Next Article in Journal
Self-oscillating Water Chemiluminescence Modes and Reactive Oxygen Species Generation Induced by Laser Irradiation; Effect of the Exclusion Zone Created by Nafion
Next Article in Special Issue
Detection and Modeling of Cyber Attacks with Petri Nets
Previous Article in Journal
Application of Entropy and Fractal Dimension Analyses to the Pattern Recognition of Contaminated Fish Responses in Aquaculture
Previous Article in Special Issue
Block Access Token Renewal Scheme Based on Secret Sharing in Apache Hadoop
Open AccessArticle

Improving the Authentication Scheme and Access Control Protocol for VANETs

by 1,2,* and 2
Computer Center, Hsin Sheng Junior College of Medical Care and Management, No. 418, Kaoping Village, Lungtan Township, Taoyuan County 32544, Taiwan
Department of Information Management, National Central University, No. 300, Jhongda Rd., Jhongli City, Taoyuan County 32001, Taiwan
Author to whom correspondence should be addressed.
Entropy 2014, 16(11), 6152-6165;
Received: 10 August 2014 / Revised: 25 September 2014 / Accepted: 4 November 2014 / Published: 19 November 2014
Privacy and security are very important in vehicular ad hoc networks (VANETs). VANETs are negatively affected by any malicious user’s behaviors, such as bogus information and replay attacks on the disseminated messages. Among various security threats, privacy preservation is one of the new challenges of protecting users’ private information. Existing authentication protocols to secure VANETs raise challenges, such as certificate distribution and reduction of the strong reliance on tamper-proof devices. In 2011, Yeh et al. proposed a PAACP: a portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks. However, PAACP in the authorization phase is breakable and cannot maintain privacy in VANETs. In this paper, we present a cryptanalysis of an attachable blind signature and demonstrate that the PAACP’s authorized credential (AC) is not secure and private, even if the AC is secretly stored in a tamper-proof device. An eavesdropper can construct an AC from an intercepted blind document. Any eavesdropper can determine who has which access privileges to access which service. For this reason, this paper copes with these challenges and proposes an efficient scheme. We conclude that an improving authentication scheme and access control protocol for VANETs not only resolves the problems that have appeared, but also is more secure and efficient. View Full-Text
Keywords: vehicular ad hoc networks (VANETs); cryptanalysis; privacy; authentication; access control vehicular ad hoc networks (VANETs); cryptanalysis; privacy; authentication; access control
MDPI and ACS Style

Wu, W.-C.; Chen, Y.-M. Improving the Authentication Scheme and Access Control Protocol for VANETs. Entropy 2014, 16, 6152-6165.

Show more citation formats Show less citations formats

Article Access Map

Only visits after 24 November 2015 are recorded.
Back to TopTop