[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2387218.2387232acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
research-article

Group signatures for secure and privacy preserving vehicular ad hoc networks

Published: 24 October 2012 Publication History

Abstract

The security of Vehicular Ad Hoc Networks (VANETs) plays a key role in protecting against bogus and malicious messages, misusing at roads, eavesdropping etc. Nowadays, common cryptographic solutions guarantee message integrity, authentication, non-repudiation and privacy which is required as a serious requirement in VANETs due to the possibility of tracking of drivers by malicious observers. The related and prior works ensure security and privacy. Nevertheless, the efficiency of these schemes is usually low or there is the possibility of denial of services attacks. The main goal of our paper is to provide initial design of a scheme which ensures privacy, security and efficiency. The proposed scheme can also protect against several Denial of Services Attacks. We compare our proposed solution with related solutions and outline the evaluation of our scheme.

References

[1]
D. Boneh, X. Boyen, and H. Shacham. Short group signatures. In Proc. Adv. Cryptology-Crypto 04, ser. LNCS 3152, pages 41--55. Springer-Verlag, 2004.
[2]
D. Chaum and E. Van Heyst. Group signatures. In Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques, EUROCRYPT'91, pages 257--265, Berlin, 1991. Springer-Verlag.
[3]
T. W. Chim, S.-M. Yiu, L. C. K. Hui, and V. O. K. Li. Specs: Secure and privacy enhancing communications schemes for vanets. Ad Hoc Networks, 9(2):189--203, 2011.
[4]
A. L. Ferrara, M. Green, S. Hohenberger, and M. Ø. Pedersen. Practical short signature batch verification. In Topics in Cryptology - The Cryptographers' Track at the RSA Conference, volume 5473, pages 309--324. Springer, April 2009.
[5]
X. Lin, X. Sun, P. han Ho, and X. Shen. Gsis: A secure and privacy preserving protocol for vehicular communications. In IEEE Transactions on Vehicular Technology, volume 56, pages 3442--3456, 2007.
[6]
B. Qin, Q. Wu, J. Domingo-Ferrer, and L. Zhang. Preserving security and privacy in large-scale vanets. In Proceedings of the 13th international conference on Information and communications security, ICICS'11, pages 121--135, Berlin, 2011. Springer-Verlag.
[7]
A. Studer, E. Shi, F. Bai, and A. Perrig. Tacking together efficient authentication, revocation, and privacy in vanets. In SECON, pages 1--9. IEEE, 2009.
[8]
A. Wasef and X. S. Shen. Efficient group signature scheme supporting batch verification for securing vehicular networks. In IEEE International Conference on Communications (ICC), 2010.
[9]
L. Wei, J. Liu, and T. Zhu. On a group signature scheme supporting batch verification for vehicular networks. In International Conference on Multimedia Information Networking and Security, pages 436--440, Los Alamitos, CA, USA, 2011. IEEE.
[10]
C. Zhang, R. Lu, X. Lin, P.-H. Ho, and X. Shen. An efficient identity-based batch verification scheme for vehicular sensor networks. In INFOCOM, pages 246--250. IEEE, 2008.
[11]
L. Zhang, Q. Wu, A. Solanas, and J. Domingo-Ferrer. A scalable robust authentication protocol for secure vehicular communications. In IEEE Transactions on Vehicular Technology 59(4), pages 1606--1617, 2010.

Cited By

View all
  • (2015)Usability of pairing-based cryptography on smartphones2015 38th International Conference on Telecommunications and Signal Processing (TSP)10.1109/TSP.2015.7296337(617-621)Online publication date: Jul-2015
  • (2013)Trade-off between signature aggregation and batch verification2013 36th International Conference on Telecommunications and Signal Processing (TSP)10.1109/TSP.2013.6613891(57-61)Online publication date: Jul-2013
  1. Group signatures for secure and privacy preserving vehicular ad hoc networks

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      Q2SWinet '12: Proceedings of the 8h ACM symposium on QoS and security for wireless and mobile networks
      October 2012
      98 pages
      ISBN:9781450316194
      DOI:10.1145/2387218
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 24 October 2012

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. anonymity
      2. cryptography
      3. group signatures
      4. vehicular ad hoc networks

      Qualifiers

      • Research-article

      Conference

      MSWiM '12
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 46 of 131 submissions, 35%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)1
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 12 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2015)Usability of pairing-based cryptography on smartphones2015 38th International Conference on Telecommunications and Signal Processing (TSP)10.1109/TSP.2015.7296337(617-621)Online publication date: Jul-2015
      • (2013)Trade-off between signature aggregation and batch verification2013 36th International Conference on Telecommunications and Signal Processing (TSP)10.1109/TSP.2013.6613891(57-61)Online publication date: Jul-2013

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media