• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Xie Yong, Wu Libing, Zhang Yubo, Ye Luyao. Anonymous Mutual Authentication and Key Agreement Protocol in Multi-Server Architecture for VANETs[J]. Journal of Computer Research and Development, 2016, 53(10): 2323-2333. DOI: 10.7544/issn1000-1239.2016.20160428
Citation: Xie Yong, Wu Libing, Zhang Yubo, Ye Luyao. Anonymous Mutual Authentication and Key Agreement Protocol in Multi-Server Architecture for VANETs[J]. Journal of Computer Research and Development, 2016, 53(10): 2323-2333. DOI: 10.7544/issn1000-1239.2016.20160428

Anonymous Mutual Authentication and Key Agreement Protocol in Multi-Server Architecture for VANETs

More Information
  • Published Date: September 30, 2016
  • Vehicular ad hoc networks (VANETs) is a large network that runs according to a special communication protocol to achieve wireless communication and information exchange among vehicles and roadside infrastructures, pedestrian, Internet and so on. With the development of cloud computing, more and more cloud services for VANETs will emerge. However, the services are usually provided by different servers. Thus, vehicle users have to register different servers and remember a lot of usernames and passwords. Aimed to the goal that a user can do mutual authentication with all servers after hisher one-time registration, the multi-server architecture authentication protocols have been proposed and applied in many areas, but no one focuses on VANETs. The instantaneity of communication in VAENTs poses a new challenge on the multi-server architecture authentication protocol. The existing multi-server architecture authentication protocols use the complex bilinear pairing operations, which cannot meet the strict requirements of VANETs on authentication and communication costs. In this paper, a new efficient anonymous mutual authentication and key agreement protocol for the multi-server environment of VANETs is proposed. The proposed protocol decreases the complexity of protocol by using elliptic curve cryptosystem (ECC) to construct a simple authentication way, and provides the function of random anonymity to protect the privacy of vehicle. The security of the proposed protocol is proved in the random oracle model. Performance analysis shows that compared with the most recent mutual authentication protocols, our protocol decreases the computation and communication cost at least 61% and 62% in the mutual authentication and key agreement phase, and can better meet the computation and communication cost requirements of VANETs.
  • Related Articles

    [1]Wang Bin, Zhang Lei, Zhang Guoyin. A Gradual Sensitive Indistinguishable Based Location Privacy Protection Scheme[J]. Journal of Computer Research and Development, 2020, 57(3): 616-630. DOI: 10.7544/issn1000-1239.2020.20190086
    [2]Zeng Ji, ian, Wang Tian, Jia Weijia, Peng Shaoliang. A Survey on Sensor-Cloud[J]. Journal of Computer Research and Development, 2017, 54(5): 925-939. DOI: 10.7544/issn1000-1239.2017.20160492
    [3]Ren Lifang, Wang Wenjian, Xu Hang. Uncertainty-Aware Adaptive Service Composition in Cloud Computing[J]. Journal of Computer Research and Development, 2016, 53(12): 2867-2881. DOI: 10.7544/issn1000-1239.2016.20150078
    [4]Liu Bingyi, Wu Libing, Jia Dongyao, Nie Lei, Ye Luyao, Wang Jianping. Data Uplink Strategy in Mobile Cloud Service Based Vehicular Ad Hoc Network[J]. Journal of Computer Research and Development, 2016, 53(4): 811-823. DOI: 10.7544/issn1000-1239.2016.20151150
    [5]Zhou Changli, Ma Chunguang, Yang Songtao. Location Privacy-Preserving Method for LBS Continuous KNN Query in Road Networks[J]. Journal of Computer Research and Development, 2015, 52(11): 2628-2644. DOI: 10.7544/issn1000-1239.2015.20140532
    [6]Li Jiguo, Shi Yuerong, Zhang Yichen. A Privacy Preserving Attribute-Based Encryption Scheme with User Revocation[J]. Journal of Computer Research and Development, 2015, 52(10): 2281-2292. DOI: 10.7544/issn1000-1239.2015.20150580
    [7]Li Hui, Sun Wenhai, Li Fenghua, Wang Boyang. Secure and Privacy-Preserving Data Storage Service in Public Cloud[J]. Journal of Computer Research and Development, 2014, 51(7): 1397-1409.
    [8]Lü Xiaobo, Guo Yao, and Chen Xiangqun. A Splitting-Based Cloud Storage Mechanism for Digital Images[J]. Journal of Computer Research and Development, 2014, 51(5): 1129-1135.
    [9]Pan Xiao, Hao Xing, and Meng Xiaofeng. Privacy Preserving Towards Continuous Query in Location-Based Services[J]. Journal of Computer Research and Development, 2010, 47(1): 121-129.
    [10]Xu Mingwei, Hu Chunming, Liu Xudong, and Ma Dianfu. Research and Implementation of Web Service Differentiated QoS[J]. Journal of Computer Research and Development, 2005, 42(4): 669-675.

Catalog

    Article views (1440) PDF downloads (698) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return