403
Views
11
CrossRef citations to date
0
Altmetric
Review Articles

A Comprehensive Survey on Certificateless Aggregate Signature in Vehicular Ad Hoc Networks

&

References

  • M. Azees, P. Vijayakumar, and L. J. Deborah, “Comprehensive survey on security services in vehicular ad-hoc networks,” IET Intel. Transport Syst., Vol. 10, no. 6, pp. 379–88, 2016. doi:10.1049/iet-its.2015.0072
  • Z. Lu, G. Qu, and Z. Liu, “A survey on recent advances in vehicular network security, trust, and privacy,” IEEE Trans. Intell. Transp. Syst., Vol. 20, no. 2, pp. 760–76, 2019. doi:10.1109/TITS.2018.2818888
  • X. Zhu, S. Jiang, L. Wang, and H. Li, “Efficient privacy-preserving authentication for vehicular ad hoc network,” IEEE Trans. Veh. Tech., Vol. 63, no. 2, pp. 907–19, 2014. doi:10.1109/TVT.2013.2294032
  • X. Li, J. Tan, A. Liu, P. Vijayakumar, N. Kumar, and M. Alazab, “A novel UAV-enabled data collection scheme for intelligent transportation system through UAV speed control,” IEEE Trans. Intell. Transp. Syst., Vol. 22, no. 4, pp. 2100–10, 2021. doi:10.1109/TITS.2020.3040557
  • Dedicated Short Range Communications (DSRC), [Online]. Available: http://grouper.ieee.org/groups/scc32/dsrc/index.html.
  • M. Raya, and J. P. Hubaux, “Securing vehicular ad hoc networks,” J. Comput. Secur., Vol. 15, no. 1, pp. 39–68, 2007. doi:10.3233/JCS-2007-15103
  • M. S. Bouassida, “Authentication vs. privacy within vehicular ad hoc networks,” Int. J. Netwo Secur., Vol. 13, no. 3, pp. 121–34, 2011.
  • R. Lu, X. Lin, H. Zhu, P.-H. Ho, and X. Shen. “ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications,” in Proc. 27th Conf. Comput. Commun. (INFOCOM), Phoenix, USA, pp. 1229–37, 2008.
  • M. Azees, P. Vijayakumar, and L. J. Deborah, “Eaap: efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad hoc networks,” IEEE Trans. Intell. Transp. Syst., Vol. 18, no. 9, pp. 2467–76, 2017. doi:10.1109/TITS.2016.2634623
  • X. Lin, X. Sun, X. Wang, C. Zhang, P.-H. Ho, and X. Shen, “Tsvc: timed efficient and secure vehicular communications with privacy preserving,” IEEE Trans. Wireless Commun., Vol. 7, no. 12, pp. 4987–98, 2008. doi:10.1109/T-WC.2008.070773
  • C.-C. Chang, J.-H. Yang, and Y.-C. Wu, “An efficient and practical authenticated communication scheme for vehicular ad hoc networks,” Int. J. Netwo Secur., Vol. 17, no. 6, pp. 702–7, 2015.
  • C.-C. Lee, Y.-M. Lai, and P.-J. Cheng. An efficient multiple session key establishment scheme for VANET group integration,” in 2015 IEEE Intelligent Vehicles Symposium (IV), Seoul, Korea, pp. 1316–21, 2015.
  • S.-F. Tzeng, S.-J. Horng, T. Li, X. Wang, P.-H. Huang, and M. K. Khan, “Enhancing security and privacy for identity-based batch verification scheme in VANETs,” IEEE Trans. Veh. Technol, Vol. 66, no. 4, pp. 3235–48, 2017. doi:10.1109/TVT.2015.2406877
  • Z. Jianhong, X. Min, and L. Liying, “On the security of a secure batch verification with group testing for VANET,” Int. J. Netwo Secur., Vol. 16, no. 4, pp. 313–20, 2014.
  • L. Wang, D. Zheng, R. Guo, C.-C. Hu, and C.-M. Jing, “A blockchain-based privacy-preserving authentication scheme with anonymous identity in vehicular networks,” Int. J. Netwo Secur., Vol. 22, no. 6, pp. 981–90, 2020.
  • A. K. Malhi, and S. Batra, “An efficient certificateless aggregate signature scheme for vehicular ad hoc networks,” Discrete Math. Theor. Comput. Sci., DMTCS, Vol. 17, no. 1, pp. 317–38, 2015.
  • S.-J. Horng, S.-F. Tzeng, P.-H. Huang, X. Wang, T. Li, and M. K. Khan, “An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks,” Inf. Sci. (Ny), Vol. 317, pp. 48–66, 2015. doi:10.1016/j.ins.2015.04.033
  • J. Li, H. Yuan, and Y. Zhang. Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks,” eprint, IACR, Tech. Rep., 2016., 2016.
  • J. Cui, J. Zhang, H. Zhong, R. Shi, and Y. Xu, “An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks,” Inf. Sci. (Ny), Vol. 451–452, pp. 1–15, 2018.
  • P. Kumar, and V. Sharma, “On the security of certificateless aggregate signature scheme in vehicular ad hoc networks,” Adv. Intell. Syst. and Comput., AICS, Vol. 583, pp. 715–22, 2018.
  • X. Yang, C. Chen, T. Ma, Y. Li, and C. Wang. “An improved certificateless aggregate signature scheme for vehicular ad-hoc networks,” in Proc. IEEE 3rd Adv. Inf. Technol., Electron. Autom. Control Conf., 2018, pp. 2334–8.
  • P. Kumar, S. Kumari, V. Sharma, X. Li, A. K. Sungaiah, and S. K. H. Islam, “Secure CLS and CL-AS schemes designed for VANETs,” J. Supercomput, Vol. 75, pp. 3076–98, 2019. doi:10.1007/s11227-018-2312-y
  • H. Zhong, S. Han, J. Cui, J. Zhang, and Y. Xu, “Privacy-preserving authentication scheme with full aggregation in VANET,” Inf. Sci. (Ny), Vol. 476, pp. 211–21, 2019. doi:10.1016/j.ins.2018.10.021
  • I. A. Kamil, and S. O. Ogundoyin, “An improved certificateless aggregate signature scheme without bilinear pairings for vehicular ad hoc networks,” J. Inform. Secur. Appl., Vol. 44, pp. 184–200, 2019.
  • Y. Zhao, Y. Hou, L. Wang, S. Kumari, M. K. Khan, and H. Xiong, “An efficient certificateless aggregate signature scheme for the internet of vehicles,” Trans. Emerging. Tel. Tech., Vol. 31, no. 5, pp. 1–20, 2019.
  • X. Hu, W. Tan, C. Yu, C. Ma, and H. Xu. Security analysis of certificateless aggregate signature scheme in VANETs,” in 2019 12th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI), Suzhou, China, 2019.
  • N. Zhao, and G. Zhang. Privacy-protected certificateless aggregate signature scheme in VANET,” in 2019 11th International Conference on Wireless Communications and Signal Processing (WCSP), Xi’an, China, 2019.
  • I. Ali, M. Gervais, E. Ahene, and F. Li, “A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs,” J. Syst. Archit., Vol. 99, 101636, 2019. doi:10.1016/j.sysarc.2019.101636
  • K. Li, M. H. Au, W. H. Ho, and Y. L. Wang, “An efficient conditional privacy-preserving authentication scheme for vehicular ad hoc networks using online/offline certificateless aggregate signature,” in Provsec 2019, R. Steinfeld, and T. H. Yuen Eds. Springer, Cham: LNCS 11821, 2019, pp. 59–76.
  • C. Li, G. Wu, L. Xing, F. Zhu, and L. Zhao, “An efficient certificateless aggregate signature scheme designed for VANET,” Comput. Mater Continua, Vol. 63, no. 2, pp. 725–42, 2020.
  • Z. Xu, D. He, N. Kumar, and K.-K. R. Choo, “Efficient certificateless aggregate signature scheme for performing secure routing in VANETs,” Secur. Commun. Netw., Vol. 2020, no. Art. no. 5276813, pp. 1–12,  2020.
  • I. A. Kamil, and S. O. Ogundoyin, “On the security of privacy-preserving authentication scheme with full aggregation in vehicular ad hoc network,” Secur. Priv., Vol. 3, no. 3, pp. 1–20, 2020.
  • X. Hu, W. Tan, C. Ma, and H. Xu. “Certificateless aggregate signature scheme with high efficiency in vehicular ad-hoc network,” in EITCE 2020: Proceedings of the 2020 4th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, 2020, pp. 1008–12.
  • Q. Mei, H. Xiong, J. Chen, M. Yang, S. Kumari, and M. K. Khan, “Efficient certificateless aggregate signature with conditional privacy preservation in IoV,” IEEE Syst. J., Vol. 15, no. 1, pp. 245–256, 2021.
  • B. Thumbur, G. S. Rao, P. V. Reddy, N. B. Gayathri, D. V. R. K. Reddy, and M. Padmavathamma, “Efficient and secure certificateless aggregate signature-based authentication scheme for vehicular ad hoc networks,” IEEE Internet Things J., Vol. 8, no. 3, pp. 1908–20, 2021. doi:10.1109/JIOT.2020.3019304
  • T. F. Vallent, D. Hanyurwimfura, and C. Mikeka, “Efficient certificate-less aggregate signature scheme with conditional privacy-preservation for vehicular ad hoc networks enhanced smart grid system,” Sensors, Vol. 21, pp. 2900, 2021. doi:10.3390/s21092900
  • X. Ye, G. Xu, X. Cheng, Y. Li, and Z. Qin, “Certificateless-based anonymous authentication and aggregate signature scheme for vehicular ad hoc networks,” Wirel. Commun. Mob. Comput., Vol. 2021, pp. Article ID 6677137, 2021.
  • Y. Ren, X. Li, S.-F. Sun, X. Yuan, and X. Zhang, “Privacy-preserving batch verification signature scheme based on blockchain for vehicular ad-hoc networks,” J. Inform. Secur. Appl., Vol. 58, pp. 102698, 2021.
  • Y. Wang, H. Zhong, Y. Xu, and J. Cui, “Ecpb: efficient conditional privacy preserving authentication scheme supporting batch verification for VANETs,” Int. J. Netwo Secur., Vol. 18, no. 2, pp. 374–82, 2016.
  • S. Ibrahim, M. Hamdy, and E. Shaaban, “Towards an optimum authentication service allocation and availability in VANETs,” Int. J. Netwo Secur., Vol. 19, no. 6, pp. 955–65, 2017.
  • R. Castro, and R. Dahab. Efficient certificateless signatures suitable for aggregation,” in IACR Cryptology, 2007.
  • A. Shamir, “Identity-based cryptosystem and signatures schemes,” in Advances in Cryptology – Crypto ‘84, Blakley G.R., Chaum D. Eds. Springer, Berlin, Heidelberg: LNCS 196, 1984, pp. 47–53.
  • W. Yang, M.-R. Chen, and G.-Q. Zeng, “Cryptanalysis of two strongly unforgeable identity-based signatures in the standard model,”,” Int. J. Netw. Secur., Vol. 20, no. 6, pp. 1194–9, 2018.
  • S. S. Al-Riyami, and K. G. Paterson. Certificateless public key cryptography,” in Advances in Cryptology – ASIACRYPT 2003, LNCS 2894, pp. 452–73, 2003.
  • G. Sharma, S. Bala, and A. K. Verma, “An improved RSA-based certificateless signature scheme for wireless sensor networks,” Int. J. Netw. Secur., Vol. 18, no. 1, pp. 82–9, 2016.
  • Z. Xu, D. He, P. Vijayakumar, K.-K. R. Choo, and L. Li, “Efficient NTRU lattice-based certificateless signature scheme for medical cyber-physical systems,” J. Med. Syst., Vol. 44, no. 92, 2020.
  • J. Xie, Y. Hu, J. Gao, W. Gao, and M. Jiang, “Efficient certificateless signature scheme on ntru lattice,” KSII Trans. Internet Inform. Syst., Vol. 10, no. 10, pp. 5190–208, 2016.
  • F. Qu, F.-Y. Wang, and L. Yang, “Intelligent transportation spaces: vehicles, traffic, communications, and beyond,” IEEE Commun. Mag., Vol. 48, no. 11, pp. 136–42, 2010. doi:10.1109/MCOM.2010.5621980
  • Y. Ming, and H. Cheng, “Efficient certificateless conditional privacy-preserving authentication scheme in VANETs,” Mob. Inf. Syst., Vol. 2019, pp. 1–19, 2019.
  • K.-A. Shim, “Cpas: an efficient conditional privacy-preserving authentication scheme for vehicular sensor networks,” IEEE Trans. Veh. Technol., Vol. 61, no. 4, pp. 1874–83, 2013. doi:10.1109/TVT.2012.2186992
  • D. Boneh, and M. Franklin. “Identity-based encryption from the weil pairing,” in Proceedings of Crypto, 2001, LNCS 2139, pp. 213–29.
  • A. Miyaji, M. Nakabayashi, and S. Takano, “New explicit conditions of elliptic curve traces for FR- reduction,” IEICE Trans. Fund, Vol. E84, no. A, pp. 1234–43, 2001.
  • D. Boneh, B. Lynn, and H. Shacham. “Short signatures from the weil pairing,” in Proc. Asiacrypt, 2001, LNCS 2248, pp. 514–32.
  • V. Miller. “Use of elliptic curves in cryptography,” in Proc. Adv. Cryptol. (Crypto), 1985, pp. 417–26.
  • N. Koblitz, “Elliptic curve cryptosystems,” Math. Comput, Vol. 48, no. 177, pp. 203–9, 1987. doi:10.1090/S0025-5718-1987-0866109-5
  • M. M. Rasslan, “A stamped hidden-signature scheme utilizing the elliptic curve discrete logarithm problem,” Int. J. Netw Secur., Vol. 13, no. 1, pp. 49–57, 2011.
  • S.-G. Liu, X. Heng, and Y.-M. Li, “Anti-SPA scalar multiplication algorithm on twisted edwards elliptic curve,” Int. J. Netw. Secur., Vol. 22, no. 6, pp. 1015–1021, 2020.
  • P. Vijayakumar, M. Azees, A. Kannan, and L. J. Deborah, “Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks,” IEEE Trans. Intell. Transp. Syst., Vol. 17, no. 4, pp. 1015–28, 2016. doi:10.1109/TITS.2015.2492981
  • E. F. Cahyadi, and M.-S. Hwang, “An improved efficient anonymous authentication with conditional privacy-preserving scheme for VANETs,” PLoS ONE, Vol. 16, no. 9, pp. e0257044, 2021.
  • J. Shen, D. Liu, X. Chen, J. Li, N. Kumar, and P. Vijayakumar, “Secure real-time traffic data aggregation with batch verification for vehicular cloud in VANETs,” IEEE Trans. Veh. Technol., Vol. 69, no. 1, pp. 807–17, 2020. doi:10.1109/TVT.2019.2946935
  • Y.-C. Chen, and R. Tso, “A survey on security of certificateless signature schemes,” IETE Tech. Rev., Vol. 33, no. 2, pp. 115–21, 2015. doi:10.1080/02564602.2015.1049223
  • Y. Zhang, R. H. Deng, G. Han, and D. Zheng, “Secure smart health with privacy-aware aggregate authentication and access control in internet of things,” J. Netw. Comput. Appl., Vol. 123, pp. 89–100, 2018. doi:10.1016/j.jnca.2018.09.005
  • Y. Ming, and X. Shen, “Pcpa: a practical certificateless conditional privacy preserving authentication scheme for vehicular ad hoc networks,” Sensors, Vol. 8, no. 5, pp. 1573, 2018. doi:10.3390/s18051573
  • D. Wang, and J. Teng, “Probably secure certificateless aggregate signature algorithm for vehicular ad hoc network,” J. Electronica Inf. Technol, Vol. 40, no. 1, pp. 11–7, 2018.
  • S. O. Ogundoyin, “An autonomous lightweight conditional privacy-preserving authentication scheme with provable security for vehicular ad-hoc networks,” Int. J. Comput. Appl, Vol. 42, pp. 1–16, 2018.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.