Yongjun Xu
Chinese Academy of Sciences
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Yongjun Xu.
IEEE Transactions on Vehicular Technology | 2016
Fei Wang; Yongjun Xu; Hanwen Zhang; Yujun Zhang; Liehuang Zhu
Authentication in a vehicular ad-hoc network (VANET) requires not only secure and efficient authentication with privacy preservation but applicable flexibility to handle complicated transportation circumstances as well. In this paper, we proposed a Two-Factor LIghtweight Privacy-preserving authentication scheme (2FLIP) to enhance the security of VANET communication. 2FLIP employs the decentralized certificate authority (CA) and the biological-password-based two-factor authentication (2FA) to achieve the goals. Based on the decentralized CA, 2FLIP only requires several extremely lightweight hashing processes and a fast message-authentication-code operation for message signing and verification between vehicles. Compared with previous schemes, 2FLIP significantly reduces computation cost by 100-1000 times and decreases communication overhead by 55.24%-77.52%. Furthermore, any certificate revocation list (CRL)-related overhead on vehicles is avoided. 2FLIP makes the scheme resilient to denial-of-service attack in both computation and memory, which is caused by either deliberate invading behaviors or jammed traffic scenes. The proposed scheme provides strong privacy preservation that the adversaries can never succeed in tracing any vehicles, even with all RSUs compromised. Moreover, it achieves strong nonrepudiation that any biological anonym driver could be conditionally traced, even if he is not the only driver of the vehicle. Extensive simulations reveal that 2FLIP is feasible and has an outstanding performance of nearly 0-ms network delay and 0% packet-loss ratio, which are particularly appropriate for real-time emergency reporting applications.
Computing | 2016
Mingzhong Wang; Dan Liu; Liehuang Zhu; Yongjun Xu; Fei Wang
Authentication in vehicular ad-hoc network (VANET) is still a research challenge, as it requires not only secure and efficient authentication, but also privacy preservation. In this paper, we proposed a lightweight and efficient authentication scheme (LESPP) with strong privacy preservation for secure VANET communication. The proposed scheme utilizes self-generated pseudo identity to guarantee both privacy preservation and conditional traceability, and it only requires a lightweight symmetric encryption and message authentication code (MAC) generation for message signing and a fast MAC re-generation for verification. Compared with currently existing public key based schemes, the proposed scheme significantly reduces computation cost by
International Journal of Distributed Sensor Networks | 2013
Fei Wang; Yongjun Xu; Lin Wu; Longyijia Li; Dan Liu; Liehuang Zhu
International Journal of Distributed Sensor Networks | 2015
Boyu Diao; Yongjun Xu; Zhulin An; Fei Wang; Chao Li
10^2
Journal of Navigation | 2017
Lin Wu; Yongjun Xu; Qi Wang; Fei Wang; Zhiwei Xu
IEEE Sensors Journal | 2016
Chao Li; Yongjun Xu; Boyu Diao; Qi Wang; Zhulin An
102–
2014 International Conference on Computing, Networking and Communications (ICNC) | 2014
Fei Wang; Yujun Zhang; Yongjun Xu; Lin Wu; Boyu Diao
IEEE Transactions on Industrial Informatics | 2017
Qi Wang; Katia Jaffrès-Runser; Yongjun Xu; Jean-Luc Scharbarg; Zhulin An; Christian Fraboul
10^3
International Journal of Distributed Sensor Networks | 2013
Wei Lin; XueHai Hong; ChaoNong Xu; Yongjun Xu; Dengchang Zhao
Computing | 2004
Yongjun Xu; H.-L. Chen; Qionghui Zou
103 times and decreases communication overhead by 41.33–77.60xa0%, thus achieving resilience to denial of service (DoS) attack. In LESPP, only key management center can expose a vehicle’s real identity from its pseudo identity, therefore, LESPP provides strong privacy preservation so that the adversaries cannot trace any vehicles, even if all roadside units are compromised. Furthermore, vehicles in LESPP need not maintain certificate revocation list (CRL), so any CRL related overhead is avoided. Extensive simulations reveal that the novel scheme is feasible and has an outstanding performance of nearly 0xa0ms network delay and 0xa0% packet loss ratio, which are especially appropriate for realtime emergency event reporting applications.