Abstract
Vehicular Ad-hoc Networks are a promising and increasingly important paradigm. Their applications range from safety enhancement to mobile entertainment services. However, their deployment requires several security issues to be resolved, particularly, since they rely on insecure wireless communication. In this paper, we propose a cryptographic-based access control framework for vehicles to securely exchange messages in a controlled fashion by integrating moving object modeling techniques with cryptographic policies.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Standard specification for telecommunications and information exchange between roadside and vehicle systems, http://www.astm.org/Standards/E2213.htm
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy, SP 2007, pp. 321–334. IEEE Computer Society, Washington, DC (2007)
Channel, A.: Toyota motor corporation joins trusted computing group, tcg (2012), http://www.theautochannel.com/news/2012/03/15/029016-toyota-motor-corporation-joins-trusted-computing-group-tcg.html
Chen, N., Gerla, M., Huang, D., Hong, X.: Secure, selective group broadcast in vehicular networks using dynamic attribute based encryption. In: The 9th IFIP Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net), pp. 1–8 (June 2010)
Cheng, H.T., Shan, H., Zhuang, W.: Infotainment and road safety service support in vehicular networking: From a communication perspective. Mechanical Systems and Signal Processing 25(6), 2020–2038 (2011)
Chuang, M.-C., Lee, J.-F.: Ppas: A privacy preservation authentication scheme for vehicle-to-infrastructure communication networks. In: Consumer Electronics, Communications and Networks Conference (CECNet), pp. 1509–1512 (2011)
Dobre, C., Fratila, C., Iftode, L.: An approach to evaluating usability of vanet applications. In: 2011 7th International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 801–807 (July 2011)
Guette, G., Heen, O.: A TPM-based architecture for improved security and anonymity in vehicular ad hoc networks. In: 2009 IEEE Vehicular Networking Conference (VNC), pp. 1–7 (October 2009)
Gunupudi, V., Tate, S.: Timing-accurate TPM simulation for what-if explorations in Trusted Computing. In: International Symposium on Performance Evaluation of Computer and Telecommunication Systems, pp. 171–178 (2010)
Halderman, J.A., Schoen, S.D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J.A., Feldman, A.J., Appelbaum, J., Felten, E.W.: Lest we remember: cold-boot attacks on encryption keys. Commun. ACM 52, 91–98 (2009)
Hao, Y., Chengcheng, Y., Zhou, C., Song, W.: A distributed key management framework with cooperative message authentication in vanets. IEEE Journal on Selected Areas in Communications 29(3), 616–629 (2011)
Hong, X., Huang, D., Gerla, M., Cao, Z.: SAT: situation-aware trust architecture for vehicular networks. In: 3rd International Workshop on Mobility in the Evolving Internet Architecture, MobiArch 2008, pp. 31–36. ACM (2008)
Huang, D., Verma, M.: ASPE: attribute-based secure policy enforcement in vehicular ad hoc networks. Ad Hoc Networks 7(8), 1526–1535 (2009)
Jung, C.D., Sur, C., Park, Y., Rhee, K.-H.: A robust conditional privacy-preserving authentication protocol in Vanet. Social Informatics and Telecommunications Engineering 17, 35–45 (2009)
Lee, J.: Design of a network coverage analyzer for roadside-to-vehicle telematics networks. In: International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, pp. 201–205 (2008)
Lu, R., Lin, X., Zhu, H., Ho, P.-H., Shen, X.: ECPP:efficient conditional privacy preservation protocol for secure vehicular communications. In: IEEE Conference on Computer Communications, pp. 1229–1237 (2008)
Mohan, A., Blough, D.M.: An attribute-based authorization policy framework with dynamic conflict resolution. In: Proceedings of the 9th Symposium on Identity and Trust on the Internet, IDTRUST 2010, pp. 37–50. ACM, New York (2010)
Saroiu, S., Wolman, A.: Enabling new mobile applications with location proofs. In: 10th Workshop on Mobile Computing Systems and Applications (2009)
Studer, A., Bai, F., Bellur, B., Perrig, A.: Flexible, extensible,and efficient vanet authentication. Journal of Communications and Networks 11(6), 574–588 (2009)
Studer, A., Shi, E., Bai, F., Perrig, A.: Tacking together efficient authentication, revocation, and privacy in VANETs. In: 6th Annual IEEE Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 484–492 (2009)
Sun, J., Zhang, C., Zhang, Y., Fang, Y.: An identity-based security system for user privacy in vehicular ad hoc networks. IEEE Transactions on Parallel and Distributed Systems 21(9), 1227–1239 (2010)
T.M. Trusted Computing Group Published. Part 1, design principles, specification version 1.2, level 2, revision 103 (July 2007)
Wagan, A., Mughal, B., Hasbullah, H.: VANET Security Framework for Trusted Grouping Using TPM Hardware. Communication Software and Networks, 309–312 (February 2010)
Wang, L., Wijesekera, D., Jajodia, S.: A logic-based framework for attribute based access control. In: 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, pp. 45–55. ACM (2004)
Zhang, Y., Zhao, J., Cao, G.: On scheduling vehicle-roadside data access. In: 4th ACM International Workshop on Vehicular Ad Hoc Networks, VANET 2007, pp. 9–18. ACM (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Karumanchi, S., Squicciarini, A., Lin, D. (2012). Selective and Confidential Message Exchange in Vehicular Ad Hoc Networks. In: Xu, L., Bertino, E., Mu, Y. (eds) Network and System Security. NSS 2012. Lecture Notes in Computer Science, vol 7645. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34601-9_34
Download citation
DOI: https://doi.org/10.1007/978-3-642-34601-9_34
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34600-2
Online ISBN: 978-3-642-34601-9
eBook Packages: Computer ScienceComputer Science (R0)