Nothing Special   »   [go: up one dir, main page]

Skip to main content

Selective and Confidential Message Exchange in Vehicular Ad Hoc Networks

  • Conference paper
Network and System Security (NSS 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7645))

Included in the following conference series:

Abstract

Vehicular Ad-hoc Networks are a promising and increasingly important paradigm. Their applications range from safety enhancement to mobile entertainment services. However, their deployment requires several security issues to be resolved, particularly, since they rely on insecure wireless communication. In this paper, we propose a cryptographic-based access control framework for vehicles to securely exchange messages in a controlled fashion by integrating moving object modeling techniques with cryptographic policies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Standard specification for telecommunications and information exchange between roadside and vehicle systems, http://www.astm.org/Standards/E2213.htm

  2. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy, SP 2007, pp. 321–334. IEEE Computer Society, Washington, DC (2007)

    Google Scholar 

  3. Channel, A.: Toyota motor corporation joins trusted computing group, tcg (2012), http://www.theautochannel.com/news/2012/03/15/029016-toyota-motor-corporation-joins-trusted-computing-group-tcg.html

  4. Chen, N., Gerla, M., Huang, D., Hong, X.: Secure, selective group broadcast in vehicular networks using dynamic attribute based encryption. In: The 9th IFIP Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net), pp. 1–8 (June 2010)

    Google Scholar 

  5. Cheng, H.T., Shan, H., Zhuang, W.: Infotainment and road safety service support in vehicular networking: From a communication perspective. Mechanical Systems and Signal Processing 25(6), 2020–2038 (2011)

    Article  Google Scholar 

  6. Chuang, M.-C., Lee, J.-F.: Ppas: A privacy preservation authentication scheme for vehicle-to-infrastructure communication networks. In: Consumer Electronics, Communications and Networks Conference (CECNet), pp. 1509–1512 (2011)

    Google Scholar 

  7. Dobre, C., Fratila, C., Iftode, L.: An approach to evaluating usability of vanet applications. In: 2011 7th International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 801–807 (July 2011)

    Google Scholar 

  8. Guette, G., Heen, O.: A TPM-based architecture for improved security and anonymity in vehicular ad hoc networks. In: 2009 IEEE Vehicular Networking Conference (VNC), pp. 1–7 (October 2009)

    Google Scholar 

  9. Gunupudi, V., Tate, S.: Timing-accurate TPM simulation for what-if explorations in Trusted Computing. In: International Symposium on Performance Evaluation of Computer and Telecommunication Systems, pp. 171–178 (2010)

    Google Scholar 

  10. Halderman, J.A., Schoen, S.D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J.A., Feldman, A.J., Appelbaum, J., Felten, E.W.: Lest we remember: cold-boot attacks on encryption keys. Commun. ACM 52, 91–98 (2009)

    Article  Google Scholar 

  11. Hao, Y., Chengcheng, Y., Zhou, C., Song, W.: A distributed key management framework with cooperative message authentication in vanets. IEEE Journal on Selected Areas in Communications 29(3), 616–629 (2011)

    Article  Google Scholar 

  12. Hong, X., Huang, D., Gerla, M., Cao, Z.: SAT: situation-aware trust architecture for vehicular networks. In: 3rd International Workshop on Mobility in the Evolving Internet Architecture, MobiArch 2008, pp. 31–36. ACM (2008)

    Google Scholar 

  13. Huang, D., Verma, M.: ASPE: attribute-based secure policy enforcement in vehicular ad hoc networks. Ad Hoc Networks 7(8), 1526–1535 (2009)

    Article  Google Scholar 

  14. Jung, C.D., Sur, C., Park, Y., Rhee, K.-H.: A robust conditional privacy-preserving authentication protocol in Vanet. Social Informatics and Telecommunications Engineering 17, 35–45 (2009)

    MATH  Google Scholar 

  15. Lee, J.: Design of a network coverage analyzer for roadside-to-vehicle telematics networks. In: International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, pp. 201–205 (2008)

    Google Scholar 

  16. Lu, R., Lin, X., Zhu, H., Ho, P.-H., Shen, X.: ECPP:efficient conditional privacy preservation protocol for secure vehicular communications. In: IEEE Conference on Computer Communications, pp. 1229–1237 (2008)

    Google Scholar 

  17. Mohan, A., Blough, D.M.: An attribute-based authorization policy framework with dynamic conflict resolution. In: Proceedings of the 9th Symposium on Identity and Trust on the Internet, IDTRUST 2010, pp. 37–50. ACM, New York (2010)

    Chapter  Google Scholar 

  18. Saroiu, S., Wolman, A.: Enabling new mobile applications with location proofs. In: 10th Workshop on Mobile Computing Systems and Applications (2009)

    Google Scholar 

  19. Studer, A., Bai, F., Bellur, B., Perrig, A.: Flexible, extensible,and efficient vanet authentication. Journal of Communications and Networks 11(6), 574–588 (2009)

    Google Scholar 

  20. Studer, A., Shi, E., Bai, F., Perrig, A.: Tacking together efficient authentication, revocation, and privacy in VANETs. In: 6th Annual IEEE Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 484–492 (2009)

    Google Scholar 

  21. Sun, J., Zhang, C., Zhang, Y., Fang, Y.: An identity-based security system for user privacy in vehicular ad hoc networks. IEEE Transactions on Parallel and Distributed Systems 21(9), 1227–1239 (2010)

    Article  Google Scholar 

  22. T.M. Trusted Computing Group Published. Part 1, design principles, specification version 1.2, level 2, revision 103 (July 2007)

    Google Scholar 

  23. Wagan, A., Mughal, B., Hasbullah, H.: VANET Security Framework for Trusted Grouping Using TPM Hardware. Communication Software and Networks, 309–312 (February 2010)

    Google Scholar 

  24. Wang, L., Wijesekera, D., Jajodia, S.: A logic-based framework for attribute based access control. In: 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, pp. 45–55. ACM (2004)

    Google Scholar 

  25. Zhang, Y., Zhao, J., Cao, G.: On scheduling vehicle-roadside data access. In: 4th ACM International Workshop on Vehicular Ad Hoc Networks, VANET 2007, pp. 9–18. ACM (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Karumanchi, S., Squicciarini, A., Lin, D. (2012). Selective and Confidential Message Exchange in Vehicular Ad Hoc Networks. In: Xu, L., Bertino, E., Mu, Y. (eds) Network and System Security. NSS 2012. Lecture Notes in Computer Science, vol 7645. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34601-9_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34601-9_34

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34600-2

  • Online ISBN: 978-3-642-34601-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics