MAAC: Message Authentication Acceleration Protocol for Vehicular Ad Hoc Networks
- 1 November 2009
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
Vehicular ad hoc networks (VANETs) adopt the public key infrastructure (PKI) and certificate revocation lists (CRLs) to reliably secure the network. In any PKI system, the authentication of a received message is performed by checking that the certificate of the sender is not included in the current CRL, and verifying the authenticity of the certificate and signature of the sender. In this paper, we propose a message authentication acceleration (MAAC) protocol for VANETs, which replaces the time-consuming CRL checking process by an efficient revocation check process. The revocation check process uses a keyed hash message authentication code (HMAC), where the key used in calculating the HMAC is shared only between non-revoked on-board units (OBUs). In addition, the MAAC protocol uses a novel probabilistic key distribution, which enables non-revoked OBUs to securely share and update a secret key. By conducting security analysis and performance evaluation, the MAAC protocol is demonstrated to be secure and efficient.Keywords
This publication has 14 references indexed in Scilit:
- Security certificate revocation list distribution for vanetPublished by Association for Computing Machinery (ACM) ,2008
- Certificate revocation list distribution in vehicular communication systemsPublished by Association for Computing Machinery (ACM) ,2008
- An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor NetworksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- Securing vehicular ad hoc networksJournal of Computer Security, 2007
- GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks*Journal of Computer Security, 2006
- Random key predistribution schemes for sensor networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- A key-management scheme for distributed sensor networksPublished by Association for Computing Machinery (ACM) ,2002
- Identity-Based Encryption from the Weil PairingLecture Notes in Computer Science, 2001
- The Elliptic Curve Digital Signature Algorithm (ECDSA)International Journal of Information Security, 2001
- Password authentication with insecure communicationCommunications of the ACM, 1981