Browse > Article
http://dx.doi.org/10.13089/JKIISC.2014.24.6.1147

Identity-Exchange based Privacy Preserving Mechanism in Vehicular Networks  

Hussain, Rasheed (Hanyang University)
Oh, Heekuck (Hanyang University)
Abstract
Intelligent transportation system (ITS) is realized through a highly ephemeral network, i.e. vehicular ad hoc network (VANET) which is on its way towards the deployment stage, thanks to the advancements in the automobile and communication technologies. However, it has not been successful, at least to date, to install the technology in the mass of vehicles due to security and privacy challenges. Besides, the users of such technology do not want to put their privacy at stake as a result of communication with peer vehicles or with the infrastructure. Therefore serious privacy measures should be taken before bringing this technology to the roads. To date, privacy issues in ephemeral networks in general and in VANET in particular, have been dealt with through various approaches. So far, multiple pseudonymous approach is the most prominent approach. However, recently it has been found out that even multiple pseudonyms cannot protect the privacy of the user and profilation is still possible even if different pseudonym is used with every message. Therefore, another privacy-aware mechanism is essential in vehicular networks. In this paper, we propose a novel identity exchange mechanism to preserve conditional privacy of the users in VANET. Users exchange their pseudonyms with neighbors and then use neighbors' pseudonyms in their own messages. To this end, our proposed scheme conditionally preserves the privacy where the senders of the message can be revoked by the authorities in case of any dispute.
Keywords
VANET; VANET Clouds; Security; Conditional Privacy; Revocation; Route Tracing;
Citations & Related Records
연도 인용수 순위
  • Reference
1 U. Lee, R. Cheung and M. Gerla, "Emerging Vehicular Applications," Vehicular Networks: from theory to practice, S. Olariu and M. C. Weigle, eds., BocaRaton, FL: Taylor and Francis, pp. 1-30, 2009.
2 M. Raya and J.-P. Hubaux, "Securing Vehicular Ad Hoc Networks," Journal of Computer Security, vol. 15, pp. 39-68, 2007.   DOI
3 F. Kargl, P. Papadimitratos, L. Buttyan, M. Muter, E. Schoch, B. Wiedersheim, T. Ta-Vinh, G. Calandriello, A. Held, A. Kung, and J. P. Hubaux, "Secure vehicular communication systems: implementation, performance, and research challenges," Communications Magazine, IEEE, vol. 46, pp. 110-118, 2008.
4 X. Lin, R. Lu, C. Zhang, H. Zhu, P.-H. Ho, and X. Shen, "Security in Vehicular Ad Hoc Networks," IEEE Communications Magazine, vol. 46, no. 4, pp. 88-95, 2008.
5 D. Huang, S. Misra, M. Verma, G. Xue, "PACP: An Efficient Pseudonymous Authentication-Based Conditional Privacy Protocol for VANETs," Intelligent Transportation Systems, IEEE Transactions on, vol.12, no.3, pp.736,746, Sept. 2011.
6 J. Sun, C. Zhang, Y. Zhang, and Y. Fang, "An Identity-based Security System for User Privacy in Vehicular Ad Hoc Networks," IEEE Transactions on Parallel and Distributed Systems, vol. 21, no. 9, pp. 1227-1239, 2010.   DOI
7 R. Lu, X. Lin, H. Zhu, P.-H. Ho, and X. Shen, "ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications," in Proc. IEEE International Conference on Computer Communications (INFOCOM), pp. 1229-1237, 2008.
8 Y. Sun, R. Lu, X. Lin, X. Shen, and J. Su, "An Efficient Pseudonymous Authentication Scheme With Strong Privacy Preservation for Vehicular Communications," IEEE Transactions on Vehicular Technology, vol. 59, no. 7, pp. 3589-3603, 2010.   DOI
9 B. Wiedersheim, Z. Ma, F. Kargl, P. Papadimitratos, "Privacy in inter- vehicular networks: Why simple pseudonym change is not enough," Wireless On-demand Network Systems and Services (WONS), 2010 Seventh International Conference on, pp.176,183, Feb. 2010.
10 E. Fonseca, A. Estag, R. Baldessari, R. L. Aguiar, "Support of Anonymity in VANETs - Putting Pseudonymity into Practice," Wireless Communications and Networking Conference, 2007.WCNC 2007. IEEE, pp.3400,3405, 11-15 March 2007.
11 Z. Ma, F. Kargl, and M. Weber, "Pseudonym-on-demand: a new pseudonym refill strategy for vehicular communications," in Vehicular Technology Conference, 2008. VTC 2008-Fall. IEEE 68th. IEEE, pp. 1-5, 2008.
12 R. Lu, X. Li, T. H. Luan, X. Liang, and X. Shen, "Pseudonym changing at social spots: An effective strategy for location privacy in vanets," Vehicular Technology, IEEE Transactions on, vol. 61, no. 1, pp. 86-96, 2012.   DOI
13 A. R. Beresford and F. Stajano, "Mix zones: User privacy in location aware services," in Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second IEEE Annual Conference on. IEEE, pp. 127-131, 2004.
14 D. Eckhoff, C. Sommer, T. Gansen, R. German, and F. Dressler, "Strong and affordable location privacy in vanets: Identity diffusion using timeslots and swapping," in Vehicular Networking Conference (VNC), 2010 IEEE. IEEE, pp. 174-181, 2010.
15 B. K. Chaurasia and S. Verma, "Maximizing anonymity of a vehicle through pseudonym updation," in Proceedings of the 4th Annual International Conference on Wireless Internet. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), p. 83, 2008.
16 V. S. Miller, "Use of elliptic curves in cryptography," in Advances in Cryptology CRYPTO'85 Proceedings. Springer, pp. 417-426, 1986.
17 R. Hussain, S. Kim, and H. Oh, "Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in VANET," in Information Security Applications, Y. Heung Youl and Y. Moti, Eds., ed: Springer-Verlag, pp. 268-280, 2009.
18 T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," Information Theory, IEEE Transactions on, vol. 31, no. 4, pp. 469- 472, 1985.   DOI
19 D. Kim, J. Choi, and S. Jung, "Mutual identification and key exchange scheme in secure vanets based on group signature," in Consumer Communications and Networking Conference (CCNC), 2010 7th IEEE. pp. 1-2, 2010.