, as well as the tracking problem of malicious vehicles. However, some improvements are needed in the protection of anonymous identity and the effective tracking of malicious vehicles. In this paper, our scheme realizes mutual authentication between OBU and RSU, and the RSU is authenticated without using certificate. In order to prevent the anonymous identity of the vehicles from being monitored and tracked, we use the negotiated short‐time key to encrypt the anonymous identity in the vehicle certificates. In addition, our scheme uses a new tracking method for malicious vehicles. Then, we prove the scheme through BAN logic, and it has the properties of authentication, anonymity, unlinkability, privacy protection, and traceability. Finally, we compare the computation cost and communication cost with other schemes, and the scheme has been greatly improved.