Efficient Secure and Privacy-Preserving Route Reporting Scheme for VANETs

被引:3
作者
Zhang, Yuanfei [1 ]
Pei, Qianwen [1 ]
Dai, Feifei [1 ]
Zhang, Lei [1 ]
机构
[1] East China Normal Univ, Shanghai Key Lab Trustworthy Comp, Shanghai, Peoples R China
来源
2017 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGY AND COMMUNICATION ENGINEERING (CTCE2017) | 2017年 / 910卷
关键词
AUTHENTICATION;
D O I
10.1088/1742-6596/910/1/012070
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Vehicular ad-hoc network (VANET) is a core component of intelligent traffic management system which could provide various of applications such as accident prediction, route reporting, etc. Due to the problems caused by traffic congestion, route reporting becomes a prospective application which can help a driver to get optimal route to save her travel time. Before enjoying the convenience of route reporting, security and privacy-preserving issues need to be concerned. In this paper, we propose a new secure and privacy-preserving route reporting scheme for VANETs. In our scheme, only an authenticated vehicle can use the route reporting service provided by the traffic management center. Further, a vehicle may receive the response from the traffic management center with low latency and without violating the privacy of the vehicle. Experiment results show that our scheme is much more efficiency than the existing one.
引用
收藏
页数:9
相关论文
共 24 条
[1]   A comprehensive survey on vehicular Ad Hoc network [J].
Al-Sultan, Saif ;
Al-Doori, Moath M. ;
Al-Bayatti, Ali H. ;
Zedan, Hussien .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 37 :380-392
[2]   Pseudonym Based Mechanism for Sustaining Privacy in VANETs [J].
Chaurasia, Brijesh Kumar ;
Verma, Shekhar ;
Tomar, G. S. ;
Bhaskar, S. M. .
2009 1ST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE, COMMUNICATION SYSTEMS AND NETWORKS(CICSYN 2009), 2009, :420-+
[3]   VSPN: VANET-Based Secure and Privacy-Preserving Navigation [J].
Chim, T. W. ;
Yiu, S. M. ;
Hui, Lucas C. K. ;
Li, Victor O. K. .
IEEE TRANSACTIONS ON COMPUTERS, 2014, 63 (02) :510-524
[4]  
Hajiahmadi M, 2013, IEEE INT C INTELL TR, P1022, DOI 10.1109/ITSC.2013.6728366
[5]   Efficient identity based signature schemes based on pairings [J].
Hess, F .
SELECTED AREAS IN CRYPTOGRAPHY, 2003, 2595 :310-324
[6]  
Khosroshahi A. H., 2011, 2011 IEEE 2nd International Conference on Computing, Control and Industrial Engineering, P9, DOI 10.1109/CCIENG.2011.6007944
[7]  
Kirschfink H., 2000, 7 WORLD C INT TRANS
[8]  
Lei Zhang, 2011, Information Security. Proceedings 14th International Conference, ISC 2011, P293, DOI 10.1007/978-3-642-24861-0_20
[9]   A Real-Time En-Route Route Guidance Decision Scheme for Transportation-Based Cyberphysical Systems [J].
Lin, Jie ;
Yu, Wei ;
Yang, Xinyu ;
Yang, Qingyu ;
Fu, Xinwen ;
Zhao, Wei .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (03) :2551-2566
[10]  
Liu B., 2014, 6 INT S FDN PRACTICE, V8352, P323