Corpus ID: 227012744

Secure Location-Aware Authentication and Communication for Intelligent Transportation Systems

@article{Ghaleshahi2020SecureLA,
  title={Secure Location-Aware Authentication and Communication for Intelligent Transportation Systems},
  author={Nima Shoghi Ghaleshahi and Ramyad Hadidi and Jaewon Lee and Jun Chen and Arthur Siqueira and Rahul Rajan and Shaan Dhawan and Pooya Shoghi Ghalehshahi and Hyesoon Kim},
  journal={ArXiv},
  year={2020},
  volume={abs/2011.08936}
}
Intelligent transportation systems (ITS) are expected to effectively create a stand-alone network for secure communication among autonomous agents. In such a dynamic and fast-changing network with high-speed agents, verifying the authenticity and integrity of messages while taking preventive action (e.g., applying brakes) within tens of milliseconds is one of the main challenges. In such a brief moment after receiving a message, the agent not only must verify the integrity and authenticity of… Expand

Figures and Tables from this paper

References

SHOWING 1-10 OF 39 REFERENCES
Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks
TLDR
It is shown from the analysis and simulations that an RSU can verify 26 500 signatures per second simultaneously with the help of the proxy vehicles, and the time needed to verify 3000 signatures in the PBAS can be reduced by 88% compared with existing batch-based authentication schemes. Expand
Efficient Message Authentication Scheme for VANET
TLDR
This paper proposes a novel message authentication scheme which reduces a delay for the verification of messages and can be suitable to transmitting time-critical messages and supports to privacy preservation and can robust against DoS attacks. Expand
A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs
TLDR
This paper presents a password-based conditional privacy preserving authentication and group-key generation (PW-CPPA-GKA) protocol for VANETs, which is lightweight in terms computation and communication since it can be designed without bilinear-pairing and elliptic curve. Expand
Security of vehicular ad-hoc networks: A comprehensive survey
TLDR
How the research reflects the evolutionary growth of security attacks with its future prophesy, based upon the past developments in the area of computer security is discussed. Expand
TEAM: Trust-Extended Authentication Mechanism for Vehicular Ad Hoc Networks
TLDR
This paper proposes a decentralized lightweight authentication scheme called trust-extended authentication mechanism (TEAM) for vehicle-to-vehicle communication networks that adopts the concept of transitive trust relationships to improve the performance of the authentication procedure and only needs a few storage spaces. Expand
Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A survey
TLDR
Several authentication and privacy schemes have been classified and discussed their mechanisms, strengths and limitations, security requirements, attacks, and performance parameters and identified some open research challenges in the domain of VANETs security. Expand
An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks
TLDR
This paper proposes a security system for VANETs to achieve privacy desired by vehicles and traceability required by law enforcement authorities, in addition to satisfying fundamental security requirements including authentication, nonrepudiation, message integrity, and confidentiality. Expand
Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks
TLDR
The rigorous formal and informal security analysis shows that the proposed scheme is capable to defend various malicious attacks and the ns-2 simulation demonstrates the practicability of the proposed schemes in VANET environment. Expand
2FLIP: A Two-Factor Lightweight Privacy-Preserving Authentication Scheme for VANET
TLDR
2FLIP provides strong privacy preservation that the adversaries can never succeed in tracing any vehicles, even with all RSUs compromised, and achieves strong nonrepudiation that any biological anonym driver could be conditionally traced, even if he is not the only driver of the vehicle. Expand
ACPN: A Novel Authentication Framework with Conditional Privacy-Preservation and Non-Repudiation for VANETs
TLDR
This paper proposes a novel framework with preservation and repudiation (ACPN) for VANETs, and introduces the public-key cryptography to the pseudonym generation, which ensures legitimate third parties to achieve the non-repudiation of vehicles by obtaining vehicles' real IDs. Expand
...
1
2
3
4
...