DocumentCode :
539453
Title :
An Anonymous Authentication Scheme for Telematics Applications
Author :
Lin, Chun-Li
Author_Institution :
Dept. of Comput. Sci. & Inf. Eng., Shu-Te Univ., Yanchao, Taiwan
fYear :
2010
fDate :
13-15 Dec. 2010
Firstpage :
594
Lastpage :
597
Abstract :
For telematics applications, entity authentication between vehicles and roadside units (RSUs) with vehicle anonymity plays an important role on providing security and privacy. In 2009, Yim, Choi, and Kim proposed an anonymous authentication protocol in Vehicular Ad-hoc Networks (VANETs) for communications between vehicles and RSUs. The Yim-Choi-Kim scheme employs a traceable ring signature with t-times anonymity as a building block. The t-times anonymity is for the privacy requirement of movement tracking avoidance, however, it has a weakness in the strong unlinkability property. This paper improves the weakness of the Yim-Choi-Kim scheme.
Keywords :
cryptographic protocols; message authentication; vehicular ad hoc networks; Yim-Choi-Kim scheme; anonymous authentication scheme; entity authentication; t-times anonymity; telematics applications; vehicular ad-hoc networks; Ad hoc networks; Authentication; Cryptography; Indexes; Privacy; Protocols; Vehicles; VANET; anonymous authentication; movement tracking avoidance; strong unlinkability; telematics;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Genetic and Evolutionary Computing (ICGEC), 2010 Fourth International Conference on
Conference_Location :
Shenzhen
Print_ISBN :
978-1-4244-8891-9
Electronic_ISBN :
978-0-7695-4281-2
Type :
conf
DOI :
10.1109/ICGEC.2010.152
Filename :
5715502
Link To Document :
بازگشت