Abstract
Introduction
With the rapid development of the Internet of Things (IoT), the intelligent transportation system has attracted huge interest in society. As a key component of the intelligent transportation system, vehicular ad hoc networks (VANETs) improve road security and traffic efficiency. Drivers and passengers can perceive traffic situations such as road access, location, speed, and other travel information and openly broadcast their own information, so the user driving experience is greatly enhanced. However, VANETs have many challenges and differences from the conventional traffic network: end-to-end authentication in VANETs is difficult due to the high speeds of vehicles. 1 In addition, privacy is a wide concern of drivers. 2 Because of the openness of VANETs, conventional security schemes do not effectively apply to their privacy security. Thus, a new security scheme for guaranteeing vehicular privacy in VANETs is urgently needed. Ensuring both anonymity and authentication is a dual requirement in VANETs. Although anonymity and authentication seem to be contradictory, they must coexist. However, effective schemes are rare in the literature, and the existing anonymous authentication schemes cannot provide reverse tracking when anonymous abuse occurs.
Related works
In recent years, multiple authentication schemes have been proposed in the literature. Ma et al. 3 combine smart card and password authentication technology to design a secure authentication scheme that can resist offline password guessing and denial of service attacks and ensures user anonymity. Wang et al. 4 consider the trade-off between security and privacy and put forward an anonymous two-factor authentication scheme that is based on the basic evaluation index. Based on Kim–Kim two-factor authentication technology, a method 5 is proposed to enhance the efficiency without causing additional communication and computational overhead while increasing security ability. To tackle the weakness of AdaBoost technology for vehicle authentication, Wen et al. 6 propose a rapid incremental learning algorithm of AdaBoost for improving the vehicle detection process.
In VANET, privacy information such as user identity and location is important and sensitive in the communication process. The system should not only ensure authentic identity but also prevent privacy leakage.2,7,8 The previous schemes for protecting VANET privacy focus on the identity of the anonymous user. Common techniques that are used in studies include the group signature scheme,9,10 ring signature scheme, 11 ID-based signature scheme,12–16 blind signature, 17 and improved technology.18–21
Guo et al. 9 are early adopters of Boneh group signature technology for in-vehicle communications. Calandriello et al. 10 note that the computational overhead and length of the group signature in the signature generation and verification process are much larger than in general public key infrastructure (PKI) digital signature schemes (such as elliptic curve digital signature algorithm (ECDSA)), so schemes that use the group signature for in-vehicle safety are inefficient. Thus, many researchers want to reduce the high overhead and security risk of the group signature. Some researchers resort to using ring signature schemes to achieve the desired objectives. A ring signature scheme is similar to a simplified group signature scheme. It uses rules to form a ring, which has anonymity features. For example, Zhang et al. 11 propose a privacy-preserving authentication protocol based on ring signature without bilinear pairings in VANETs. This achieves effective privacy protection and authentication mechanisms and reduces the computational overhead of the signature generation process by avoiding the complex operations of bilinear pairings. Some researchers focus on using the identity-based signature (IBS) to implement identity-based anonymous authentication, such as Sun et al., 12 ACPN, 13 Jinila and Komathy, 14 privacy protection authentication scheme (PPAS), 15 and He et al. 16 Among them, Sun et al. 12 are relatively early researchers. They use zero-knowledge proof and a threshold secret sharing algorithm to design an anonymous identity authentication scheme that is based on signatures. PPAS 15 uses IBS based on bilinear pairings to solve anonymous authentication issues, not only between on-board units (OBUs) but also between the roadside units (RSUs) and OBUs. In addition, to achieve conditional privacy and authentication, He et al. 16 design a similar IBS. However, because it is based on the elliptic curve algorithm without bilinear pairing operations, it has less computational overhead and more security. Tian and Qiang 17 propose a signature scheme (proxy blind signature scheme (PBSS)) that is based on blind signature and proxy multi-signature certification technology, which solves authentication problems between nodes. The use of two signature technologies realizes on-board authentication interactivity and improves communication security. Experimental results show that PBSS can better meet the on-board node mobility and complexity requirements and has good performance in terms of authentication efficiency.
Lu et al. 18 introduce an efficient conditional privacy preservation (ECPP) protocol to guarantee an anonymous authentication scheme with authority traceability. The proposed protocol is realized using on-the-fly short-time anonymous keys between OBUs and RSUs, which can provide fast anonymous authentication and abuse tracking, as well as minimize the required storage for short-time anonymous keys. They demonstrate the large merits of the proposed protocol through extensive analysis. Shim 19 proposes a conditional privacy-preserving authentication scheme, which is called CPAS, using pseudo-IBSs for secure vehicle-to-infrastructure communications in VANETs. The scheme achieves conditional privacy preservation in which each message that is sent by a vehicle is mapped to a distinct pseudo-identity, and a trusted authority can retrieve the real identity of the vehicle from the pseudo-identity. In this scheme, an RSU can simultaneously verify multiple received signatures, thereby considerably reducing the total verification time. An RSU can simultaneously verify 2540 signed messages per second. Compared with the previous scheme, the time for simultaneously verifying 800 signatures can be reduced by 18%. However, all of the aforementioned schemes depend on a trusted third party; thus, they are not suitable for the self-organized VANET environment and do not avoid the single-point failure problem. Wang et al. 20 introduce an efficient conditional privacy-preserving authentication scheme (ECPB) that is based on group signature for VANETs. Although group signature has been widely used in VANETs, the existing schemes that are based on group signatures suffer longer computational delays in the certificate revocation list (CRL) checking and the signature verification processes, thereby leading to lower verification efficiency. In ECPB, membership validation is required when a vehicle applies to become a group member, and validity verification is used to check whether the vehicle is a group member or not, which can be used as a substitute for CRL checking. Neglecting CRL checking sharply decreases the costs incurred in signature verification. In addition, the proposed scheme also supports batch verification. Experimental analysis proves that the proposed scheme is more efficient than existing schemes, in terms of verification delay and average delay.
A similar scheme is presented in Liu et al. 21 Based on democratic group signatures and a decentralized secret sharing algorithm, this scheme proposes a threshold traceability anonymous authentication scheme without a trusted center. The scheme is decentralized and self-organized; thus, it is well suited to the characteristics of an ad hoc network. The scheme is proved to be anonymous, traceable, and complete; therefore, it satisfies the security requirements of anonymous authentication well. Although this scheme addresses the decentralization issue, its computational cost is huge, and it is complex if applied in VANETs.
In view of the above problems, this article presents a self-organized anonymous authentication and tracking scheme that is based on the fair blind signature and a secret sharing algorithm. It is called Without Center Certificate in VANET (WCCV) and focuses on identity information protection and communication anonymity.
System description and objectives
Basic network structure and system overview
The network structure used in this scheme mainly includes three types of entities:
An OBU is in a vehicle and stores information about the vehicle, such as vehicle identity, license plate number, and related vehicle properties and also communicates with other OBUs.
The RSU, which consists of the radio frequency controller, network communication module, power module, and microwave transceiver module, is responsible for the signal and data transmission, encoding and decoding, decryption, and so on. Compared with the OBU, it has higher storage and forwarding capabilities and can communicate with not only OBUs but also the exterior network.
An infrastructure entity provides the infrastructure for the whole system and is in charge of network connectivity.
As illustrated in Figure 1, once a vehicle wants to enter a local community, it must use its OBU to register at an RSU via the local infrastructure. As with general secure schemes, we assume that the system is secure in the registration phase and unsecure in the other phase. Because the RSU is the high-performance node in a VANET, it oversees the construction of encryption infrastructure in the registration phase. In a normal communication phase, regional vehicles generate their own signatures via an anonymous signature set and then use them as certificates to communicate with others anonymously, while other vehicles can verify the validity of these signatures. If anonymity abuse appears, the RSU can ask a certain number of vehicles to form a tracking set to retrieve the illegal vehicle.

The basic network structure.
Basic objectives of the scheme
The main objectives of the scheme are as follows:
Avoid anonymity abuse. WCCV addresses the anonymity abuse issue and improves it, which makes it more suitable for the requirements of VANETs.
No single trusted center. Distributed tracking means that there is no single trusted third-party center that oversees anonymous communication. Thus, single-point failure is avoided, and the robustness of the scheme is improved.
Avoid tracking abuse. The tracking of malicious entities is jointly completed by multiple vehicles, which can prevent fraud and forgery attacks.
Proposed authentication scheme
Initialization and registration phase
In this phase, when vehicles enter a controlled region, they must register in the network. Relevant system parameters and public–private key pairs for signing are generated. This phase includes the following steps:
Assume
The vehicle
Anonymous authentication and communication phase
After the initialization and registration phase, if a registered vehicle wants to join the regional communication, it must prove its legal identity, namely, the message signature. A vehicle without a signature message will not be approved. This phase mainly includes two algorithms: a signature generation algorithm, which is illustrated in Figure 2, and a signature verification algorithm, which is illustrated in Figure 3. Let
Signature generation of vehicle message phase
Similar to the strategy that is used in Abe et al.,
22
Vehicle
Finally,

Signature generation.

Signature verification.
Message verification phase
When the other vehicles in the region receive the message from
The detailed process is as follows: After the neighboring vehicles extract the signature of a message from
Illegal vehicle tracking phase
In this phase, when a malicious anonymous vehicle appears, other vehicles can cooperate to track the real identity of this vehicle. This phase is based on the concept of a threshold secret sharing mechanism. According to the threshold value
All of the vehicles in
These vehicles cooperate to use the parameters
Participation of a new vehicle node
When a new vehicle
Key update and revocation for illegal and absent vehicles
If an illegal vehicle appears and a certain vehicle has been absent for a long time, to ensure the effectiveness of the sub-keys of other vehicles, the system needs to update and revoke the key of the long-time absent or illegal vehicle. The RSU selects a new polynomial
Security and attack analysis
The anonymity of the scheme
In the authentication phase of the vehicle message signature, according to the Diffe–Hellman assumption, the signer of the message can choose the vehicle anonymous signature set (which contains the anonymous public keys of all the vehicles) to guarantee the anonymity of its real identity. Since the parameter
Nonforgeability of the message signature
If a malicious vehicle wants to forge the signature of vehicle
Unlinkability of the signature
According to its actual needs, the vehicle will select different anonymity sets
Traceability of the scheme
When malicious behavior occurs, according to the threshold
This formula proves that only if at least
Nontrusted center of the scheme
Compared with the other schemes, this scheme reduces the reliance on a trusted third party. If certificate issuance and the tracking process require the involvement of a trusted third party, the system security largely depends on the security of the trusted third party. In our scheme, the RSU works as a higher computing performance node, in comparison with the ordinary vehicle nodes. Even without the presence of the RSU, other vehicle nodes still can complete these signature and certification phases. In the system initialization phase, each vehicle selects a sub-key and calculates the public–private key pair for signing. In the signature generation phase, the vehicle that wants to send messages randomly selects the anonymity set and random parameter to form its signature. In the signature verification phase, only the receiver of the messages participates, namely, the verifier. In addition, when a new vehicle joins the system, the keys of illegal vehicles are revoked, and the group public key is updated; the system needs to ask only the vehicles in the controlled region to cooperate to update the group public key and threshold value, which does not rely on a trusted third party.
Experiment and analysis of results
Computational cost analysis
Because VANET is a delay-sensitive network, we use time cost as the comparison measure of computational cost. The most time-consuming phases are the system initialization, signature verification, and anonymous tracking phases. To facilitate subsequent comparison,
According to this table, the computational cost in the system initialization phase is significantly lower than that of threshold traceability anonymous authentication
21
and ECPP
18
and higher than that of ECPB
20
and CPAS.
19
However, as mentioned in the next section, ECPB and CPAS have no ability to track anonymity abuse. In the signature verification phase, the computational cost depends mainly on the size of the anonymity set
The cost of calculation.
ECPP: efficient conditional privacy preservation; ECPB: efficient conditional privacy-preserving authentication scheme; CPAS: conditional privacy-preserving authentication scheme; WCCV: Without Center Certificate in VANET.
Performance analysis
Table 2 presents the performance comparison of authentication and anonymity between ECPP, 18 ECPB, 20 CPAS, 19 and our scheme. Among them, ECPB improves the low efficiency of certificate revocation delay of the existing group signature scheme in which the validity certification is added to the signature to reduce the cost of CRL checking. CPAS can map every message to a pseudo-identity under the conditional privacy protection and can verify the signer’s real identity from the authority.
Performance comparison.
ECPP: efficient conditional privacy preservation; ECPB: efficient conditional privacy-preserving authentication scheme; CPAS: conditional privacy-preserving authentication scheme; WCCV: Without Center Certificate in VANET.
Authentication efficiency and communication cost
This section presents the simulation experiment of the authentication efficiency. The scheme uses C++ language and is based on the Visual Studio 2012 platform of the Windows 7 system with a 2.6-GHZ i5 processor and 4-G memory. The experimental dataset is generated using Thomas Brinkhoff’s road network, 23 which is widely recognized by the mobile data management industry, and the Oldenburg transportation network. The Oldenburg traffic network (5 km × 5 km) is taken as the input to generate the mobile dataset and communication node objects. The experimental parameters are shown in Table 3.
The parameters.
OBU: on-board unit.
Figure 4 presents the effect of the anonymous authentication set on the message response time. While keeping the other parameters constant in the experiment, we change the size of the anonymous authentication set to assess the average response time of OBU nodes in signing and verifying a message signature.

The effect of the anonymity set.
According to this figure, when a small anonymity set is selected, the average response time is short. Nevertheless, as the size of the selected anonymity set increases, the response time of signature verification gradually increases.
Experimental evaluation is performed following two aspects for comparison with CPAS and ECPB:
Authentication success rate. Since the computing ability of a single-node OBU is limited, the authentication success rate refers to the ratio of the number of successful authentication messages to the total number of messages that are received by the OBU within the unit time. The higher the number of certification messages that are received per unit time, the higher the success ratio.
Average traffic cost. This refers to the average number of data messages in a running period. The lower the average traffic cost, the higher efficiency of message processing, the lower the number of retransmission messages, and the lower the communication overhead.
Figure 5 presents the efficiency of the authentication message with the variation of the number of messages. In the initial phase, the number of messages is small, so the success rates of authentication are almost equal in these three schemes. When the number of messages increases to 10, due to the largest validity time of the message, the successful authentication ratios of the three schemes undergo significant changes. The downward trends of ECPB and CPAS accelerate; however, our scheme can ensure high authentication efficiency due to the partial selection of the anonymity set. When the number of messages reached 40, the authentication efficiencies of ECPB and CPAS are reduced to 60% or less. Finally, because of the OBU computing power, with the increase in the number of authentication messages, the authentication efficiencies of the three schemes tend to decline; however, the efficiency of our scheme, in general, is higher than those of the other two schemes.

The authentication proportion.
Figure 6 shows the average traffic costs of the three schemes. In the initial phase, because there are fewer messages, the average traffic costs of the three schemes are similar, and all tend to increase with running time. Finally, because the optional anonymity set in our schemes can shorten the response time, which reduces the number of invalid message retransmissions within the authentication period, our scheme reduces the communication overhead and has a relatively better effect.

The overhead of communication.
Conclusion
This article presents a noncenter anonymous authentication scheme for the privacy protection of vehicles in VANET. Compared to the previous signature schemes, this scheme reduces reliance on a trusted third party. Security analysis and experiments show that it meets the necessary security requirements, such as authentication security, process simplicity, and good anonymity and can avoid the cumbersome process of certification and pseudonym issuance. In addition, illegal signature vehicles can be tracked using threshold tracking. It is suitable for noncentral, self-organizing VANET environments with anonymous demand.
