International Journal of Information Technology & Computer Science ( IJITCS )
Vehicular ad hoc network (VANET) allows the vehicles can share traffic information or communicate with each other. However, some shared information maybe come from a malicious user who wants to mislead others. For this reason, in 2011, Chen et al. proposed a threshold anonymous announcement scheme to ensure the reliability of the shared information. Unfortunately, we found that the description of their scheme about the generating process of an important parameter is not enough to be feasible. In order to solve the problem of the Chen et al.’s scheme, in this paper, we propose some simple modifications on the Chen et al.’s scheme .
: Vehicular ad hoc networks; Threshold verification; Reliability; Conditional privacy.
- ASTM E2213-03, “Standard Specification for Telecommunications and Information Exchange Between Roadside and Vehicle Systems 8212; 5 GHz Band Dedicated Short Range Communications (DSRC) Medium Access Control (MAC) and Physical Layer (PHY) Specifications,” ASTM org., http://www.astm.org/Standards/E2213.htm, 2011.
- G. Calandriello, P. Papadimitratos, J.-P. Hubaux, and A. Lioy, “Efficient and Robust Pseudonymous Authentication in VANET,” In Proceedings of the fourth ACM International Workshop on Vehicular Ad Hoc Networks (VANET 2007), pp. 19-28, 2007.
- C. C. Chang and C. Y. Lee, “A smart card-based authentication scheme uing user identify cryptography,” International Journal of Network Security, 15(2):139-147, 2013.
- L. Chen, S. L. Ng, and G. Wang, “Threshold Anonymous Announcement in VANETs,” IEEE Journal on Selected Areas in Communications, 29(3):605-615, 2011.
- A. K. Das, “Improving identity-based random key establishment scheme for largescale hierarchical wireless sensor networks,” International Journal of Network Security, 14(1):1-21, 2012.
- V. Daza, J. Domingo-Ferrer, F. Seb´e and A. Viejo, “Trustworthy Privacypreserving Car-generated Announcements in Vehicular Ad Hoc Networks,” IEEE Transactions on Vehicular Technology, 58(4):1876-1886, 2009.
- J. R. Douceur, “The Sybil Attack,” Peer to Peer Systems, 2429(2002):251-260, 2002.
- D. He, W. Zhao, and S. Wu, “Security analysis of a dynamic ID-based authentication scheme for multi-server environment using smart cards,” International Journal of Network Security, 15(5):350-356, 2013.
- D. Huang, S. Misra, M. Verma, and G. Xue, “PACP: An Efficient Pseudonymous Authentication-Based Conditional Privacy Protocol for VANETs,” IEEE Transactions on Intelligent Transportation Systems, 12(6):736-746, 2011.
- J. Kar, “ID-based deniable authentication protocol based on Diffie-Hellman problem on elliptic curve,” International Journal of Network Security, 15(5):357-364, 2013.
- G. Kounga, T. Walter, and S. Lachmund, “Proving Reliability of Anonymous Information in VANETs,” IEEE Transactions on Vehicular Technology, 58(6):29772989, 2009.
- X. Lin, X. Sun, P.-H. Ho, and X. Shen, “GSIS: Secure Vehicular Communications with Privacy Preserving,” IEEE Transactions on Vehicular Technology, 56(6):34423456, 2007.
- M. Naveed, W. Habib, U. Masud, U. Ullah, and G. Ahmad, “Reliable and low cost RFID based authentication system for large scale deployment,” International Journal of Network Security, 14(3):173-179, 2012.
- P. Papadimitratos, L. Buttyan, T. Holczer, E. Schoch, J. Freudiger, M. Raya, Z. Ma, F. Kargl, A. Kung, and J. P. Hubaux, “Secure Vehicular Communication Systems: Design and Architecture,” IEEE Communications Magazine, 46(11):100109, 2008.
- R. Ramasamy and A. P. Muniyandi, “An efficient password authentication scheme for smart card,” International Journal of Network Security, 14(3):180-186, 2012.
- Y. Toor, P. Muhlethaler, and A. Laouiti, “Vehicle Ad Hoc Networks: Applications and Related Technical Issues,” IEEE Communications Surveys & Tutorials, 10(3):74-87, 2008.
- C. Zhang, P. H. Ho, and J. Tapolcai, “On Batch Verification with Group Testing for Vehicular Communications,” Wireless Networks, 17(8):1851-1865, 2011.