A simple authentication scheme and access control protocol for VANETs

Wei Chen Wu, Yi Ming Chen

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In 2011, Yeh et al. proposed a PAACP: A portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks. However, PAACP in the authorization phase is breakable and cannot maintain privacy in VANETs. In this paper, we present a cryptanalysis of an attachable blind signature and demonstrate that the PAACP’s Authorized Credential (AC) is not secure and private even if the AC is secretly stored in a tamper-proof device. An eavesdropper can construct an AC from an intercepted blind document. Any eavesdropper can determine who has which access privileges to access which service. For this reason, this paper copes with these challenges and proposes an efficient scheme. We conclude that a simple authentication scheme and access control protocol for VANETs not only resolves the problems that have appeared, but also is more secure and efficient.

Original languageEnglish
Title of host publicationUbiquitous Computing Application and Wireless Sensor, UCAWSN-2014
EditorsYi Pan, Gangman Yi, Han-Chieh Chao, James J. Park
PublisherSpringer Verlag
Pages259-272
Number of pages14
ISBN (Electronic)9789401796170
DOIs
StatePublished - 2015
Event2nd FTRA International Conference on Ubiquitous Computing Application and Wireless Sensor Network, UCAWSN 2014 - , Korea, Republic of
Duration: 7 Jul 201410 Jul 2014

Publication series

NameLecture Notes in Electrical Engineering
Volume331
ISSN (Print)1876-1100
ISSN (Electronic)1876-1119

Conference

Conference2nd FTRA International Conference on Ubiquitous Computing Application and Wireless Sensor Network, UCAWSN 2014
Country/TerritoryKorea, Republic of
Period7/07/1410/07/14

Keywords

  • Access control
  • Authentication
  • Cryptanalysis
  • Privacy
  • VANET

Fingerprint

Dive into the research topics of 'A simple authentication scheme and access control protocol for VANETs'. Together they form a unique fingerprint.

Cite this