Altmetrics
Downloads
160
Views
39
Comments
0
This version is not peer-reviewed
Submitted:
07 October 2023
Posted:
10 October 2023
You are already at the latest version
Notation | Definition |
---|---|
CA | Central Authority |
CRT | Chinese Remainder Theorem |
C-ITS | Cooperative Intelligent Transportation Systems |
CL | Certificateless (Schemes) |
CLAS | Certificateless Aggregate Signature (Schemes) |
CPPA | Conditional Privacy Preserving Authentication |
DSRC | Dedicated Short Range Communications |
EC(C) | Elliptic Curve (Cryptography) |
ECDLP | Elliptic Curve Discrete Logarithm Problem |
GS | Group Signature |
IBC | Identity Based Cryptography |
IBV | Identity Based Batch-Verification (Schemes) |
KGC | Key Generation Center |
MAC | Message Authentication Code |
OBU | On Board Unit |
PKI | Public Key Infrastructure |
PID | Pseudo Identity |
PWD | Password |
RID | Real Identity |
RSU | Road Side Unit |
TA/TTP | Trusted Authority/Trusted Third Party |
TPD | Tamper Proof Device |
TRA/TRM | Tracing Authority/Tracing Manager |
VANET | Vehicular Adhoc Network |
V2I | Vehicle-to-Infrastructure |
V2V | Vehicle-to-Vehicle |
V2X | Vehicle-to-Everything |
Requirement | Description | Attacks | Protection |
---|---|---|---|
Availability | Timely arrival of critical information | Denial of service, spamming Blackhole, greyhole Malware |
Frequency hopping Channel Switching IDS |
Authentication | Messages are sent by a legitimate user | Impersonation Sybil Wormhole, tunneling |
Digital Signatures MAC Tags IDS |
Integrity | Message contents have not been modified | Message/broadcast tampering Replay |
Digital Signatures MAC Tags |
Conditional Privacy | Only authorized entities have access to user identity | Location extraction attacks ID disclosure attacks |
Pseudonyms Group Signatures |
Non-repudiation | Sender cannot deny having sent the message | Repudiation attacks | Public Key Cryptography |
Confidentiality | Third party cannot extract meaningful information from any message | Eavesdropping Traffic Analysis |
Encryption |
Phase | Scheme | Comments |
---|---|---|
Phase | Scheme | Comments |
---|---|---|
Setup: TA= KGC+TRM |
, defines | Cyclic groups of order respectively |
defined over finite field by the equation , | and . We take point to be the generator of | |
KGC’s secret key | ||
KGC computes | generator of elliptic curve | |
TRM randomly chooses | TRM’s secret key | |
TRM computes | ||
PID Generation |
pseudonym validity time Note: TRM can compute: |
|
generates as: , | ||
PPK Gen. | ||
to securely | partial private key of vehicle | |
checks: | ||
USK Gen | randomly chooses | user secret key of vehicle |
Re-computable by verifier | ||
the public key of | ||
Signing | randomly chooses | |
computes | ||
Message | ||
Signature | ||
sends: | ||
Verifying | such that | Mitigates replay attacks |
(Proof: LHS: → RHS) | ||
Agg. sign | , , , | |
for freshness | ||
randomly chooses | here is the receiver/verifier | |
computes | ERROR: should be | |
computes | ||
computes | ||
Batch Verify | computes | pair |
computes | ||
checks if (Proof: LHS: → RHS) | ||
computes (Proof: LHS →RHS) |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 MDPI (Basel, Switzerland) unless otherwise stated