Cryptology ePrint Archive: Report 2016/822

Proxy-based Authentication Scheme for Vehicular Ad Hoc Networks: Security Analysis and an Efficient Scheme

Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo

Abstract: In vehicular ad hoc networks, message authentication using proxy vehicles was proposed to reduce the computational overhead of roadside unites. In this type of message authentication schemes, proxy vehicles with verifying multiple messages at the same time improve computational efficiency of roadside unites when there are a large number of vehicles in their coverage areas. In this paper, first we show that the only proxy-based authentication scheme presented for this goal by Liu et al. is not resistant against false acceptance of batching invalid signatures and modification attack. Next, we propose an new identitybased message authentication scheme with employing proxy vehicles. Then, unforgeability of underlying signature is proved under Elliptic Curve Discrete Logarithm Problem in the random oracle model to show that it is secure against modification attack. It should be highlighted that our proposed scheme not only is more efficient than Liu et al.ís scheme since it is pairing-free and does not use mapto- point hash functions, but also it satisfies security and privacy requirements of vehicular ad hoc networks.

Category / Keywords: cryptographic protocols /

Date: received 24 Aug 2016

Contact author: mar61_rh at yahoo com

Available format(s): PDF | BibTeX Citation

Version: 20160828:201048 (All versions of this report)

Short URL: ia.cr/2016/822

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]