[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/1687299.1687354guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

TACKing together efficient authentication, revocation, and privacy in VANETs

Published: 22 June 2009 Publication History

Abstract

Vehicular Ad Hoc Networks (VANETs) require a mechanism to help authenticate messages, identify valid vehicles, and remove malevolent vehicles. A Public Key Infrastructure (PKI) can provide this functionality using certificates and fixed public keys. However, fixed keys allow an eavesdropper to associate a key with a vehicle and a location, violating drivers' privacy. In this work we propose a VANET key management scheme based on Temporary Anonymous Certified Keys (TACKs). Our scheme efficiently prevents eavesdroppers from linking a vehicle's different keys and provides timely revocation of misbehaving participants while maintaining the same or less overhead for vehicle-to-vehicle communication as the current IEEE 1609.2 standard for VANET security.

References

[1]
F. Bai, T. Elbatt, G. Hollan, H. Krishnan, and V. Sadekar. Towards characterizing and classifying communication-based automotive applications from a wireless networking perspective. In Proceedings of IEEE Workshop on Automotive Networking and Applications (AutoNet), Dec. 2006.
[2]
D. Boneh, X. Boyen, and H. Shacham. Short group signatures. In Proceedings of Advances in Cryptology (CRYPTO), 2004.
[3]
D. Boneh and H. Shacham. Group signatures with verifier-local revocation. In Proceedings of the ACM conference on Computer and communications security (CCS), pages 168-177, 2004.
[4]
G. Calandriello, P. Papadimitratos, A. Lioy, and J.-P. Hubaux. Efficient and robust pseudonymous authentication in VANET. In Proceedings of the Workshop on Vehicular Ad Hoc Networks (VANET), 2007.
[5]
D. Chaum. The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology, I(1), 1998.
[6]
D. Chaum and E. van Heyst. Group signatures. In Proceedings of Eurocrypt, 1991.
[7]
D. L. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84-88, Feb. 1981.
[8]
R. Cramer, I. Damgard, and J. B. Nielsen. Multiparty computation from threshold homomorphic encryption. In EUROCRYPT '01: Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, pages 280-299, London, UK, 2001. Springer-Verlag.
[9]
J. R. Douceur. The sybil attack. In First International Workshop on Peer-to-Peer Systems (IPTPS '02), Mar. 2002.
[10]
J. Duffy. U.S. pitches wireless highway safety plan. Network World, Nov. 2005.
[11]
T. Fisher. Rural deployments using CDMA. www.e-nc.org/pdf/rural_ deployments_using_CDMA.pdf.
[12]
M. Gerlach. Assessing and improving privacy in VANETs. In Proceedings of Workshop on Embedded Security in Cars (ESCAR), 2006.
[13]
P. Golle, D. Greene, and J. Staddon. Detecting and correcting malicious data in vanets. In Proceedings of the Workshop on Vehicular Ad Hoc Networks (VANET), pages 29-37. ACM, 2004.
[14]
Y.-C. Hu and K. P. Laberteaux. Strong VANET security on a budget. In Proceedings of Workshop on Embedded Security in Cars (ESCAR), 2006.
[15]
J.-P. Hubaux, S. Capkun, and J. Luo. The security and privacy of smart vehicles. IEEE Security & Privacy magazine, 2(3):49-55, 2004.
[16]
IEEE. 1609.2: Trial-use standard for wireless access in vehicular environments-security services for applications and management messages. IEEE Standards, 2006.
[17]
R. Lu, X. Lin, H. Zhu, P.-H. Ho, and X. Shen. ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications. In to Appear INFOCOM 2008.
[18]
B. Lynn. The Pairing-Based Cryptography (PBC) library. http://crypto. stanford.edu/pbc.
[19]
National Highway Traffic Safety Administration. 2005 state traffic data. http://www-nrd.nhtsa.dot.gov/pdf/nrd-30/NCSA/TSF2005/ StateTrafficData05.pdf, Sept. 2006.
[20]
A. Perrig, R. Canetti, J. D. Tygar, and D. Song. The TESLA broadcast authentication protocol. RSA CryptoBytes, 5(Summer), 2002.
[21]
M. Raya and J.-P. Hubaux. The security of vehicular ad hoc networks. In Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), Nov. 2005.
[22]
A. K. Saha and D. B. Johnson. Modeling mobility for vehicular ad hoc networks. In Proceedings of the Workshop on Vehicular Ad Hoc Networks (VANET), 2004.
[23]
K. Sampigethaya, L. Huang, M. Li, R. Poovendran, K. Matsuura, and K. Sezaki. CARAVAN: Providing location privacy for vanet. In Proceedings of Embedded Security in Cars (ESCAR), Nov. 2005.
[24]
E. Schoch, F. Kargl, T. Leinmller, S. Schlott, and P. Papadimitratos. Impact of pseudonym changes on geographic routing in vanets. In Proceedings of the European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS), 2006.
[25]
E. Shi, J. Bethencourt, H. Chan, D. Song, and A. Perrig. Multi-dimensional range query over encrypted data. In IEEE Symposium on Security and Privacy, May 2007.
[26]
VINT Project, University of Berkeley/LBNL. NS-2:network simulator. http://www.isi.edu/nsnam/ns/.
[27]
N. Wisitpongphan, F. Bai, P. Mudalige, V. Sadekar, and O. K. Tonguz. On the routing problem in disconnected vehicular networks. In Proceedings of the IEEE INFOCOM Minisymposia, 2007.

Cited By

View all
  1. TACKing together efficient authentication, revocation, and privacy in VANETs

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image Guide Proceedings
      SECON'09: Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
      June 2009
      727 pages
      ISBN:9781424429073

      Publisher

      IEEE Press

      Publication History

      Published: 22 June 2009

      Author Tags

      1. key management
      2. privacy
      3. revocation
      4. vehicular ad hoc networks

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 13 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2019)An Attribute-Based Framework for Secure Communications in Vehicular Ad Hoc NetworksIEEE/ACM Transactions on Networking10.1109/TNET.2019.289462527:2(721-733)Online publication date: 1-Apr-2019
      • (2016)A Review on the Various Security Techniques for VANETsProcedia Computer Science10.1016/j.procs.2016.02.05578:C(284-290)Online publication date: 1-Mar-2016
      • (2016)SEMDJournal of Computer and System Sciences10.1016/j.jcss.2016.05.00682:8(1316-1328)Online publication date: 1-Dec-2016
      • (2016)Privacy-preserving authentication framework using bloom filter for secure vehicular communicationsInternational Journal of Information Security10.1007/s10207-015-0299-415:4(433-453)Online publication date: 1-Aug-2016
      • (2016)An enhanced and secure trust-extended authentication mechanism for vehicular ad-hoc networksSecurity and Communication Networks10.1002/sec.16029:17(4255-4271)Online publication date: 25-Nov-2016
      • (2015)Privacy-aware access control for message exchange in vehicular ad hoc networksTelecommunications Systems10.1007/s11235-014-9881-858:4(349-361)Online publication date: 1-Apr-2015
      • (2015)Efficient group signatures for privacy-preserving vehicular networksTelecommunications Systems10.1007/s11235-014-9878-358:4(293-311)Online publication date: 1-Apr-2015
      • (2015)Secure Incentive-Based Architecture for Vehicular CloudProceedings of the 14th International Conference on Ad-hoc, Mobile, and Wireless Networks - Volume 914310.1007/978-3-319-19662-6_25(361-374)Online publication date: 29-Jun-2015
      • (2014)PPREMComputer Standards & Interfaces10.1016/j.csi.2013.08.00236:3(513-523)Online publication date: 1-Mar-2014
      • (2013)Secure smartphone-based registration and key deployment for vehicle-to-cloud communicationsProceedings of the 2013 ACM workshop on Security, privacy & dependability for cyber vehicles10.1145/2517968.2517970(31-36)Online publication date: 4-Nov-2013
      • Show More Cited By

      View Options

      View options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media