A Dynamic Privacy-Preserving Key Management Scheme for Location-Based Services in VANETs

被引:132
作者
Lu, Rongxing [1 ]
Lin, Xiaodong [2 ]
Liang, Xiaohui [1 ]
Shen, Xuemin [1 ]
机构
[1] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
[2] Univ Ontario, Inst Technol, Fac Business & Informat Technol, Oshawa, ON L1H 7K4, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Dynamic key management; privacy preservation; secure location-based services (LBSs); vehicular ad hoc networks (VANETs); SECURE;
D O I
10.1109/TITS.2011.2164068
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
In this paper, to achieve a vehicle user's privacy preservation while improving the key update efficiency of location-based services (LBSs) in vehicular ad hoc networks (VANETs), we propose a dynamic privacy-preserving key management scheme called DIKE. Specifically, in the proposed DIKE scheme, we first introduce a privacy-preserving authentication technique that not only provides the vehicle user's anonymous authentication but enables double-registration detection as well. We then present efficient LBS session key update procedures: 1) We divide the session of an LBS into several time slots so that each time slot holds a different session key; when no vehicle user departs from the service session, each joined user can use a one-way hash function to autonomously update the new session key for achieving forward secrecy. 2) We also integrate a novel dynamic threshold technique in traditional vehicle-to-vehicle (V-2-V) and vehicle-to-infrastructure (V-2-I) communications to achieve the session key's backward secrecy, i.e., when a vehicle user departs from the service session, more than a threshold number of joined users can cooperatively update the new session key. Performance evaluations via extensive simulations demonstrate the efficiency and effectiveness of the proposed DIKE scheme in terms of low key update delay and fast key update ratio.
引用
收藏
页码:127 / 139
页数:13
相关论文
共 29 条
[1]  
[Anonymous], 1975, Queueing Systems
[2]  
[Anonymous], DEDICATED SHORT RANG
[3]  
[Anonymous], 80211PD50 IEEE
[4]  
Barreto PSLM, 2005, LECT NOTES COMPUT SC, V3788, P515
[5]  
Boneh D., 2004, CCS 04, P168, DOI DOI 10.1145/1030083.1030106
[6]  
Delerablée C, 2008, LECT NOTES COMPUT SC, V5157, P317, DOI 10.1007/978-3-540-85174-5_18
[7]   The Sybil attack [J].
Douceur, JR .
PEER-TO-PEER SYSTEMS, 2002, 2429 :251-260
[8]   Intervehicle-Communication-Assisted Localization [J].
Drawil, Nabil Mohamed ;
Basir, Otman .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2010, 11 (03) :678-691
[9]  
Freudiger Julien., 2010, 29th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies,San Diego,CA,USA, P1577
[10]   A tutorial survey on vehicular ad hoc networks [J].
Hartenstein, Hannes ;
Laberteaux, Kenneth P. .
IEEE COMMUNICATIONS MAGAZINE, 2008, 46 (06) :164-171