ALI: Anonymous Lightweight Inter-Vehicle Broadcast Authentication with Encryption

نویسندگان

چکیده

Wireless broadcast transmission enables Inter-vehicle or Vehicle-to-Vehicle (V2V) communication among nearby vehicles. This supports latency-critical applications for improved safety and maybe optimized traffic. However, V2V is vulnerable to cyber attacks involving message manipulation. Mechanisms are required ensure both authenticity integrity of data, while maintaining drivers privacy against surveillance. Considering the limited computational resources vehicles possibility high traffic density scenarios, authentication processes should have low overhead. Prior research has produced multiple protocol proposals based on digital signatures, hash functions, Message Authentication Codes (MACs). To date, there no computationally efficient secure scheme tolerable by resource-constrained On-Board Units (OBUs) in heavy conditions. paper provides a new secure, efficient, privacy-preserving proposing Anonymous Lightweight (ALI) with encryption. ALI level anonymity combining beacon The cryptographic overhead only 149 bytes, can handle approximately 700 messages every 100 milliseconds. demonstrates suitability scenarios. We show security efficiency our proposal conducting proof performance analysis.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Anonymous broadcast encryption with an untrusted gateway

We propose a verifiable and anonymous broadcast encryption scheme, where an 'untrusted' gateway can verify incoming communication flows to ensure only the intended anonymous receivers in the target domain can receive them. This scenario is interesting while the privacy of receivers should be considered. The difficulty in this setting is how to achieve both confidentiality of the message and ano...

متن کامل

Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts

In the standard setting of broadcast encryption, information about the receivers is transmitted as part of the ciphertext. In several broadcast scenarios, however, the identities of the users authorized to access the content are often as sensitive as the content itself. In this paper, we propose the first broadcast encryption scheme with sublinear ciphertexts to attain meaningful guarantees of ...

متن کامل

Unconditionally Secure Anonymous Encryption and Group Authentication

Anonymous channels or similar techniques that can achieve sender’s anonymity play important roles in many applications. However, they will be meaningless if cryptographic primitives containing his identity is carelessly used during the transmission. The main contribution of this paper is to study the security primitives for the above problem. In this paper, we first define unconditionally secur...

متن کامل

Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing

Traditionally, a ciphertext from an identity-based broadcast encryption can be distributed to a group of receivers whose identities are included in the ciphertext. Once the ciphertext has been created, it is not possible to remove any intended receivers from it without conducting decryption. In this paper, we consider an interesting question: how to remove target designated receivers from a cip...

متن کامل

Enhanced Outsider-anonymous Broadcast Encryption with Subset Difference Revocation

This paper puts forward an efficient broadcast encryption in public key setting employing ternary tree subset difference method for revocation. It provides outsider anonymity disabling the revoked users from getting any information of message and concealing the set of subscribed users from the revoked users. Our approach utilizes composite order bilinear group setting and exhibits significant i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Dependable and Secure Computing

سال: 2022

ISSN: ['1941-0018', '1545-5971', '2160-9209']

DOI: https://doi.org/10.1109/tdsc.2022.3164436