Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2386958.2386975acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
research-article

Proof of concept of a security based on lifetime of communication's pseudonyms for the VANETs

Published: 21 October 2012 Publication History

Abstract

To make Vehicular Ad Hoc Network (VANET) applications useful to the users, the security problem must be solved. Recent researches have suggested the use of a set of anonymous keys certified by the issuing CA (Central authority) to preserve privacy, authentication, and confidentiality of the communicating entities. But how to determine the right time for the vehicles to exchange their communication pseudonyms and what would be the impacts on the network resources such as time processing and memory. In this paper, we propose a protocol that preserves authentication, non repudiation, and location privacy and helps vehicles to exchange their pseudonyms at roughly the same time. It is based on calculating the Euclidean distance and the average of the speed permitted on the path to evaluate the lifetime of the communication's pseudonyms. The exchange of the information is based on asymmetric and symmetric cryptography scheme and it uses hash function. The protocol permits to determine the expiration time of pseudonyms and how to make the distribution of all the road side units along the road in order to establish a good communication between them and the vehicles.

References

[1]
Subir Biswas, Jelena Misic and Vojislav Misic, ID-based Safety Message Authentication for Security and Trust in Vehicular Networks, 31st International Conference on Distributed Computing System Workshops, pp.323--331, 2011.
[2]
Youngho Park and Kyung-Hyune Rhee, Chul Sur, A Secure and Location Assurance Protocol for Location-Aware Services in VANETs, 50th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp.456--461, 2011.
[3]
Rongxing Lu, Xiaodong Lin, Tom H. Luan, Xiaohui Liang and Xuemin Shen, Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs, IEEE Transactions on Vehicular technology, Vol.61, N01, January 2012, pp.86--96.
[4]
Kaouther Abrougui and Azzedine Boukerche, Secure Service Discovery Protocol for Intelligent Transport Systems: Proof of Correctness, 1st NSERC DIVA WORKSHOP, Developing the next Generation Intelligent Vehicular Network and Applications, pp.51--57, September 9, 2011-Ottawa-Canada.
[5]
Xiaodong Lin, Xiaoting Sun, Pin-Han Ho, Xuemin Shen, GSIS: A secure and Privacy-Preserving Protocol for Vehicular Communications, IEEE Transactions on Vehicular Technologie, Vol.56, N06, pp.3342--3456, November 2007.
[6]
Ayman Tajeddine, Ayman Kayssi and Ali Chehab, A Privacy-Preserving Trust Model for VANETs, 10th IEEE International Conference on Computer and Information Technologie (CIT 2010), pp.832--837.
[7]
Hsin-Te, Wu, Wei-Shuo Li, Tung-Shih, Su and Wen-Shyong Hsieh, A Novel RSU-based Message Authentication Scheme for VANET, 50th International Conference on Systems and Networks Communications, pp.111--116, 2010.
[8]
Floriam Scheuer, Matthias Brecht and Hannes Federrath, A Privacy-Aware location service for VANETs using Chaum's mixes, 6th International Conference on wireless and Mobile Computing, Networking and Communications, pp.159--164, 2010.
[9]
You Lu, Biao Zhou, Fei Jia and Mario Gerla, Group-based Secure Source Authentication Protocol for VANETs, IEEE Globecom 2010 Workshop on Heterogenous, Multi-hop Wireless and Mobile Networks, pp.202--206.
[10]
F. Armknecht, A. Festag, D. Westhoff and K. Zang, Cross-layer privacy enhancement and non-repudiation in vehicular communication, In WMAN 07.
[11]
C.I Fan, R. H. Hsu and C. H. Tseng, Pairing-based message authentication scheme with privacy protection in vehicular ad hoc network, In WMAN 08
[12]
StefanoBusanelli, Gianluigi Ferrari and LucaVeltri, Short-lived Key Management for Secure Communications in VANETs, Security and Applications IEEE, pp.613--618, 2011.
[13]
Baber Aslam and Cliff C.Zou, One-way-linkable Blind Signature Security Architecture for VANET, The 8th Annual IEEE Consumer Communication and Networking Conference-Smart Spaces and Personal Area Networks, pp.745--750, 2011.
[14]
Danda B. Rawat, Bhed B. Bista, Gongjun Yan and Michele C. Weigle, Securing Vehicular Ad-Hoc Network against Malicious Drivers: A Probabilistic Approch, International Conference on Complex, Intelligent, and Software Intensive Systems, pp.146--151, 2011.

Cited By

View all
  • (2017)Privacy-preserving services in VANET with misbehavior detection2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)10.1109/ANTS.2017.8384146(1-6)Online publication date: Dec-2017
  • (2014)Misbehavior Detection in VANETSecurity, Privacy, Trust, and Resource Management in Mobile and Wireless Communications10.4018/978-1-4666-4691-9.ch007(134-147)Online publication date: 2014

Index Terms

  1. Proof of concept of a security based on lifetime of communication's pseudonyms for the VANETs

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    DIVANet '12: Proceedings of the second ACM international symposium on Design and analysis of intelligent vehicular networks and applications
    October 2012
    154 pages
    ISBN:9781450316255
    DOI:10.1145/2386958
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 21 October 2012

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. euclidean distance
    2. keys management
    3. privacy
    4. vanet security

    Qualifiers

    • Research-article

    Conference

    MSWiM '12
    Sponsor:

    Acceptance Rates

    DIVANet '12 Paper Acceptance Rate 20 of 80 submissions, 25%;
    Overall Acceptance Rate 70 of 308 submissions, 23%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 20 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2017)Privacy-preserving services in VANET with misbehavior detection2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)10.1109/ANTS.2017.8384146(1-6)Online publication date: Dec-2017
    • (2014)Misbehavior Detection in VANETSecurity, Privacy, Trust, and Resource Management in Mobile and Wireless Communications10.4018/978-1-4666-4691-9.ch007(134-147)Online publication date: 2014

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media