Anonymity and security improvements in heterogeneous connected vehicle networks

被引:0
|
作者
Sivasankari, S. A. [1 ]
Gupta, Deepak [2 ]
Keshta, Ismail [3 ]
Reddy, Ch. Venkata Krishna [4 ]
Singh, Pavitar Parkash [5 ]
Byeon, Haewon [6 ]
机构
[1] Vignans Fdn Sci Technol & Res, Guntur, India
[2] Inst Technol & Management, Dept CSE, Gwalior, India
[3] AlMaarefa Univ, Coll Appl Sci, Comp Sci & Informat Syst Dept, Riyadh, Saudi Arabia
[4] Chaitanya Bharathi Inst Technol, Dept Elect & Elect Engn, Hyderabad, India
[5] Lovely Profess Univ, Dept Management, Phagwara, India
[6] Inje Univ, Dept Digital Antiaging Healthcare, Gimhae 50834, South Korea
关键词
IoT; Connected vehicle network; Security; Intelligent transportation; SMART; INTERNET; OPTIMIZATION; MANAGEMENT; DESIGN; SYSTEM;
D O I
10.1007/s41060-023-00499-1
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The connected vehicle network is an important part of intelligent transportation since it provides a wide variety of online vehicle services and helps to lower the risk of accidents for drivers while also being a prominent example of the IoT inside futuristic smart vertical networks. However, the connected vehicle network's communication protocols reveal a great deal of private data, including individual vehicles' whereabouts and travel plans. Sensitive data, including vehicle positions and trajectories created during communication, must be protected as wireless communication technology by its very nature entails broadcasting and allows for open communication between vehicles. Therefore, a key objective in vehicular network security is to increase the anonymity of vehicle identities within secure services. Using a batch verification technique, we present a novel approach to anonymous identity authentication in this research. The approach uses zero-knowledge proofs and other forms of anonymized authentication to bolster the privacy of IEEE WAVE's security services. It also provides a new way to retrieve lost identification with the help of an independent party. This study primarily contributes to the improvement of privacy in IEEE WAVE security services and applications such as near-field vehicle payment and DSRC security services by proposing an improved anonymous authentication system based on batch verification and zero-knowledge proofs. According to experimental findings, the recommended method has a lower computational overhead than a number of competing systems up until the batch of signatures that have to be checked contains more than eleven. Furthermore, we suggest the optimal batch processing verification cycle, tailored to the scheme's use in the near-field vehicle payment and basic safety message (BSM) use cases of DSRC.
引用
收藏
页码:749 / 762
页数:14
相关论文
共 50 条
  • [1] Physical Layer Security in Intelligently Connected Vehicle Networks
    Luo, Xuewen
    Liu, Yiliang
    Chen, Hsiao-Hwa
    Guo, Qing
    IEEE NETWORK, 2020, 34 (05): : 232 - 239
  • [2] A Threat Model and Security Recommendations for IoT Sensors in Connected Vehicle Networks
    Kuri, Sajib Kumar
    Islam, Tarim
    Jaskolka, Jason
    Ibnkahla, Mohamed
    2022 IEEE 95TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2022-SPRING), 2022,
  • [3] A Systematic Survey on Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and Formalization
    Chao, Daichong
    Xu, Dawei
    Gao, Feng
    Zhang, Chuan
    Zhang, Weiting
    Zhu, Liehuang
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2024, 26 (03): : 1775 - 1829
  • [4] Network and System Level Security in Connected Vehicle Applications
    Liang, Hengyi
    Jagielski, Matthew
    Zheng, Bowen
    Lin, Chung-Wei
    Kang, Eunsuk
    Shiraishi, Shinichi
    Nita-Rotaru, Cristina
    Zhu, Qi
    2018 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD) DIGEST OF TECHNICAL PAPERS, 2018,
  • [5] Security Risks and Designs in the Connected Vehicle Ecosystem: In-Vehicle and Edge Platforms
    De Vincenzi, Marco
    Moore, John
    Smith, Bradley
    Sarma, Sanjay E.
    Matteucci, Ilaria
    IEEE OPEN JOURNAL OF VEHICULAR TECHNOLOGY, 2025, 6 : 442 - 454
  • [6] Network Security Management in Heterogeneous Networks
    Zhang, Tao
    Tang, Xiangyun
    Wang, Jiacheng
    Liu, Jiqiang
    ELECTRONICS, 2025, 14 (03):
  • [7] A Customer Centric Best Connected Channel Model for Heterogeneous and IoT Networks
    Singh, Pushpa
    Agrawal, Rajeev
    JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING, 2018, 30 (04) : 32 - 50
  • [8] Heterogeneous Cluster-Based Information-Centric Sensor Networks With User Security Satisfaction
    Gharib, Anastassia
    Ibnkahla, Mohamed
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (09) : 8123 - 8139
  • [9] A comprehensive survey on security issues in vehicle-to-grid networks
    Rajasekaran, Arun Sekar
    Azees, Maria
    Al-Turjman, Fadi
    JOURNAL OF CONTROL AND DECISION, 2023, 10 (02) : 150 - 159
  • [10] SAMP-RPL: secure and adaptive multipath RPL for enhanced security and reliability in heterogeneous IoT-connected low power and lossy networks
    Sahraoui, Somia
    Henni, Nabil
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 14 (1) : 409 - 429