Expedite Privacy-Preserving Emergency Communication Scheme for VANETs

被引:5
作者
Chen, Long [1 ]
Jia, Xuedan [2 ]
Meng, Lixia [3 ]
Wang, Liangmin [3 ]
机构
[1] Jiangsu Univ, Automot Engn Res Inst, Zhenjiang 212013, Peoples R China
[2] Jiangsu Univ, Sch Comp Sci & Telecommun Engn, Zhenjiang 212013, Peoples R China
[3] Anhui Univ, Minist Educ, Key Lab Intelligent Comp & Signal Proc, Hefei 230039, Peoples R China
来源
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS | 2013年
关键词
MESSAGE AUTHENTICATION; BATCH VERIFICATION; EFFICIENT; PROTOCOL; SECURE;
D O I
10.1155/2013/693930
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The existing communication schemes are often unusable in natural disasters and public emergencies. But requirements of information collection and data transmission in emergency scenario are very imperative. Thus, sensor networks ad hoc networks are required in the emergency communication systems. For example, rescue vehicles equipped with wireless communication devices, sensors, and cameras are regularly used to collect and transmit the real-time information for the rescue action. The paper focuses on security solutions for the vehicular ad hoc networks (VANETs) in the emergency communication cases, in which the communication infrastructures are not always available. An expedite privacy-preserving emergency communication (EPEC) scheme is presented for the vehicles to securely connect with the others in the neighbor area even when the trusted infrastructures are destroyed by the disaster. EPEC satisfies conditional privacy preservation requirements, in which both lightweight signature and batch verification are employed to provide efficiency. We also show the proof of the security, feasibility, and efficiency of our EPEC by the theoretical and experimental analyses.
引用
收藏
页数:13
相关论文
共 28 条
  • [1] [Anonymous], 2005, Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN'05
  • [2] [Anonymous], IEEE T VEHICULAR TEC
  • [3] [Anonymous], 2002, RSA CryptoBytes
  • [4] Barreto PSLM, 2005, LECT NOTES COMPUT SC, V3788, P515
  • [5] Short group signatures
    Boneh, D
    Boyen, X
    Shacham, H
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 : 41 - 55
  • [6] Boneh D., 2004, CCS 04, P168, DOI DOI 10.1145/1030083.1030106
  • [7] Chaurasia Brijesh Kumar, 2011, Transactions on Computational Science XIII: LNCS 6750, P147, DOI 10.1007/978-3-642-22619-9_8
  • [8] Chen R., 2009, P INT C WIR ACC VEH
  • [9] MLAS: Multiple level authentication scheme for VANETs
    Chim, T. W.
    Yiu, S. M.
    Hui, Lucas C. K.
    Li, Victor O. K.
    [J]. AD HOC NETWORKS, 2012, 10 (07) : 1445 - 1456
  • [10] Du D.Z., 1993, COMBINATORIAL GROUP, V2nd