Edge-Assisted Hierarchical Batch Authentication Scheme for VANETs

Document Type

Article

Publication Title

IEEE Transactions on Vehicular Technology

Abstract

With the development of novelinformation technologies and transportation systems, vehicular ad hoc networks (VANETs) have become an important means to improve drivers' driving experience and reduce road accidents. There are still some issues regarding vehicle privacy information security and information transmission efficiency in VANETs. To address these challenges, edge nodes are utilized to verify signatures in some existing work, which can reduce the computational overhead of the trusted authority (TA) and improve the efficiency of authentication schemes. Although authentication efficiency has been improved, these schemes also bring potential security risks. Edge nodes located in outdoor environments are vulnerable to attack, which may result in problems with verification. The TA may verify security parameters twice, such as identities or signatures, resulting in a redundant authentication problem. An authentication scheme assisted by edge nodes is proposed in this article as a solution to this problem. Road-side units (RSUs) serve as edge nodes to verify messages from vehicles and generate lists of valid and invalid messages via a batch detection algorithm, to assist the TA in checking authentication results. Furthermore, the TA can get a correct and valid message list only by a batch check of RSUs results. The proposed scheme also provides an efficient solution to the problem of authentication. In addition, by delegating most authentication tasks to RSUs, the overall efficiency of the scheme is improved. For example, when 100 messages are generated, the batch authentication overhead and transmission overhead of the proposed scheme are approximately 98$%$ and 61$%$ of the ECC-based scheme proposed by He et al. The security analysis and experimental analysis demonstrate that the proposed scheme meets the security requirements of VANETs and has a smaller computational overhead and communication cost than previous work.

First Page

1

Last Page

11

DOI

10.1109/TVT.2023.3305556

Publication Date

9-25-2023

Keywords

Authentication, authentication, batch, Computational efficiency, Computational modeling, edge computing, Electronic mail, Privacy, Protocols, Security, Vehicular ad hoc networks (VANETs)

Comments

IR Deposit conditions:

OA version (pathway a) Accepted version

No embargo

When accepted for publication, set statement to accompany deposit (see policy)

Must link to publisher version with DOI

Publisher copyright and source must be acknowledged

Share

COinS