Browse > Article
http://dx.doi.org/10.7840/KICS.2012.37.7C.576

User Authentication Method on VANET Environment  

Seo, Hwa-Jeong (부산대학교 컴퓨터공학과 정보보호 연구실)
Kim, Ho-Won (부산대학교 컴퓨터공학과 정보보호 연구실)
Abstract
Security over VANET among vehicles and between vehicles and infrastructures has been studied. Through the research, ensuring the message authentication and confidentiality was possible. However, authentication on drivers and vehicles were not actively covered. Once, malicious user using illegal vehicle joins VANET and then generates mistaken information, other drivers' safety will be driven to crisis. For this reason, in the paper, we present a novel authentication method between drivers and vehicles and then only right vehicles and users can participate in VANET. As a result of this, drivers can enjoy their safe and comfortable trip.
Keywords
사용자 인증;차량 애드혹 네트워크;공개키 암호화;공인인증서;전자 신분증;스마트 폰;
Citations & Related Records
연도 인용수 순위
  • Reference
1 D. Valerio, A. D'Alconzo, F. Ricciato, and W. Wiedermann, "Exploiting Cellular Networks for Road Traffic Estimation: A Survey and a Research Roadmap," VTC Spring 2009 - IEEE 69th Vehicular Technology Conference, pp. 1-5, Apr. 2009.
2 H. Bar-Gera, "Evaluation of a cellular phone-based system for measurements of traffic speeds and travel times: A case study from Israel," Transportation Research Part C: Emerging Technologies, vol. 15, no. 6, pp. 380-391, Dec. 2007.   DOI   ScienceOn
3 M. Fontaine, B. Smith, A. Hendricks, and W. Scherer, "Wireless Location Technology-Based Traffic Monitoring: Preliminary Recommendations to Transportation Agencies Based on Synthesis of Experience and Simulation Results," Transportation Research Record, vol. 1993, no. 1, pp. 51-58, Jan. 2007.   DOI
4 "Law of DSA", vol. 10008, 2010.
5 "Technology of certificate storage and usage ", KISA, 2010.
6 Elaine Barker, William Barker, William Burr, William Polk, Miles Smid, "Recommendation for Key Management Part 1: General(Revised)", SP 800-57, NIST, March 2007.
7 Elaine Barker, Allen Roginsky, "Transitions:Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths", SP 800-131A, NIST, January 2011.
8 L. Zhang, Q. Wu, A. Solanas, and J. Domingo-Ferrer, "A Scalable Robust Authentication Protocol for Secure Vehicular Communications," IEEE Transactions on Vehicular Technology, Vol. 59, No. 4, pp. 1606-1617, May. 2010.   DOI   ScienceOn
9 "ISO 18013-1, Information technology-Personal identification-ISO-compliant driving licence-Part 1: Physical characteristics and basic data set," ISO, 2005.
10 "ISO 18013-2, Information technology-Personal identification-ISO-compliant driving licence-Part 2: Machine-readable technologies," ISO, 2007.
11 "ISO 18013-3: Information technology-Personal identification-ISO-compliant driving licence-Part 3:Access control, authentication and integrity validation," ISO, 2006.
12 Vasileios Manolopoulos, "Security and privacy in smartphone based intelligent transportation systems," Royal institute of technology, 2012.
13 "White Paper: How TomToms HDTraffic And IQRoutes Data Provides The Very Best Routing." [Online]. Available: http://www.tomtom.com/lib/doc/download/HDT_White_Paper.pdf. [Accessed: 25-Apr-2012].
14 D. Work and A. Bayen, "Impacts of the mobile internet on transportation cyber-physical systems: Traffic monitoring using smartphones," in National Workshop for Research on High-Confidence Transportation Cyber-Physical Systems: Automotive, Aviation, & Rail, pp. 18-20. 2008.
15 "Ford Sync." [Online]. Available:http://www.ford.com/technology/sync/. [Accessed: 25-Apr-2012].
16 "BMW Connected." [Online]. Available:http://www.bmw.com/com/en/owners/bmw_apps/app_bmw_connected.html. [Accessed: 25-Apr-2012].
17 "ITU Key Global Telecom Indicators for the World Telecommunication Service Sector." [Online]. Available: http://www.itu.int/ITUD/ict/statistics/at_glance/KeyTelecom.html. [Accessed: 25-Apr-2012].
18 Y. Yim, "The state of cellular probes," 2003. [Online]. Available:http://escholarship.org/uc/item/8g90p0vw.pdf. [Accessed: 11-Apr-2012].
19 Youngjun Cho, Hyunseung Lee, Namje Park, Dooho Choi, Dongho Won, Seungjoo Kim, "Security Trend of VANET Security," KIISC, Vol. 19, No. 1, pp. 134-142, 2009.
20 H. Hartenstein and K. P. Laberteaux, "A Tutorial Survey on Vehicular Ad Hoc Networks," IEEE Communications Magazine, vol. 46, no. 6, pp. 164-171, Jun. 2008.
21 Y. Toor, P. Muhlethaler, A. Laouiti, and A. Fortelle, "Vehicular ad hoc networks: Applications and related technical issues," IEEE Communication Survey & Tutorial, vol. 10, no. 3, pp. 74-88, 2008.   DOI
22 JongTaek Oh, "5.9GHz DSRC Frequency Standard of America," TTA Journal, vol. 98, pp. 122-132, 2005.
23 M. Raya and J. P. Hubaux, "Securing Vehicular Ad hoc Networks," Journal of Computer Security, Vol. 15, No. 1, pp. 39-68, Jan. 2007.
24 X. Lin, X. Sun, P.-H. Ho, and X. Shen, "GSIS: A Secure and Privacy Preserving Protocol for Vehicular Communications," IEEE Transaction on Vehicular Technology, Vol. 56, No. 6, pp. 3442-3456. Nov. 2007.   DOI   ScienceOn
25 R. Lu, X. Lin, H. Zhu, P.-H. Ho, and X. Shen, "ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications," Proceedings IEEE INFOCOM, pp. 1903-1911, Apr. 2008.
26 C. Zhang, X. Lin, R. Lu, and P. Ho, "RAISE: An Efficient RSU-Aided Message Authentication Scheme in Vehicular Communication Networks," IEEE International Conference on Communications, art. no. 4533317, pp. 1451-1457, May. 2008.
27 C. Zhang, R. Lu, X. Lin, P.-H. Ho, and X. Shen, "An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks," Proceedings IEEE INFOCOM, pp. 816-824, Apr. 2008.
28 A. Ferrara, M. Green, S. Hohenberger, and M. Pedersen, "Practical Short Signature Batch Verification," Proceedings of CT-RSA, Lecture Notes in Computer Science, Vol. 5473, pp. 309-324, Apr. 2009.