FS-CLAS: A Forward-Secure Pairing-Free Certificateless Aggregate Signature Scheme for VANET Authentication
Abstract
We introduce a forward-secure, pairing-free, and certificateless aggregate signature scheme called FSCLAS to support efficient, lightweight, and scalable authentication in VANETs. Overview: To accomplish forward secrecy, FS-CLAS uses a hash-chain-based design for key evolution that does not require bilinear pairings or secure hardware modules. It is secure against side-channel attacks due to the usage ofephemeral keys and constant-time scalar multiplication, and it features batch verification capability, conditional traceability, and decentralized revocation using Bloom filters. A modular app and management architecture make our implementation compatible with real-world Intelligent Transportation System (ITS)deployments. We demonstrate through experimental evaluation that FS-CLAS achieves up to 50% reduction in verification latency and 42% saving of communication overhead as compared to more recent work, where the average signing and verifying times are less than 3.2ms and 6.7ms, respectively, on ARM-based OBUs. Results from simulations with SUMO and NS-3 show that they work well under variable traffic density levels and high vehicle mobility. FS-CLAS complies with IEEE 1609.2 and ETSI ITS-G5 standards, providing an option for deployment with existing and future V2X networks.References
A. R. Khan, M. F. Jamlos, N. Osman, M. I. Ishak,
F. Dzaharudin, Y. K. Yeow, and K. A. Khairi,
“Dsrc technology in vehicle-to-vehicle (v2v) and
vehicle-to-infrastructure (v2i) iot system for in-
telligent transportation system (its): A review,”
Recent trends in mechatronics towards industry
0: selected articles from iM3F 2020, Malaysia,
pp. 97–106, 2022.
M. A. Al-Shareeda, M. Anbar, I. H. Hasbullah,
and S. Manickam, “Survey of authentication and
privacy schemes in vehicular ad hoc networks,”
IEEE Sensors Journal, vol. 21, no. 2, pp. 2422–
, 2020.
A. K. Vangujar, A. Umrani, and P. Palmieri,
“Identity-based cluster authentication and key
exchange (id-cake) message broadcasting and
batch verification in vanets,” in International
Conference on Applied Cryptography and Network
Security. Springer, 2024, pp. 162–179.
M. A. Al-Shareeda and S. Manickam, “A system-
atic literature review on security of vehicular ad-
hoc network (vanet) based on veins framework,”
IEEE Access, vol. 11, pp. 46 218–46 228, 2023.
A. L. Bazzan and F. Kl¨ugl, Introduction to in-
telligent systems in traffic and transportation.
Springer Nature, 2022.
M. M. Hamdi, L. Audah, S. A. Rashid, and
M. Al Shareeda, “Techniques of early incident de-
tection and traffic monitoring centre in vanets: A
review.” J. Commun., vol. 15, no. 12, pp. 896–
, 2020
DOI:
https://doi.org/10.31449/inf.v49i27.11696Downloads
Published
How to Cite
Issue
Section
License
I assign to Informatica, An International Journal of Computing and Informatics ("Journal") the copyright in the manuscript identified above and any additional material (figures, tables, illustrations, software or other information intended for publication) submitted as part of or as a supplement to the manuscript ("Paper") in all forms and media throughout the world, in all languages, for the full term of copyright, effective when and if the article is accepted for publication. This transfer includes the right to reproduce and/or to distribute the Paper to other journals or digital libraries in electronic and online forms and systems.
I understand that I retain the rights to use the pre-prints, off-prints, accepted manuscript and published journal Paper for personal use, scholarly purposes and internal institutional use.
In certain cases, I can ask for retaining the publishing rights of the Paper. The Journal can permit or deny the request for publishing rights, to which I fully agree.
I declare that the submitted Paper is original, has been written by the stated authors and has not been published elsewhere nor is currently being considered for publication by any other journal and will not be submitted for such review while under review by this Journal. The Paper contains no material that violates proprietary rights of any other person or entity. I have obtained written permission from copyright owners for any excerpts from copyrighted works that are included and have credited the sources in my article. I have informed the co-author(s) of the terms of this publishing agreement.
Copyright © Slovenian Society Informatika







