Strongly Privacy-Preserving Communication Protocol for VANETs

被引:10
作者
Fan, Chun-I [1 ]
Sun, Wei-Zhe [1 ]
Huang, Shih-Wei [1 ]
Juang, Wen-Shenq [2 ]
Huang, Jheng-Jia [1 ]
机构
[1] Natl Sun Yat Sen Univ, Dept Comp Sci & Engn, Kaohsiung 804, Taiwan
[2] Natl Kaohsiung First Univ Sci & Technol, Dept Informat Management, Kaohsiung 824, Taiwan
来源
2014 NINTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIA JCIS) | 2014年
关键词
Blind Signature; Vehicular Communication; Privacy Preservation; Authentication; Anonymity; AUTHENTICATION SCHEME; SECURE;
D O I
10.1109/AsiaJCIS.2014.24
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Vehicular ad hoc networks (VANETs) are advanced instances of mobile ad hoc networks with the aim of enhancing the safety and efficiency of road traffic. The basic idea is to allow arbitrary vehicles to broadcast ad hoc messages (e.g. traffic accident notifications) to other vehicles and remind drivers to change their routes immediately or slow down to avoid dangers. However, some concerns on security and privacy are also raised in this environment. Messages should be signed and verified before they are trusted while the real identities of vehicles should not be revealed to guarantee source privacy, but they must be still traceable when VANETs were abused (e.g. sending a fake message). Many related works have been presented in the literature so far. They can be generally divided into two constructions, where one is based on pseudonymous authentication and the other is based on group signatures. However, both of the two constructions have some drawbacks. In a pseudonymous-authentication-based scheme, a large revocation list is usually transmitted among vehicles. A group-signature-based scheme needs a large amount of computations for revocation checking. Furthermore, most of the previous schemes cannot support privacy preservation between roadside units (RSUs) and vehicles. Consequently, in this paper, we come up with a provably secure and strong privacy preserving protocol based on the blind signature technique to guarantee privacy and fulfill other essential security requirements in the vehicular communication environment. Furthermore, compared with other similar works, we offer an efficient tracing mechanism to trace and revoke the vehicles which abused the VANETs. Finally, we provide security analysis to show that our proposed scheme is secure.
引用
收藏
页码:119 / 126
页数:8
相关论文
共 31 条
  • [1] Abe M, 2000, LECT NOTES COMPUT SC, V1880, P271
  • [2] [Anonymous], 2005, Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN'05
  • [3] [Anonymous], 2016, HDB APPL CRYPTOGRAPH
  • [4] [Anonymous], EFFICIENT IMPLEMENTA
  • [5] Calandriello G, 2007, VANET'07: PROCEEDINGS OF THE FOURTH ACM INTERNATIONAL WORKSHOP ON VEHICULAR AD HOC NETWORKS, P19
  • [6] Endorsed E-cash
    Camenisch, Jan
    Lysyanskaya, Anna
    Meyerovich, Mira
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 101 - +
  • [7] Chaum D., 1983, Advances in Cryptology, Proceedings of Crypto 82, P199
  • [8] CHAUM D, 1990, P CRYPTO 88, P319
  • [9] Threshold Anonymous Announcement in VANETs
    Chen, Liqun
    Ng, Siaw-Lynn
    Wang, Guilin
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2011, 29 (03) : 605 - 615
  • [10] Chim TW, 2010, L N INST COMP SCI SO, V28, P160