Visible to the public On the Security of an Efficient Anonymous Authentication with Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks

TitleOn the Security of an Efficient Anonymous Authentication with Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks
Publication TypeConference Paper
Year of Publication2018
AuthorsKazemi, M., Delavar, M., Mohajeri, J., Salmasizadeh, M.
Conference NameIranian Conference on Electrical Engineering (ICEE)
Keywordsanonymity, anonymous authentication scheme, anonymous messaging, authentication, authentication protocol, authorisation, computational overhead, conditional privacy-preserving scheme, cryptographic protocols, EAAP protocol, electrical engineering, high computational communication overhead, impersonation attack, message authentication, message modification attack, privacy preserving, Protocols, pubcrawl, Public key, Receivers, replay attack, resilience, Resiliency, Scalability, security, security requirements, Trusted Authority range, VANET, vehicular ad hoc networks, vehicular ad hoc networks (VANETs)
Abstract

Design of anonymous authentication scheme is one of the most important challenges in Vehicular Ad hoc Networks (VANET). Most of the existing schemes have high computational and communication overhead and they do not meet security requirements. Recently, Azees et al. have introduced an Efficient Anonymous Authentication with Conditional Privacy-Preserving (EAAP) scheme for VANET and claimed that it is secure. In this paper, we show that this protocol is vulnerable against replay attack, impersonation attack and message modification attack. Also, we show that the messages sent by a vehicle are linkable. Therefore, an adversary can easily track the vehicles. In addition, it is shown that vehicles face with some problems when they enter in a new Trusted Authority (TA) range. As a solution, we propose a new authentication protocol which is more secure than EAAP protocol without increasing its computational and communication overhead.

URLhttps://ieeexplore.ieee.org/document/8472484
DOI10.1109/ICEE.2018.8472484
Citation KeykazemiSecurityEfficientAnonymous2018