A Two Level Privacy Preserving Pseudonymous Authentication Protocol for VANET

被引:0
作者
Rajput, Ubaidullah [1 ]
Abbas, Fizza [1 ]
Eun, Hasoo [1 ]
Hussain, Rasheed [1 ]
Oh, Heekuck [1 ]
机构
[1] Hanyang Univ, Dept Comp Sci & Engn, Seoul, South Korea
来源
2015 IEEE 11TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB) | 2015年
关键词
Vehicular ad hoc networks (VANET); authentication; conditional privacy; pseudonyms; SECURE; SCHEME;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Vehicular ad hoc network (VANET) is gaining significant popularity due to their role in improving traffic efficiency and safety. However, communication in VANET needs to be secure as well as authenticated. The vehicles in the VANET not only broadcast traffic messages known as beacons but also broadcast safety critical messages such as electronic emergency brake light (EEBL). Due to the openness of the network, a malicious vehicles can join the network and broadcast bogus messages that could result in accident. On one hand, a vehicle needs to be authenticated while on the other hand, its private data such as location and identity information must be prevented from misuse. In this paper, we propose an efficient pseudonymous authentication protocol with conditional privacy preservation to enhance the security of VANET. Most of the current protocols either utilize pseudonym based approaches with certificate revocation list (CRL) that causes significant communicational and storage overhead or group signature based approaches that are computationally expensive. Another inherent disadvantage is to have full trust on certification authorities, as these entities have complete user profiles. We present a new protocol that only requires honest-but-curious behavior from certification authority. We utilize a mechanism for providing a user with two levels of pseudonyms named as base pseudonym and short time pseudonyms to achieve conditional privacy. However, in case of revocation, there is no need to maintain the revocation list of pseudonyms. The inherent mechanism assures the receiver of the message about the authenticity of the pseudonym. In the end of the paper, we analyze our protocol by giving the communication cost as well as various attack scenarios to show that our approach is efficient and robust.
引用
收藏
页码:643 / 650
页数:8
相关论文
共 21 条
  • [1] [Anonymous], 2005, P 3 ACM WORKSH SEC A, DOI DOI 10.1145/1102219.1102223
  • [2] [Anonymous], EUROCRYPT
  • [3] [Anonymous], 2008, IEEE GLOBECOM 2008 2
  • [4] [Anonymous], 2011, P 17 ANN INT C MOB C
  • [5] [Anonymous], 2005, P 4 WORKSH HOT TOP N
  • [6] Privacy preserving collaborative filtering for SaaS enabling PaaS clouds
    Basu, Anirban
    Vaidya, Jaideep
    Kikuchi, Hiroaki
    Dimitrakos, Theo
    Nair, Srijith K.
    [J]. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2012, 1 : 1 - 14
  • [7] Calandriello G, 2007, VANET'07: PROCEEDINGS OF THE FOURTH ACM INTERNATIONAL WORKSHOP ON VEHICULAR AD HOC NETWORKS, P19
  • [8] Hankerson D., 2006, Guide to elliptic curve cryptography
  • [9] Indentity-based broadcast signcryption
    Li, Fagen
    Xin, Xiangjun
    Hue, Yupu
    [J]. COMPUTER STANDARDS & INTERFACES, 2008, 30 (1-2) : 89 - 94
  • [10] GSTS: A secure and privacy-preserving protocol for vehicular communications
    Lin, Xiaodong
    Sun, Xiaoting
    Ho, Pin-Han
    Shen, Xuemin
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2007, 56 (06) : 3442 - 3456