999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

A Fair Blind Signature Scheme to Revoke Malicious Vehicles in VANETs

2019-02-22 07:33:00XiaoliangWangJianmingJiangShujingZhaoandLiangBai
Computers Materials&Continua 2019年1期

Xiaoliang Wang , Jianming Jiang , Shujing Zhao and Liang Bai

Abstract: With the rapid development of IoT (Internet of Things), VANETs (Vehicular Ad-Hoc Networks) have become an attractive ad-hoc network that brings convenience into people’s lives. Vehicles can be informed of the position, direction, speed and other real-time information of nearby vehicles to avoid traffic jams and accidents. However,VANET environments could be dangerous in the absence of security protection. Because of the openness and self-organization of VANETs, there are plenty of malicious pathways. To guarantee vehicle security, the research aims to provide an effective VANET security mechanism that can track malicious vehicles as necessary. Therefore,this work focuses on malicious vehicles and proposes an anonymous authentication scheme in VANETs based on the fair blind signature to protect vehicle security.

Keywords: VANETs, fair blind signature, trusted third-party, anonymous authentication.

1 Introduction

The rapid development of wireless communication technology has enabled mobile ad-hoc networks to be widely adopted in the ubiquitous Internet of Things, along with the rise of VANETs (Vehicular Ad-Hoc Networks).

As the infrastructureless and decentralized nature of VANET, it is easy to suffer from various malicious attacks. The smart vehicles can be classified into cooperative or malicious ones with the help of machine learning techniques, such as support vector machine [Wahab, Mourad, Otrok et al. (2016)], extreme learning machine [Xiang, Zhao,Li et al. (2018)], etc. But, privacy-preserving is a challenge and the main threat that VANETs face is also the issue of privacy. The previous research of VANETs mainly focus on authentication [Calandriello, Papadimitratos, Hubaux et al. (2007); Han, Sang and Bae (2017); Lin, Sun, Ho et al. (2007); Oulhaci, Omar, Harzine et al. (2017); Tian and Qiang (2012)] defense against Sybil attacks [Feng, Li, Chen et al. (2017); Hussain and Oh (2014); Wu (2017); Zhang, Liang, Lu et al. (2014)] along with DDoS attack prevention [Biswas, Mi?i? and Misic (2012); Hamieh, Ben-Otheman and Mokedad(2009); Hussein, Elhajj, Chehab et al. (2017)]. In 2011, hackers successfully invaded a vehicle through Bluetooth and wireless network technology. In July 2013, a company engineer successfully caused a vehicle brake failure by controlling its speed and making the engine stop. In March 2014, a security consultant put forward inherent password security vulnerabilities in the 2014 Black Hat ASIA conference in Singapore, which would lead to the leaking of the personal information of the driver. Additionally, on February 9, 2015, Massachusetts Senator Ed Markey published a report about risks of VANETs, which disclosed although more and more vehicle manufacturers wanted to apply wireless sensor devices and applications in vehicles, they would be unable to prevent hackers from impairing vehicular security [Markey (2015)].

In VANETs, there are two main communication types: V2V (Vehicle to Vehicle) and V2I (Vehicle to Infrastructure). Hartong et al. [Hartong, Goel and Wijesekera (2007)]proposed an algorithm that was based on the geographic location concept [Denning and Macdoran (1996)], which used the vehicle location, the speed and travelling time information as factors to protect the communication of V2I. In 2008, Zhang et al. [Zhang,Lu, Ho et al. (2008)] presented a pseudonym application based on blind signature technology for vehicles between two Remote Sensing Utilities (RSUs), which can prevent infrastructure from peeking into the trails of vehicles, but unable to revoke a malicious vehicle. Feng [Feng (2010)] used Combined Public Key (CPK) and blind signature to propose a pseudonym generation scheme to satisfy security and privacy requirements, which is more efficient in computation and communication cost. Proxy Blind Signature Scheme (PBSS) [Tian and Qiang (2012)] proposed a signature scheme based on blind signature and proxy multi-signature certification technology, which solved authentication problems between the nodes. The use of two signature technologies realized onboard interactivity authentication and improved communication safety.Experimental results show PBSS can meet the on-board node mobility and complexity, as well as the authentication efficiency and offering good performance.

However, these articles do not provide traceability capability for VANETs, especially when a vehicle abuses the blind signature. Essentially, the malicious vehicle can abuse the anonymity of the blind signature to commit an array of fraudulent behaviors. The question is how to constrain abusive behaviors in reality? It was never addressed in the abovementioned articles.

This work proposes a lightweight anonymous authentication scheme, which can be used to track anonymity abuse in VANETs. Comparing with previous anonymous authentication schemes in VANETs, the proposal is the only one that can achieve privacy protection,authentication and traceability.

2 Overview of fair blind signature

Conventional blind signature is that the signers of the document never know what they have signed, which may cause blind abuse. Some malicious users will use the feature of the blind mechanism to cheat the signer to sign unwilling contents. As opposed to blind signature, fair blind signature [Stadler, Piveteau and Camenisch (1995)] adds a trusted third party to avoid this phenomenon because the trusted third party is able to supervise the signing process. Upon finding the signed contents are tampered with, it can track the malicious user in a timely fashion. Compared to blind signature mechanism, the revocable anonymity is brought into the Fair blind signature mechanism, in which the authority can link an issuing session to the resulting signature and track a signature to the user who possesses it.

3 System architecture

Fig. 1 illustrates a communication scenario and mode between the vehicles, Trust Managers(TMs) and RSUs. Communication mode includes communication amongst the vehicles and between vehicles and infrastructures. In this figure, it mainly introduces the communication between the vehicles, infrastructure, TMs and information transmission mode.

Figure 1: VANET communication model

Fig. 2 shows the communication relationship between vehicles and Trust Manager (TM),along with the RSU in the VANET. In our scheme, before a vehicle engages into daily traffic, it must register at the TM. In this process, firstly the vehicle signs the message using its own identity information, and then sends it to the nearby TM. The process generates the parameters of the signature process, transmission information and the signature algorithm. After the TM receives this information, it will verify whether the information is from the authentic vehicle.

Then the TM uses the same signature algorithm to sign information, and then sends it back to the vehicle. After the vehicle receives the returning information, it will check whether these messages have changed or not. If not, it will send this signature to the RSU,which the vehicle will keep for future use. The RSU then starts its verification if there is the true signature of TM, it will complete the blind signing, and transmit the final signature to the vehicle.

Figure 2: VANET architecture

Tab. 1 describes the meaning of the main symbolic parameters used in the communication process:

Table 1: Parameter table

4 Signing model

A transportation management department allocates different symbolic parametersto every region, which represents local identification information. These parameters are embedded in the OBUs of vehicles. Every vehicle in the region is denotedThe public key of vehicles in the region are disclosed during running.

As per the above introduction, before vehicles connect with the RSU they must have a registration process, so that they can use signatures from a local TM to represent their identities to connect with the RSU. The registration process includes the two steps:

1. The vehicle will sign its own privacy information and send it to the local TM. Then the TM verifies and registers it. If successful, TM will sign the information and return it to the vehicle;

2. After the vehicle has received the TM’s signature, it will check whether the signature is tampered with or not. If the information has not been tampered, the vehicle will use the TMs’ signatures as its identity certificate to communicate with RSUs anonymously. In addition, the TM also distributes a different electronic license to each vehicle.

4.1 System initialization phase

Use a set R to denote these RSUs in the region

Figure 3: Key generation

Figure 4: Initialization phase

4.2 Registration at TM of vehicles

In this process, the TM gives each vehicle a valid license before driving on-road and storing related information about the vehicle. Then the vehicle will sign its own information and send it to the local TM for registration. Assume the vehicle is denoted as Vi:

1. Vi randomly selects a number r, 1

2. After the TM has received the above information, it calculatesand then according to the ID provided by Vi, it finds the corresponding user signature algorithm DSA( ) for next verification. If M’=m, the TM records some information of the vehicle, such as r, m and M. Finally, TM adopts the same signature algorithm DSA( ) to sign them, and returns (m, DSA (m)) to the vehicle Vi.

3. After vehicle Vi has received (m, DSA (m)) from TM, it will verify whether its information has been modified or not. If the information has not been tampered with, the vehicle Vi sends (m, DSA (m)) to a certain RSU, which Vi will communicate in future.

Figure 5: Registration Phase

Figure 6: Validation phase

Figure 7: OBU Validation phase

4.3 Signing

1. When the roadside infrastructure R receives (m, DSA (m)), it will be verified. If successful, R signs it and calculatesthen returns the signature to vehicle Vi as well as storing the signature and (m, DSA (m)).

Figure 8: Blind signature

Figure 9: RSU validation phase

4.4 Verification

The verification process begins by processing the blind factor γ to obtain the inverse of γ,then according to the blind factor γ to restore the message S. Next, the public key e is used to verify the signature. Finally,is calculated to verify whether the information has been tampered or altered by an external party.

Figure 10: Verification process

Figure 11: OBU Validation phase

5 Proof and security analysis

1. The vehicle Vi uses the secure hash function to make the message M anonymous. It calculates M and makes the message M blind. Because the message M is blinded, but carries the signature of Vi, this process makes other vehicles unable to impersonate the identity of Vi to cheat the TM. The difficulty of faking Vi is equal to attacking the DSA( ) algorithm.

2. The vehicle manager TM can only register the message M sent by vehicle Vi, but not modify it. Otherwise it will fail to pass the verification of Vi. If the TM wants to modify the message M, it must find a random parameter to meet the verification equation of M, which is equivalent to attacking the RSA algorithm.

3. The information that vehicle Vi sends to the infrastructure R is verified by TM, so it cannot be arbitrarily modified by Vi. The difficulty of vehicle Vi tampering the message is equal to the difficulty of breaking the DSA( ) algorithm.

4. Once the infrastructure R finds the transmitted message is incorrect, it can track the real vehicle with the help of the TM.

6 Analysis of experimental results

In order to verify the validity of the scheme, the simulation experiment was carried out.C++ language is used to develop experiments on a Microsoft Windows 7 system with a 2.6 Ghz Intel Core i5 processor and 4 GB memory. The experimental data set is generated by the algorithm of Thomas Brink [Brinkhoff (2002)] and widely recognized by the mobile data management industry. Oldenburg mobile network (5*5km) is used as the input to generate mobile data sets and communication node objects.

According to the VANET security standard of IEEE 1609.2 [IEEE Standard (2006)], the definition of message format is described in Tab. 2.

Table 2: Message format for vehicle

In Tab. 2, MID is message identifier defining the different message types in the scheme.MData carries valid data for the message including the relevant information of the vehicle, such as vehicle speed, location, direction and so on. TS is timestamp recording the time of message generation to prevent invalid packets and replay attacks. Sign is the blind signature. TTL is the survival time that is used to terminate the transmission of messages to prevent the flooding of messages.

Consider the use of a blind signature in a communication cycle. If all messages are carried with this blind signature, the communication cost is huge. If only the previous single messages have blind signatures and the later messages no longer contain the blind signatures, the success rate of message authentication is low. Therefore, we want to find that how many messages containing this blind signature are suitable. It is assumed that the number of messages in a communication cycle is y and z is the number of messages containing blind signatures. Using the receiving ratio model of data packet provided in the literature [Calandriello, Papadimitratos, Hubaux et al. (2007)],message transmission distancemessage receiving rate. The success rate of message authentication is defined asFig. 12 shows the impact of the message transmission distance to the receiving rate. As transmission distance increases, the success rate of messages decreases.

Figure 12: Impact of distance

Fig. 13 depicts the relationship between the number of messages of a blind signature Z,message transmission distanceand the success receiving rate of messagesWith the decrease of distance, the message receiving rate is improved. Whenis fixed,the success receiving rate of messages increases correspondingly with the increase of the number of messages containing a blind signature. It can be seen from the figure that whenthe success receiving rate of messages is greater than 90%. Therefore, we take the number of messages contain a blind signature z=4. Under this condition, system is able to meet the verification requirements of most of the vehicle authentications.

Tab. 3 compares our scheme with the PBSS [Tian and Qiang (2012)] in anonymity,authentication and trace-ability. PBSS adopts the distributed proxy blind signature, which can avoid forgery attacks and meet authentication security, but not considering privacy protection and traceback of anonymous abusers.

Figure 13: Success authentication for different

Table 3: Scheme feature comparison

7 Conclusions

In this paper, an anonymous authentication scheme based on the fair blind signature is proposed for communication between vehicles and RSU in VANETs, along with the relative merits of the scheme against alternative communication approaches. A simulation experiment was then conducted to assess the merits of the Fair blind signature scheme, which includes an evaluation of the success receiving rate of messages. From the security analysis and experimental results, the proposed scheme is proven to possess anonymity, traceability and authentication functionalities. In the future, it should be an interesting issue to transmit the signature by steganography [Zhang, Qin, Zhang et al.(2018)] because of its excellent imperceptible in human sense system and statistic [Yang,Luo, Lu et al. (2018)].

Acknowledgments:This project is supported by Internet innovation and open platform base of the education Ministry of China (No. KJRP1401), the cooperative education project of the education Ministry of China (No. 201702113002), US-China Computer Science Research Centre of Nanjing University of Information Science and Technology (No.KJR16059), Hunan Natural Science Foundation (No. 2018JJ2138), Education Department of Hunan Province (No. 17B096).

主站蜘蛛池模板: 毛片卡一卡二| 蜜芽国产尤物av尤物在线看| 亚洲一道AV无码午夜福利| 亚洲中文字幕在线一区播放| 成人国产精品2021| 亚洲AV成人一区二区三区AV| 国产精品永久免费嫩草研究院| 日韩av手机在线| 伊人久久精品无码麻豆精品| 色婷婷亚洲十月十月色天| 嫩草在线视频| 亚洲人免费视频| 国产一二三区视频| 在线免费亚洲无码视频| 欧美不卡二区| 中文字幕首页系列人妻| 看你懂的巨臀中文字幕一区二区| 亚洲AⅤ永久无码精品毛片| 色精品视频| 91青青视频| 精品伊人久久大香线蕉网站| 午夜无码一区二区三区| 天天色天天操综合网| 97超碰精品成人国产| 久久亚洲国产一区二区| 四虎精品黑人视频| 在线欧美日韩国产| 中文无码精品A∨在线观看不卡| 高清视频一区| 91精品专区| 中文字幕无码电影| 免费大黄网站在线观看| 亚洲成A人V欧美综合天堂| 国产欧美视频一区二区三区| 久久久久无码精品| 露脸国产精品自产在线播| 免费看黄片一区二区三区| 国产女人在线视频| 无码精品国产dvd在线观看9久| 麻豆精品国产自产在线| 亚洲无线国产观看| 成人精品免费视频| 欧美第一页在线| 91久久偷偷做嫩草影院精品| 美女被操91视频| 日韩美一区二区| 日本尹人综合香蕉在线观看| 色成人亚洲| 国产精品青青| 狼友av永久网站免费观看| 成人一区在线| 国产97区一区二区三区无码| 国产精品无码一区二区桃花视频| 久久综合丝袜长腿丝袜| 91系列在线观看| 国产精品太粉嫩高中在线观看| 亚洲天堂视频在线免费观看| 国产精品v欧美| 久久人妻xunleige无码| 欧美有码在线| 欧美日韩北条麻妃一区二区| 亚洲人成影院在线观看| 国产精品香蕉在线| 国产女人在线观看| 99视频在线免费看| 一级成人a毛片免费播放| 国产三区二区| 中文无码精品a∨在线观看| 亚洲va在线观看| 国产亚洲欧美在线人成aaaa| 91丝袜美腿高跟国产极品老师| 国产真实乱子伦视频播放| AV不卡在线永久免费观看| 妇女自拍偷自拍亚洲精品| 手机永久AV在线播放| 亚洲国产看片基地久久1024| 国产成人精彩在线视频50| 波多野结衣第一页| 精品国产99久久| 日韩精品高清自在线| Jizz国产色系免费| 精品久久久久成人码免费动漫|