Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/1700527.1700741guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

A security framework with strong non-repudiation and privacy in VANETs

Published: 11 January 2009 Publication History

Abstract

This paper proposes a security framework with strong non-repudiation and privacy using new approach of ID-based cryptosystem in VANETs. To remove the overheads of certificate management in PKI, security frameworks using an ID-based cryptosystem are proposed. These systems, however, cannot guarantee strong non-repudiation and private communication since they suffer from the inherent weakness of an ID-based cryptosystem like the key escrow problem. The key idea of this paper is that the ID of the third-party is used as the verifier of vehicle's ID and self-generated RSA public key instead of using the ID of the peers. Our scheme provides strong nonrepudiation and privacy preservation without the inherent weaknesses of an ID-based cryptosystem in VANETs. Also, the proposed scheme is efficient in terms of signature and verification time for safety-related applications.

References

[1]
National ITS Architecture, 〈http://www.odetics-its.com/itsarch/html/ standard/standard.htm〉.
[2]
Car 2 Car Communication Consortium, 〈http://www.car-2-car.org/〉
[3]
M.E. Zarki, S. Mehrotra, G. Tsudik, and N. Venkatasubramanian, "Security issues in a future vehicular network," in Proc. European Wireless 2002, Feb. 2002.
[4]
IEEE Std 1609.2, IEEE Trial-use standard for wireless access in vehicular environments-Security services for applications and management messages, 2006.
[5]
M. Raya and J.P. Hubaux, "The security of vehicular ad hoc networks," in Proc. SASN 2005, Nov. 2005.
[6]
M. Raya, P. Papadimitratos, and J.P. Hubaux, "Securing vehicular communications," IEEE Wirel. Commun., vol. 13, no. 5, pp. 8-15, Oct. 2006.
[7]
K. Plößl, T. Nowey, and C. Mletzko, "Towards a security architecture for vehicular ad hoc networks," in Proc. ARES2006, 2006.
[8]
S. Eichler, "A security architecture concept for vehicular network nodes," in Proc. 6th ICICS, 2007.
[9]
N.W. Wang, Y.M. Huang, and W.M. Chen, "A novel secure communication scheme in vehicular ad hoc network," Comput. Commun., Available online 16 December 2007: http://www. elsvier.com.
[10]
K. Plößl and H. Federrath, "A privacy aware and efficient security infrastructure for vehicular ad hoc networks," Comput. Stand. Interfaces, Available online 8 March 2008: http://www.elsvier.com.
[11]
A. Shamir, "Identity-based cryptosystems and signature schemes," in Proc. CRYPTO'84, LNCS 196, pp. 47-53, 1984.
[12]
P. Kamat, A. Baliga, and W. Trappe, "An Identity-based security framework for VANETs," in Proc. VANET06, pp. 94-95, Sept. 2006.
[13]
J. Sun, C. Zhang, and Y. Fang, "An ID-based framework achieving privacy and non-repudiation in vehicular ad hoc networks," in Proc. MILCOM 2007, Oct. 2007.
[14]
X. Lin, X. Sun, P.H. Ho, and X. Shen, "GSIS: A secure and privacy preserving protocol for vehicular communications," IEEE Trans. Veh. Technol., vol. 56, no. 6, pp. 3442-3456, 2007.
[15]
X. Lin, R. Lu, C. Zhang, H. Zhu, and P.H. Ho, "Security in vehicular ad hoc networks," IEEE Commun. Mag., vol. 46, no. 4, pp. 88-95, Apr. 2008.
[16]
C.T. Li, M.S. Hwang, and Y.P. Chu, "A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks," Comput. Commun., vol. 31, no. 12, pp. 2803-2814, July 2008.
[17]
J. Baek, J. Newmarch, R. Safavi-Naini, and W. Susilo, "A survey of Identity-based cryptography," in Proc. AUUG 2004, pp. 95-102, 2004.
[18]
S. Al-Riyami and K. Paterson, "Certificateless public key cryptography," in Proc. Asiacrypt 2003, LNCS 2894, pp. 452-473, Dec. 2003.
[19]
C. Gentry, "Certificate-based encryption and the certificate revocation problem," in Proc. EUROCRYPT 2003, LNCS 2656, pp. 272-293, May 2003.
[20]
MIRACL, Multiprecision Integer and Rational Arithmetic C/c++ library, http://www.shamus.ie.

Cited By

View all
  • (2018)Privacy preservation in secure group communications for vehicular ad hoc networksTelecommunications Systems10.1007/s11235-010-9409-950:4(355-365)Online publication date: 29-Dec-2018
  • (2011)Security in vehicular adhoc networksProceedings of the 2011 International Conference on Communication, Computing & Security10.1145/1947940.1948063(590-595)Online publication date: 12-Feb-2011

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
CCNC'09: Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
January 2009
1436 pages
ISBN:9781424423088

Publisher

IEEE Press

Publication History

Published: 11 January 2009

Author Tags

  1. ID-based cryptosystem
  2. VANET
  3. key escrow problem
  4. non-repudiation
  5. privacy

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2018)Privacy preservation in secure group communications for vehicular ad hoc networksTelecommunications Systems10.1007/s11235-010-9409-950:4(355-365)Online publication date: 29-Dec-2018
  • (2011)Security in vehicular adhoc networksProceedings of the 2011 International Conference on Communication, Computing & Security10.1145/1947940.1948063(590-595)Online publication date: 12-Feb-2011

View Options

View options

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media