Abstract
Many researchers have conducted many researches on secure communication in VANETs, which have focused on secure V2V or V2I communications. However, current security schemes often require complex identity re-authentication when vehicles enter a new infrastructure coverage, which will greatly reduce the efficiency of the entire network. The proposed trustworthiness-based time-efficient vehicle to infrastructure authentication scheme in this paper achieves rapid re-authentication of vehicles through secure ownership transfer between infrastructures.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
References
Chen, X., Huang, X., Jin, L., Ma, J., Lou, W., Wong, D.S.: New algorithms for secure outsourcing of large-scale systems of linear equations. IEEE Trans. Inf. Forensics Secur. 10(1), 69–78 (2014)
Chen, X., Li, J., Weng, J., Ma, J., Lou, W.: Verifiable computation over large database with incremental updates. IEEE Trans. Comput. 65(10), 3184–3195 (2016)
Chen, Y.M., Wei, Y.C.: A beacon-based trust management system for enhancing user centric location privacy in VANETs. J. Commun. Netw. 15(2), 153–163 (2013)
Hao, Y., Cheng, Y., Zhou, C., Song, W.: A distributed key management framework with cooperative message authentication in VANETs. IEEE J. Sel. Areas Commun. 29(3), 616–629 (2011)
Jiang, T., Chen, X., Ma, J.: Public integrity auditing for shared dynamic cloud data with group user revocation. IEEE Trans. Comput. 65(8), 2363–2373 (2016)
Oulhaci, T., Omar, M., Harzine, F., Harfi, I.: Secure and distributed certification system architecture for safety message authentication in VANET. Telecommun. Syst. 64, 1–16 (2017)
Qu, F., Wu, Z., Wang, F.Y., Cho, W.: A security and privacy review of VANETs. IEEE Trans. Intell. Transp. Syst. 16(6), 2985–2996 (2015)
Shen, J., Liu, D., Lai, C.F., Ren, Y., Sun, X.: A secure identity-based dynamic group data sharing scheme for cloud computing. J. Internet Technol. 18(4), 833–842 (2017)
Wang, C., Shen, J., Liu, Q., Ren, Y., Li, T.: A novel security scheme based on instant encrypted transmission for internet of things. Secur. Commun. Netw. (2018). https://doi.org/10.1155/2018/3680851
Wang, C., Xiao, L., Shen, J., Huang, R.: Neighborhood trustworthiness-based vehicle-to-vehicle authentication scheme for vehicular ad hoc networks. Concurrency Comput.: Practice Exp. (2018). https://doi.org/10.1002/cpe4643
Acknowledgment
This work is supported by the National Natural Science Foundation of China under Grant No. 61922045, No. 61672295, No. U1836115, the Peng Cheng Laboratory Project of Guangdong Province PCL2018KP004, the State Key Laboratory of Cryptology under Grant No. MMKFKT201830, the 2015 Project of Six Personnel in Jiangsu Province under Grant No. R2015L06, the CICAEET fund, and the PAPD fund.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Wang, C., Shen, J., Lai, JF., Liu, J. (2020). A Trustworthiness-Based Time-Efficient V2I Authentication Scheme for VANETs. In: Zheng, Z., Dai, HN., Tang, M., Chen, X. (eds) Blockchain and Trustworthy Systems. BlockSys 2019. Communications in Computer and Information Science, vol 1156. Springer, Singapore. https://doi.org/10.1007/978-981-15-2777-7_66
Download citation
DOI: https://doi.org/10.1007/978-981-15-2777-7_66
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-2776-0
Online ISBN: 978-981-15-2777-7
eBook Packages: Computer ScienceComputer Science (R0)