A secure and efficient message authentication protocol for VANETs with privacy preservation

In this paper, a secure and efficient protocol for vehicular ad hoc networks has been proposed that ensures both message authentication and privacy preservation. As safety related message may contain life critical information, it is a necessity that the sender as well as the message are authentic. T...

Full description

Saved in:
Bibliographic Details
Published in2011 World Congress on Information and Communication Technologies pp. 880 - 885
Main Authors Mishra, B., Panigrahy, S. K., Tripathy, Tarini Charan, Jena, D., Jena, S. K.
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.12.2011
Subjects
Online AccessGet full text
ISBN1467301272
9781467301275
DOI10.1109/WICT.2011.6141364

Cover

Abstract In this paper, a secure and efficient protocol for vehicular ad hoc networks has been proposed that ensures both message authentication and privacy preservation. As safety related message may contain life critical information, it is a necessity that the sender as well as the message are authentic. The proposed scheme is based on a secure elliptic curve digital signature algorithm approach. The proposed scheme supports conditional privacy, where the user's location can be revealed at the willingness of the user. Apart from this, the scheme is secure against attacks like DoS, Sybil and Grey/Black Hole attacks. From the comparison with previously proposed schemes, it is found that the proposed scheme as based on elliptic curve discrete logarithmic problem, outperforms existing algorithms based on integer factoring and discrete logarithmic problem.
AbstractList In this paper, a secure and efficient protocol for vehicular ad hoc networks has been proposed that ensures both message authentication and privacy preservation. As safety related message may contain life critical information, it is a necessity that the sender as well as the message are authentic. The proposed scheme is based on a secure elliptic curve digital signature algorithm approach. The proposed scheme supports conditional privacy, where the user's location can be revealed at the willingness of the user. Apart from this, the scheme is secure against attacks like DoS, Sybil and Grey/Black Hole attacks. From the comparison with previously proposed schemes, it is found that the proposed scheme as based on elliptic curve discrete logarithmic problem, outperforms existing algorithms based on integer factoring and discrete logarithmic problem.
Author Jena, D.
Tripathy, Tarini Charan
Mishra, B.
Jena, S. K.
Panigrahy, S. K.
Author_xml – sequence: 1
  givenname: B.
  surname: Mishra
  fullname: Mishra, B.
  email: bharati@iiit-bh.ac.in
  organization: Int. Inst. of Inf. Technol., Bhubaneswar, India
– sequence: 2
  givenname: S. K.
  surname: Panigrahy
  fullname: Panigrahy, S. K.
  email: skp.nitrkl@gmail.com
  organization: Nat. Inst. of Technol., Rourkela, India
– sequence: 3
  givenname: Tarini Charan
  surname: Tripathy
  fullname: Tripathy, Tarini Charan
  email: tarinitripathy@yahoo.com
  organization: Kalam Inst. of Technol., Berhampur, India
– sequence: 4
  givenname: D.
  surname: Jena
  fullname: Jena, D.
  email: dr.djena@gmail.com
  organization: Int. Inst. of Inf. Technol., Bhubaneswar, India
– sequence: 5
  givenname: S. K.
  surname: Jena
  fullname: Jena, S. K.
  email: skjena@nitrkl.ac.in
  organization: Nat. Inst. of Technol., Rourkela, India
BookMark eNo1kMFOwzAQRI0ACVryAYiLfyDBaztOfIyiApUquERw4FA5zpoatQmK3aL-PRGUuTzN7Gq1mhm56IceCbkFlgEwff-2rJuMM4BMgQSh5BlJdFGCVIVgwFV5Tmb_puBXJAnhk01SSnPJr8l7RQPa_YjU9B1F57z12Ee6wxDMx5Tu42by3proh55-jUMc7LClbhjpa_W8aAL99nEzDfzB2ONEDDgefrdvyKUz24DJiXPSPCya-ildvTwu62qVes1iWjKWM80Lh9blIm-10ojcOaWgBWnACFnmtu1y5yxIJzphoS2NtUa7DvJOzMnd31mPiOvpkZ0Zj-tTHeIHlIhXJg
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/WICT.2011.6141364
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE/IET Electronic Library
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE/IET Electronic Library
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9781467301268
9781467301251
1467301264
1467301256
EndPage 885
ExternalDocumentID 6141364
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
AAWTH
ADFMO
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IEGSK
IERZE
OCL
RIE
RIL
ID FETCH-LOGICAL-i90t-80050927fecf535b969ee2ff661b14a1a3485cbd5ffc14f3d3c1b8acca9fd15d3
IEDL.DBID RIE
ISBN 1467301272
9781467301275
IngestDate Wed Aug 27 04:14:19 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i90t-80050927fecf535b969ee2ff661b14a1a3485cbd5ffc14f3d3c1b8acca9fd15d3
PageCount 6
ParticipantIDs ieee_primary_6141364
PublicationCentury 2000
PublicationDate 2011-Dec.
PublicationDateYYYYMMDD 2011-12-01
PublicationDate_xml – month: 12
  year: 2011
  text: 2011-Dec.
PublicationDecade 2010
PublicationTitle 2011 World Congress on Information and Communication Technologies
PublicationTitleAbbrev WICT
PublicationYear 2011
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0000669242
Score 1.5539011
Snippet In this paper, a secure and efficient protocol for vehicular ad hoc networks has been proposed that ensures both message authentication and privacy...
SourceID ieee
SourceType Publisher
StartPage 880
SubjectTerms Anonymity
Authentication
Authenticity
ECDSA
Message authentication
Privacy
Protocols
Public key
VANETs
Vehicles
Title A secure and efficient message authentication protocol for VANETs with privacy preservation
URI https://ieeexplore.ieee.org/document/6141364
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NSwMxEA1tT55UWvGbHDy67SbZ7DbHUlqqYPGwasFDyacUcSt2K-ivd5LdVhQP3jYJWUIy8DIvM28QuoAbgWOBeqMCHBTLRKRilkTaANhJydK-9MnJN9N0cpdcz_isgS63uTDW2hB8Zrv-M7zlm6Vee6qsB1BCWJo0URPMrMrV2vIpAJ3gStCQu5V6s6UZ3Ug61W1ev2qSWPQeroZ5JeBZ__RHdZUALuNddLNZVhVT8txdl6qrP38pNv533Xuo853Gh2-3ALWPGrZoo8cBXnmO3WJZGGyDggTMxi--FsoT9PqQ96KsqTzsdRyWYCwYLrf4fjAd5SvsuVsYWLxL_YF9IO2G2O2gfDzKh5OorrAQLURcAjp59ReaOasdZ1yJVFhLnQPMViSRRLKkz7Uy3DlNEscM00TB4WkpnCHcsAPUKpaFPUQYxvqaCps5xhKTgtdCYuW0gMnMZbE6Qm2_L_PXSkNjXm_J8d_dJ2gncLchbOQUtcq3tT0D8C_VeTj1L7firCc
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT8IwFG4UD3pSA8bf9uDRwba2gx4JgYAC8TCVxAPpT0OMw8gw0b_e125gNB68bW26NN1Lvve-vvc9hC7BI7DEU28xhwDFEB7IkNBAaQA7IUjSEq44eTRO-nf0esImG-hqXQtjjPHJZ6buHv1dvp6rpaPKGgAlEUnoJtoC3KesqNZaMyoAnhBMxL56K3GGGzfjlahT-c7Ke80o5I2HQSctJDzLz_7or-LhpbeLRquNFVklz_VlLuvq85dm4393vodq34V8-HYNUftow2RV9NjGC8eyGywyjY3XkIDV-MV1Q3mCUZf0nuUlmYedksMczAWDe4vv2-NuusCOvYWJ2btQH9il0q6o3RpKe9200w_KHgvBjIc54JPTf4mb1ijLCJM84cbE1gJqy4iKSBDaYkpqZq2KqCWaqEjC71OCWx0xTQ5QJZtn5hBhmGupmJumJYTqBOKWKJRWcVhMbDOUR6jqzmX6WqhoTMsjOf57-AJt99PRcDocjG9O0I5ncn0SySmq5G9LcwauQC7PvQV8Aez8r3Q
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2011+World+Congress+on+Information+and+Communication+Technologies&rft.atitle=A+secure+and+efficient+message+authentication+protocol+for+VANETs+with+privacy+preservation&rft.au=Mishra%2C+B.&rft.au=Panigrahy%2C+S.+K.&rft.au=Tripathy%2C+Tarini+Charan&rft.au=Jena%2C+D.&rft.date=2011-12-01&rft.pub=IEEE&rft.isbn=9781467301275&rft.spage=880&rft.epage=885&rft_id=info:doi/10.1109%2FWICT.2011.6141364&rft.externalDocID=6141364
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467301275/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467301275/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467301275/sc.gif&client=summon&freeimage=true