A Lightweight BT-Based Authentication Scheme for Illegal Signatures Identification in VANETs
Research related to vehicular ad hoc networks (VANETs) has received significant attention in recent years. Despite all the advantages, the security and privacy in VANETs still become the main challenge that is widely open to discussion. The authentication scheme plays a substantial role to guarantee...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2022-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9999178/ |
_version_ | 1828084177569841152 |
---|---|
author | Eko Fajar Cahyadi Min-Shiang Hwang |
author_facet | Eko Fajar Cahyadi Min-Shiang Hwang |
author_sort | Eko Fajar Cahyadi |
collection | DOAJ |
description | Research related to vehicular ad hoc networks (VANETs) has received significant attention in recent years. Despite all the advantages, the security and privacy in VANETs still become the main challenge that is widely open to discussion. The authentication scheme plays a substantial role to guarantee the security and privacy of information circulation and verification efficiency in VANETs. In this high-density environment, a scalability issue would emerge when the number of message-signature pairs received by a roadside unit (RSU) or vehicles becomes large. This issue happens because those entities cannot sequentially verify each received signature according to the required time limit. Researchers believe that the symmetric cryptography-based authentication scheme provides a lightweight verification operation, which leads to low computation cost. Combined with the batch verification process, this approach can be beneficial. However, to the best of our knowledge, not many of those related schemes provide a realistic scenario regarding illegal signatures’ appearance. Could the system identify the forged messages? Is it still efficient enough to do such an operation? In this paper, we propose a lightweight binary tree-based (BT-based) authentication scheme with a batch verification mechanism, that could efficiently identify a modest amount of illegal signatures in the sum of messages. To even improve the operation, we combine our BT-based batch verification scheme with our vehicle reputation scoring system. By this approach, we can guarantee the best-case scenario (the most desirable condition) in our BT-based identification appear as much as possible. Hence, the computation cost can be kept low. |
first_indexed | 2024-04-11T04:19:56Z |
format | Article |
id | doaj.art-cd6e2d68c8d74ef6a555a1f03257a86d |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-04-11T04:19:56Z |
publishDate | 2022-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-cd6e2d68c8d74ef6a555a1f03257a86d2022-12-31T00:00:26ZengIEEEIEEE Access2169-35362022-01-011013386913388210.1109/ACCESS.2022.32323019999178A Lightweight BT-Based Authentication Scheme for Illegal Signatures Identification in VANETsEko Fajar Cahyadi0https://orcid.org/0000-0002-2585-9220Min-Shiang Hwang1https://orcid.org/0000-0001-5502-8033Department of Computer Science and Information Engineering, Asia University, Taichung, TaiwanDepartment of Computer Science and Information Engineering, Asia University, Taichung, TaiwanResearch related to vehicular ad hoc networks (VANETs) has received significant attention in recent years. Despite all the advantages, the security and privacy in VANETs still become the main challenge that is widely open to discussion. The authentication scheme plays a substantial role to guarantee the security and privacy of information circulation and verification efficiency in VANETs. In this high-density environment, a scalability issue would emerge when the number of message-signature pairs received by a roadside unit (RSU) or vehicles becomes large. This issue happens because those entities cannot sequentially verify each received signature according to the required time limit. Researchers believe that the symmetric cryptography-based authentication scheme provides a lightweight verification operation, which leads to low computation cost. Combined with the batch verification process, this approach can be beneficial. However, to the best of our knowledge, not many of those related schemes provide a realistic scenario regarding illegal signatures’ appearance. Could the system identify the forged messages? Is it still efficient enough to do such an operation? In this paper, we propose a lightweight binary tree-based (BT-based) authentication scheme with a batch verification mechanism, that could efficiently identify a modest amount of illegal signatures in the sum of messages. To even improve the operation, we combine our BT-based batch verification scheme with our vehicle reputation scoring system. By this approach, we can guarantee the best-case scenario (the most desirable condition) in our BT-based identification appear as much as possible. Hence, the computation cost can be kept low.https://ieeexplore.ieee.org/document/9999178/Authenticationbatch verificationsecurity and privacysymmetric cryptographyVANETs |
spellingShingle | Eko Fajar Cahyadi Min-Shiang Hwang A Lightweight BT-Based Authentication Scheme for Illegal Signatures Identification in VANETs IEEE Access Authentication batch verification security and privacy symmetric cryptography VANETs |
title | A Lightweight BT-Based Authentication Scheme for Illegal Signatures Identification in VANETs |
title_full | A Lightweight BT-Based Authentication Scheme for Illegal Signatures Identification in VANETs |
title_fullStr | A Lightweight BT-Based Authentication Scheme for Illegal Signatures Identification in VANETs |
title_full_unstemmed | A Lightweight BT-Based Authentication Scheme for Illegal Signatures Identification in VANETs |
title_short | A Lightweight BT-Based Authentication Scheme for Illegal Signatures Identification in VANETs |
title_sort | lightweight bt based authentication scheme for illegal signatures identification in vanets |
topic | Authentication batch verification security and privacy symmetric cryptography VANETs |
url | https://ieeexplore.ieee.org/document/9999178/ |
work_keys_str_mv | AT ekofajarcahyadi alightweightbtbasedauthenticationschemeforillegalsignaturesidentificationinvanets AT minshianghwang alightweightbtbasedauthenticationschemeforillegalsignaturesidentificationinvanets AT ekofajarcahyadi lightweightbtbasedauthenticationschemeforillegalsignaturesidentificationinvanets AT minshianghwang lightweightbtbasedauthenticationschemeforillegalsignaturesidentificationinvanets |