Skip to main content

A Privacy Preserving Authentication Scheme in the Intelligent Transportation Systems

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11251))

Abstract

In Intelligent Transportation System (ITS) applications, such as traffic monitoring and road safety, privacy-preservation is one of the most important issues. The vehicles in the system can communicate by transmitting messages to another vehicle or servers. In order to detect and discard messages from attackers, the receivers need to authenticate the message that normally requires the identity of the sender. This leads to the privacy violation of the sender because the user’s identity is sent in clear text in the transmitted messages, and thus it can be linked to the vehicle’s sensitive information. To overcome this issue, pseudonyms are provided to vehicles and servers and then the receivers request a trusted authority (TA) to authenticate the sender with its pseudonym. However, it faces the congestion challenge since the number of exchanged messages in a real ITS is extremely large. In this paper, we review the state-of-the-art solutions to the privacy preserving in authentication and then propose an authentication scheme to preserve senders’ privacy in ITS. In this scheme, the vehicles and servers need to contact TA only one time to get secret information and then, based on their secret information, they can generate pseudonyms for the authentication at the receiver side. Some scenarios are also provided for the security analysis of the schemes.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Sucasas, V., Mantas, G., Saghezchi, F.B., Radwan, A., Rodriguez, J.: An autonomous privacy preserving authentication scheme for intelligent transportation systems. Comput. Secur. 60, 193–205 (2016)

    Article  Google Scholar 

  2. Saad, M.N.M., Laouiti, A., Qayyum, A.: Vehicular Ad-hoc Networks for Smart Cities. Springer, Singapore (2014). https://doi.org/10.1007/978-981-287-158-9

    Book  Google Scholar 

  3. Olariu, S., Weigle, M.C.: Vehicular Networks: From Theory to Practice, 1st edn. Chapman & Hall/CRC, Boca Raton (2009)

    Book  Google Scholar 

  4. Juan, Z., Jianping, W., McDonald, M.: Socio-economic impact assessment of intelligent transport systems. Tsinghua Sci. Technol. 11(3), 339–350 (2006)

    Article  Google Scholar 

  5. Bekiaris, E., Nakanishi, Y.J.: Economic Impacts of Intelligent Transportation Systems. Elsevier, Amsterdam (2004)

    Google Scholar 

  6. Raya, M., Hubaux, J.-P.: The security of vehicular ad-hoc networks. In: Proceedings of the 3rd ACM Workshop on Security of Ad-Hoc and Sensor Networks, SASN 2005, pp. 11–21. ACM, New York (2005)

    Google Scholar 

  7. Liu, X., Fang, Z., Shi, L.: Securing vehicular ad hoc networks. In: 2nd International Conference on Pervasive Computing and Applications, ICPCA 2007, pp. 424–429, July 2007

    Google Scholar 

  8. Lin, X., Sun, X., Ho, P.-H., Shen, X.: GSIS: a secure and privacy-preserving protocol for vehicular communications. IEEE Trans. Veh. Technol. 56(6), 3442–3456 (2007)

    Article  Google Scholar 

  9. Lu, R., Lin, X., Zhu, H., Ho, P.-H., Shen, X.: ECPP: efficient conditional privacy preservation protocol for secure vehicular communications. In: The 27th Conference on Computer Communications, INFOCOM 2008. IEEE, April 2008

    Google Scholar 

  10. Calandriello, G., Papadimitratos, P., Hubaux, J.-P., Lioy, A.: Efficient and robust pseudonymous authentication in VANET. In: Proceedings of the Fourth ACM International Workshop on Vehicular Ad Hoc Networks, VANET 2007, pp. 19–28. ACM, New York (2007)

    Google Scholar 

  11. Sampigethaya, K., Li, M., Huang, L., Poovendran, R.: AMOEBA: robust location privacy scheme for VANET. IEEE J. Sel. Areas Commun. 25(8), 1569–1589 (2007)

    Article  Google Scholar 

  12. Lu, R., Lin, X., Shi, Z., Shen, X.: A lightweight conditional privacy-preservation protocol for vehicular traffic-monitoring systems. Intelligent Systems, IEEE 28(3), 62–65 (2013)

    Article  Google Scholar 

  13. Sucasas, V., Radwan, A., Marques, H., Rodriguez, J., Vahid, S., Tafazolli, R.: A cognitive approach for stable cooperative-group formation in mobile environments. In: 2014 IEEE International Conference on Communications (ICC), pp. 3241–3245, June 2014

    Google Scholar 

  14. Ma, Z., Kargl, F., Weber, M.: Pseudonym-on-demand: a new pseudonym refill strategy for vehicular communications. In: IEEE 68th Vehicular Technology Conference, VTC 2008-Fall, pp. 1–5, September 2008

    Google Scholar 

  15. Huang, J.-L., Yeh, L.-Y., Chien, Hung-Yu.: ABAKA: an anonymous batch authenticated and key agreement scheme for value added services in vehicular ad hoc networks. IEEE Trans. Veh. Technol. 60(1), 248–262 (2011)

    Article  Google Scholar 

  16. Huang, D., Misra, S., Verma, M., Xue, G.: PACP: an efficient pseudonymous authentication-based conditional privacy protocol for VANETs. IEEE Trans. Intell. Transp. Syst. 12(3), 736–746 (2011)

    Article  Google Scholar 

  17. Sun, Y., Lu, R., Lin, X., Shen, X., Jinshu, S.: An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. IEEE Trans. Veh. Technol. 59(7), 3589–3603 (2010)

    Article  Google Scholar 

  18. Haas, J.J., Hu, Y.-C., Laberteaux, K.P.: Design and analysis of a lightweight certificate revocation mechanism for VANET. In: Proceedings of the 6th ACM International Workshop on VehiculAr InterNETworking, VANET 2009, pp. 89–98. ACM, New York (2009)

    Google Scholar 

  19. Huang, L., Matsuura, K., Yamane, H., Sezaki, K.: Enhancing wireless location privacy using silent period. In: IEEE Wireless Communications and Networking Conference, vol. 2, pp. 1187–1192, March 2005

    Google Scholar 

  20. Ying, B., Makrakis, D., Mouftah, H.T.: Dynamic mix-zone for location privacy in vehicular networks. IEEE Commun. Lett. 17(8), 1524–1527 (2013)

    Article  Google Scholar 

  21. Kido, H., Yanagisawa, Y., Satoh, T.: An anonymous communication technique using dummies for location-based services. In: Proceedings of International Conference on Pervasive Services, ICPS 2005, pp. 88–97, July 2005

    Google Scholar 

  22. Araniti, G., Campolo, C., Condoluci, M., Iera, A., Molinaro, A.: Lte for vehicular networking: a survey. IEEE Commun. Mag. 51(5), 148–157 (2013)

    Article  Google Scholar 

  23. Zhang, Y., Chen, J.-L.: A delegation solution for universal identity management in SOA. IEEE Trans. Serv. Comput. 4(1), 70–81 (2011)

    Article  Google Scholar 

  24. Zhou, X., Tang, X.: Research and implementation of RSA algorithm for encryption and decryption. IEEE, September 2011

    Google Scholar 

Download references

Acknowledgements

This research is funded by Vietnam National University Ho Chi Minh City (VNU-HCM) under grant number C2017-20-17.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anh Truong .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Nguyen Hai Vinh, C., Truong, A., Tran Huu, T. (2018). A Privacy Preserving Authentication Scheme in the Intelligent Transportation Systems. In: Dang, T., Küng, J., Wagner, R., Thoai, N., Takizawa, M. (eds) Future Data and Security Engineering. FDSE 2018. Lecture Notes in Computer Science(), vol 11251. Springer, Cham. https://doi.org/10.1007/978-3-030-03192-3_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-03192-3_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-03191-6

  • Online ISBN: 978-3-030-03192-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics