Efficient, fast and scalable authentication for VANETs

Chen Lyu, Dawu Gu, Xiaomei Zhang, Shifeng Sun, Yinqi Tang

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

15 Citations (Scopus)

Abstract

Vehicular Ad Hoc Networks (VANETs) enable vehicle-to-vehicle communication to enhance road safety and improve driving experience. To secure periodic single-hop beacon messages for VANET applications, digital signature is one of the fundamental security approaches. However, it is vulnerable as excessive signatures would exhaust the computational resources of vehicles. In this paper, we propose a novel authentication mechanism VSPT, VANET authentication with Signatures and Prediction-based TESLA, which combines the advantages of both Elliptic Curve Digital Signature Algorithm (ECDSA) and Prediction-based TESLA. Although ECDSA is computationally expensive, it provides authentication and non-repudiation. Prediction-based TESLA enables fast and efficient verification by exploiting the sender's ability to predict its own future beacons. Both theoretical analysis and simulation results show that VSPT outperforms either the signature or TESLA in not only lossless situations but also lossy environments.

Original languageEnglish
Title of host publication2013 IEEE Wireless Communications and Networking Conference (WCNC)
EditorsJiangzhou Wang
Place of PublicationPiscataway NJ USA
PublisherIEEE, Institute of Electrical and Electronics Engineers
Pages1768-1773
Number of pages6
ISBN (Print)9781467359399
DOIs
Publication statusPublished - 2013
Externally publishedYes
EventIEEE Wireless Communications and Networking Conference 2013 - Shanghai International Convention Center, Shanghai, China
Duration: 7 Apr 201310 Apr 2013
https://www.ieee.org/conferences_events/conferences/conferencedetails/index.html?Conf_ID=20702

Conference

ConferenceIEEE Wireless Communications and Networking Conference 2013
Abbreviated titleWCNC 2013
CountryChina
CityShanghai
Period7/04/1310/04/13
Internet address

Keywords

  • authentication
  • beacons
  • broadcast communication
  • signatures
  • VANETs

Cite this