Anonymity and security improvements in heterogeneous connected vehicle networks

被引:0
作者
Sivasankari, S. A. [1 ]
Gupta, Deepak [2 ]
Keshta, Ismail [3 ]
Reddy, Ch. Venkata Krishna [4 ]
Singh, Pavitar Parkash [5 ]
Byeon, Haewon [6 ]
机构
[1] Vignans Fdn Sci Technol & Res, Guntur, India
[2] Inst Technol & Management, Dept CSE, Gwalior, India
[3] AlMaarefa Univ, Coll Appl Sci, Comp Sci & Informat Syst Dept, Riyadh, Saudi Arabia
[4] Chaitanya Bharathi Inst Technol, Dept Elect & Elect Engn, Hyderabad, India
[5] Lovely Profess Univ, Dept Management, Phagwara, India
[6] Inje Univ, Dept Digital Antiaging Healthcare, Gimhae 50834, South Korea
关键词
IoT; Connected vehicle network; Security; Intelligent transportation; SMART; INTERNET; OPTIMIZATION; MANAGEMENT; DESIGN; SYSTEM;
D O I
10.1007/s41060-023-00499-1
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The connected vehicle network is an important part of intelligent transportation since it provides a wide variety of online vehicle services and helps to lower the risk of accidents for drivers while also being a prominent example of the IoT inside futuristic smart vertical networks. However, the connected vehicle network's communication protocols reveal a great deal of private data, including individual vehicles' whereabouts and travel plans. Sensitive data, including vehicle positions and trajectories created during communication, must be protected as wireless communication technology by its very nature entails broadcasting and allows for open communication between vehicles. Therefore, a key objective in vehicular network security is to increase the anonymity of vehicle identities within secure services. Using a batch verification technique, we present a novel approach to anonymous identity authentication in this research. The approach uses zero-knowledge proofs and other forms of anonymized authentication to bolster the privacy of IEEE WAVE's security services. It also provides a new way to retrieve lost identification with the help of an independent party. This study primarily contributes to the improvement of privacy in IEEE WAVE security services and applications such as near-field vehicle payment and DSRC security services by proposing an improved anonymous authentication system based on batch verification and zero-knowledge proofs. According to experimental findings, the recommended method has a lower computational overhead than a number of competing systems up until the batch of signatures that have to be checked contains more than eleven. Furthermore, we suggest the optimal batch processing verification cycle, tailored to the scheme's use in the near-field vehicle payment and basic safety message (BSM) use cases of DSRC.
引用
收藏
页码:749 / 762
页数:14
相关论文
共 50 条
  • [31] Security Threats and Countermeasures for Intra-Vehicle Networks
    Wampler, David
    Fu, Huirong
    Zhu, Ye
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 153 - +
  • [32] A blockchain-based cyber-security for connected networks
    Choudhary, Deepak
    Pahuja, Roop
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (04) : 1852 - 1867
  • [33] Security Analysis and Improvements of Session Key Establishment for Clustered Sensor Networks
    Kim, Jiye
    Moon, Jongho
    Jung, Jaewook
    Won, Dongho
    JOURNAL OF SENSORS, 2016, 2016
  • [34] Security and Privacy Analysis of Youth-Oriented Connected Devices
    Solera-Cotanilla, Sonia
    Vega-Barbas, Mario
    Perez, Jaime
    Lopez, Gregorio
    Matanza, Javier
    Alvarez-Campana, Manuel
    SENSORS, 2022, 22 (11)
  • [35] Security Analysis of Accountable Anonymity in Dissent
    Syta, Ewa
    Corrigan-Gibbs, Henry
    Weng, Shu-Chun
    Wolinsky, David
    Ford, Bryan
    Johnson, Aaron
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2014, 17 (01)
  • [36] A Survey on Cyber-Security of Connected and Autonomous Vehicles (CAVs)
    Sun, Xiaoqiang
    Yu, F. Richard
    Zhang, Peng
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (07) : 6240 - 6259
  • [37] A Framework for Evaluating Connected Vehicle Security against False Data Injection Attacks
    Koley, Ipsita
    Adhikary, Sunandan
    Rohit, Rohit
    Dey, Soumyajit
    2022 25TH EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2022, : 913 - 920
  • [38] UAV Enabled Content Distribution for Internet of Connected Vehicles in 5G Heterogeneous Networks
    Su, Zhou
    Dai, Minghui
    Xu, Qichao
    Li, Ruidong
    Zhang, Hongbing
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2021, 22 (08) : 5091 - 5102
  • [39] Blockchain-based security aspects in heterogeneous Internet-of-Things networks: A survey
    Pohrmen, Fabiola Hazel
    Das, Rohit Kumar
    Saha, Goutam
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2019, 30 (10):
  • [40] On Authentication in a Connected Vehicle: Secure Integration of Mobile Devices with Vehicular Networks
    Han, Kyusuk
    Potluri, Swapna Divya
    Shin, Kang G.
    2013 ACM/IEEE INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS (ICCPS), 2013, : 160 - 169