{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T08:57:51Z","timestamp":1770541071685,"version":"3.49.0"},"reference-count":30,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2023,1,19]],"date-time":"2023-01-19T00:00:00Z","timestamp":1674086400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["52130403"],"award-info":[{"award-number":["52130403"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["N2017003"],"award-info":[{"award-number":["N2017003"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["52130403"],"award-info":[{"award-number":["52130403"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["N2017003"],"award-info":[{"award-number":["N2017003"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>In VANETs, owing to the openness of wireless communication, it is necessary to change pseudonyms frequently to realize the unlinkability of vehicle identity. Moreover, identity authentication is needed, which is usually completed by digital certificates or a trusted third party. The storage and the communication overhead are high. This paper proposes a triple pseudonym authentication scheme for VANETs based on the Cuckoo Filter and Paillier homomorphic encryption (called TriNymAuth). TriNymAuth applies Paillier homomorphic encryption, a Cuckoo Filter combining filter-level and bucket-level, and a triple pseudonym (homomorphic pseudonym, local pseudonym, and virtual pseudonym) authentication to the vehicle identity authentication scheme. It reduces the dependence on a trusted third party and ensures the privacy and security of vehicle identity while improving authentication efficiency. Experimental results show that the insert overhead of the Cuckoo Filter is about 10 \u03bcs, and the query overhead reaches the ns level. Furthermore, TriNymAuth has significant cost advantages, with an OBU enrollment cost of only 0.884 ms. When the data rate in VANETs dr\u2264 180 kbps, TriNymAuth has the smallest total transmission delay cost and is suitable for shopping malls and other places with dense traffic.<\/jats:p>","DOI":"10.3390\/s23031164","type":"journal-article","created":{"date-parts":[[2023,1,19]],"date-time":"2023-01-19T07:57:38Z","timestamp":1674115058000},"page":"1164","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["TriNymAuth: Triple Pseudonym Authentication Scheme for VANETs Based on Cuckoo Filter and Paillier Homomorphic Encryption"],"prefix":"10.3390","volume":"23","author":[{"given":"Luyuan","family":"Zhuang","sequence":"first","affiliation":[{"name":"Computer Science & Engineering College, Northeastern University, Shenyang 110167, China"}]},{"given":"Nan","family":"Guo","sequence":"additional","affiliation":[{"name":"Computer Science & Engineering College, Northeastern University, Shenyang 110167, China"}]},{"given":"Yufan","family":"Chen","sequence":"additional","affiliation":[{"name":"Computer Science & Engineering College, Northeastern University, Shenyang 110167, China"}]}],"member":"1968","published-online":{"date-parts":[[2023,1,19]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Fan, B., Andersen, D.G., Kaminsky, M., and Mitzenmacher, M.D. (2014, January 2\u20135). Cuckoo filter: Practically better than bloom. Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies, Sydney, Australia.","DOI":"10.1145\/2674005.2674994"},{"key":"ref_2","unstructured":"(2018). 5GAA: Analysis of C-V2X Security and Privacy Requirements and Impact on SCMS Design, 5GAA."},{"key":"ref_3","unstructured":"Hall, T.A., and Keller, S.S. (2010). The FIPS 186-4 Elliptic Curve Digital Signature Algorithm Validation System (ECDSA2VS), National Institute of Standards and Technology."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Zhang, C., Lu, R., Lin, X., Ho, P.H., and Shen, X. (2008, January 13\u201318). An efficient identity-based batch verification scheme for vehicular sensor networks. Proceedings of the IEEE INFOCOM 2008-The 27th Conference on Computer Communications, Phoenix, AZ, USA.","DOI":"10.1109\/INFOCOM.2008.58"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1016\/j.adhoc.2010.05.005","article-title":"SPECS: Secure and privacy enhancing communications schemes for VANETs","volume":"9","author":"Chim","year":"2011","journal-title":"Ad Hoc Netw."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"150914","DOI":"10.1109\/ACCESS.2020.3017018","article-title":"Vppcs: Vanet-based privacy-preserving communication scheme","volume":"8","author":"Anbar","year":"2020","journal-title":"IEEE Access"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1860","DOI":"10.1109\/TIFS.2013.2277471","article-title":"b-SPECS+: Batch verification for secure pseudonymous authentication in VANET","volume":"8","author":"Horng","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11432-017-9203-x","article-title":"Certificate revocation in vehicular ad hoc networks techniques and protocols: A survey","volume":"60","author":"Khan","year":"2017","journal-title":"Sci. China Inf. Sci."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"2241","DOI":"10.1109\/ACCESS.2017.2782672","article-title":"Conditional privacy-preserving authentication using registration list in vehicular ad hoc networks","volume":"6","author":"Zhong","year":"2017","journal-title":"IEEE Access"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1557","DOI":"10.1109\/JSAC.2007.071006","article-title":"Eviction of misbehaving and faulty nodes in vehicular networks","volume":"25","author":"Raya","year":"2007","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"420","DOI":"10.1109\/TDSC.2015.2467385","article-title":"Scalable certificate revocation schemes for smart grid ami networks using bloom filters","volume":"14","author":"Rabieh","year":"2015","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"177693","DOI":"10.1109\/ACCESS.2020.3027718","article-title":"A privacy-preserving authentication and pseudonym revocation scheme for VANETs","volume":"8","author":"Qi","year":"2020","journal-title":"IEEE Access"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"10283","DOI":"10.1109\/TVT.2017.2718101","article-title":"SPACF: A secure privacy-preserving authentication scheme for VANET with cuckoo filter","volume":"66","author":"Cui","year":"2017","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Zhang, H., Zhang, D., Chen, H., and Xu, J. (2020, January 28\u201331). Improving efficiency of pseudonym revocation in VANET using cuckoo filter. Proceedings of the 2020 IEEE 20th International Conference on Communication Technology (ICCT), Nanning, China.","DOI":"10.1109\/ICCT50939.2020.9295788"},{"key":"ref_15","first-page":"6121","article-title":"Robust conditional privacy-preserving authentication based on pseudonym root with cuckoo filter in vehicular ad hoc networks","volume":"13","author":"Alazzawi","year":"2019","journal-title":"KSII Trans. Internet Inf. Syst. (TIIS)"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"101","DOI":"10.12694\/scpe.v21i1.1626","article-title":"SPCACF: Secured privacy-conserving authentication scheme using cuckoo filter in VANET","volume":"21","author":"Rengarajan","year":"2020","journal-title":"Scalable Comput. Pract. Exp."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"3589","DOI":"10.1109\/TVT.2010.2051468","article-title":"An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications","volume":"59","author":"Sun","year":"2010","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Zhang, C., Lin, X., Lu, R., and Ho, P.H. (2008, January 19\u201323). RAISE: An efficient RSU-aided message authentication scheme in vehicular communication networks. Proceedings of the 2008 IEEE International Conference on Communications, Beijing, China.","DOI":"10.1109\/ICC.2008.281"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"3533","DOI":"10.1109\/TITS.2020.2983835","article-title":"V2VR: Reliable hybrid-network-oriented V2V data transmission and routing considering RSUs and connectivity probability","volume":"22","author":"Gao","year":"2020","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/MWC.2016.7422403","article-title":"Providing entertainment app lications in VANET environments","volume":"23","author":"Sarakis","year":"2016","journal-title":"IEEE Wirel. Commun."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"9457","DOI":"10.1109\/TVT.2016.2591558","article-title":"Interworking of DSRC and cellular network technologies for V2X communications: A survey","volume":"65","author":"Abboud","year":"2016","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_22","first-page":"559","article-title":"Balanced trustworthiness, safety, and privacy in vehicle-to-vehicle communications","volume":"59","author":"Wu","year":"2009","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"889","DOI":"10.1109\/TITS.2017.2706756","article-title":"V2X routing in a VANET based on the hidden Markov model","volume":"19","author":"Yao","year":"2017","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Luo, L., Guo, D., Rottenstreich, O., Ma, R.T., Luo, X., and Ren, B. (May, January 29). The consistent cuckoo filter. Proceedings of the IEEE INFOCOM 2019-IEEE Conference on Computer Communications, Paris, France.","DOI":"10.1109\/INFOCOM.2019.8737454"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1016\/j.jalgor.2003.12.002","article-title":"Cuckoo hashing","volume":"51","author":"Pagh","year":"2004","journal-title":"J. Algorithms"},{"key":"ref_26","first-page":"7426684","article-title":"IEEE standard for wireless access in vehicular environments-security services for applications and management messages","volume":"1609","author":"Group","year":"2016","journal-title":"IEEE Std"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1016\/S1353-4858(01)01018-2","article-title":"The advanced encryption standard","volume":"2001","author":"Wright","year":"2001","journal-title":"Netw. Secur."},{"key":"ref_28","unstructured":"Shoup, V. (2001). A proposal for an ISO standard for public key encryption. Cryptol. Eprint Arch., Available online: https:\/\/eprint.iacr.org\/2001\/112."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Karger, D., Lehman, E., Leighton, T., Panigrahy, R., Levine, M., and Lewin, D. (1997, January 4\u20136). Consistent hashing and random trees: Distributed caching protocols for relieving hot spots on the world wide web. Proceedings of the Twenty-Ninth Annual ACM Symposium on Theory of Computing, El Paso, TX, USA.","DOI":"10.1145\/258533.258660"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1162","DOI":"10.1109\/JPROC.2011.2132790","article-title":"Dedicated short-range communications (DSRC) standards in the United States","volume":"99","author":"Kenney","year":"2011","journal-title":"Proc. IEEE"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/3\/1164\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T18:10:49Z","timestamp":1760119849000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/3\/1164"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,19]]},"references-count":30,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2023,2]]}},"alternative-id":["s23031164"],"URL":"https:\/\/doi.org\/10.3390\/s23031164","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1,19]]}}}