Loading...

Analysis of Authentication and Privacy Schemes in VANETs and Proposing Two Related Schemes

Amani, Mohamad Reza | 2022

82 Viewed
  1. Type of Document: M.Sc. Thesis
  2. Language: Farsi
  3. Document No: 55374 (05)
  4. University: Sharif University of Technology
  5. Department: Electrical Engineering
  6. Advisor(s): Mohajeri, Javad; Salmasizadeh, Mahmoud
  7. Abstract:
  8. Nowadays, intelligent transportation systems have become possible and practical with the help of vehicular ad-hoc networks. This network is a subset of mobile ad-hoc networks introduced and studied separately due to its unique properties. With the help of vehicular ad-hoc networks, the level of road and drivers safety is increased and safety messages can be sent to road side units or other vehicles, so real-time is one of the main requirements of these networks. Other advantages of implementing such networks include providing entertainment and internet access services.On the other hand, these networks face various challenges, including routing data packets, preserving security requirements, and resisting various attacks against the network .Among the security requirements, authentication and privacy of vehicles are the most critical requirements, but in addition to these, other security requirements such as unlinkability, unforgeability of identity and message, confidentiality, resistance against Sibel attacks and collusion attacks should be considered .By providing an appropriate protocol and using cryptographic structures, an authentication scheme can be proposed that preserves many security requirements, but it is important to note that this scheme should be efficient in communication computation overhead.In this thesis, two schemes are introduced. One is authentication and privacy-preserving with confidentiality, and the other is authentication only with privacy-preserving; both schemes are based on tamper-proof device and pseudonyms, in such a way car's privacy is preserved and the roadside unit can authenticate the car. In the proposed schemes, the batch authentication process can be implemented by relying on the homomorphism feature of the special kind of hash function, which is one of the main strengths of the proposed designs.One of the security requirements in Vehicular Ad-hoc networks is the confidentiality of information sent by the vehicle to the road side unit; this requirement is achieved by using id-based encryption in one of the schemes. Then, authentication and privacy-preserving in both proposed schemes are formally examined using Avispa tools. Some other security requirements of the schemes, such as unforgeability of identity and message, unlinkability and resistance against collusion, and Sybel attacks, are analyzed. It will be shown that the performance of the introduced scheme is better than the existing schemes in terms of security requirements and resistance against attacks, especially the Sybel attack, which is one of the main vulnerabilities of most authentication and privacy-preserving schemes. In the end, the overhead of communication and computation of the suggested schemes is reviewed. It is shown that the proposed schemes have the best communication and computation overhead against existing schemes. Also, the computation overhead of confidential scheme is more than other schemes, but in terms of communication overhead with respect to preserving confidentiality it has acceptable performance
  9. Keywords:
  10. Vehicular Ad Hoc Network (VANET) ; Privacy Preserving ; Authentication ; Hash Function ; Homomorphic Authenticators ; Pseudonym System ; Sybil Attack

 Digital Object List

 Bookmark

No TOC