{"title":"一种高效车载Ad Hoc网络认证方案的安全性分析","authors":"Saeed Zarbi, Seyed Amir Mortazavi, P. Salehpour","doi":"10.1109/ISCISC51277.2020.9261912","DOIUrl":null,"url":null,"abstract":"As the number of machines increases, the need for a communication channel between machines becomes more and more felt. VANET provides vehicle to infrastructure and vehicle to vehicle communication for weather alerts, control of traffic congestion, and navigation services.Security and performance are two essential issues in VANET applications. Security concerns such as confidentiality, privacy, and authentication of network nodes are crucial issues. In recent years, several protocols have been proposed to meet these security requirements. Most of these schemes are proposed in three categories: Public Key Infrastructure, ID-based, and MAC-based authentication schemes.One of the recently proposed schemes for VANETs is Bayat et al.’s scheme. Unfortunately, the used digital signature in this scheme can be forged. This vulnerability allows an adversary to send invalid messages in a network without detection by authorities. This vulnerability is a severe threat to an authentication problem in this scheme.","PeriodicalId":206256,"journal":{"name":"2020 17th International ISC Conference on Information Security and Cryptology (ISCISC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Security Analysis of an Efficient Authentication Scheme for Vehicular Ad Hoc Networks\",\"authors\":\"Saeed Zarbi, Seyed Amir Mortazavi, P. Salehpour\",\"doi\":\"10.1109/ISCISC51277.2020.9261912\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As the number of machines increases, the need for a communication channel between machines becomes more and more felt. VANET provides vehicle to infrastructure and vehicle to vehicle communication for weather alerts, control of traffic congestion, and navigation services.Security and performance are two essential issues in VANET applications. Security concerns such as confidentiality, privacy, and authentication of network nodes are crucial issues. In recent years, several protocols have been proposed to meet these security requirements. Most of these schemes are proposed in three categories: Public Key Infrastructure, ID-based, and MAC-based authentication schemes.One of the recently proposed schemes for VANETs is Bayat et al.’s scheme. Unfortunately, the used digital signature in this scheme can be forged. This vulnerability allows an adversary to send invalid messages in a network without detection by authorities. This vulnerability is a severe threat to an authentication problem in this scheme.\",\"PeriodicalId\":206256,\"journal\":{\"name\":\"2020 17th International ISC Conference on Information Security and Cryptology (ISCISC)\",\"volume\":\"36 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-09-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 17th International ISC Conference on Information Security and Cryptology (ISCISC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISCISC51277.2020.9261912\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 17th International ISC Conference on Information Security and Cryptology (ISCISC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCISC51277.2020.9261912","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security Analysis of an Efficient Authentication Scheme for Vehicular Ad Hoc Networks
As the number of machines increases, the need for a communication channel between machines becomes more and more felt. VANET provides vehicle to infrastructure and vehicle to vehicle communication for weather alerts, control of traffic congestion, and navigation services.Security and performance are two essential issues in VANET applications. Security concerns such as confidentiality, privacy, and authentication of network nodes are crucial issues. In recent years, several protocols have been proposed to meet these security requirements. Most of these schemes are proposed in three categories: Public Key Infrastructure, ID-based, and MAC-based authentication schemes.One of the recently proposed schemes for VANETs is Bayat et al.’s scheme. Unfortunately, the used digital signature in this scheme can be forged. This vulnerability allows an adversary to send invalid messages in a network without detection by authorities. This vulnerability is a severe threat to an authentication problem in this scheme.