• DocumentCode
    61277
  • Title

    Reconstruction of a Secure Authentication Scheme for Vehicular Ad Hoc Networks Using a Binary Authentication Tree

  • Author

    Kyung-Ah Shim

  • Author_Institution
    Div. of Math. Modelling, Nat. Inst. for Math. Sci., Daejeon, South Korea
  • Volume
    12
  • Issue
    11
  • fYear
    2013
  • fDate
    Nov-13
  • Firstpage
    5386
  • Lastpage
    5393
  • Abstract
    Jiang et al. proposed an authentication scheme for Vehicle-to-Infrastructure communications using a Binary Authentication Tree. The scheme can effectively eliminate the performance bottleneck when verifying a mass of signatures within a rigorously required interval and filtering bogus messages. In this paper, we show that Jiang et al.´s scheme is insecure against forgery attacks, replay attacks and Sybil attacks. To overcome the weaknesses, we reconstruct a conditional privacy-preserving authentication scheme, called sf CPP-BAT, for Vehicle-to-Infrastructure communications based on secure identity-based signature, aggregate signature schemes and the Binary Authentication Tree.
  • Keywords
    cryptography; digital signatures; trees (mathematics); vehicular ad hoc networks; CPP-BAT; Sybil attacks; aggregate signature scheme; binary authentication tree; conditional privacy preserving authentication; forgery attacks; replay attacks; secure authentication scheme; secure identity-based signature; vehicle-to-infrastructure communications; vehicular ad hoc networks; Aggregates; Authentication; Cryptography; Forgery; Vehicles; Vehicular ad hoc networks; Identity-based cryptography; digital signature; privacy-preserving authentication scheme; vehicle-to-infrastructure communications;
  • fLanguage
    English
  • Journal_Title
    Wireless Communications, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1536-1276
  • Type

    jour

  • DOI
    10.1109/TWC.2013.100313.120318
  • Filename
    6644235