Skip to main content

Safety and Privacy in Vehicular Communications

  • Chapter
Privacy in Location-Based Applications

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5599))

Abstract

Vehicular ad hoc networks (VANETs) will improve traffic safety and efficiency provided that car-to-car communication stays trustworthy. Therefore, it is crucial to ensure that the information conveyed by vehicle-generated messages is reliable. A sensible option is to request that the content of a message originated by a certain vehicle be endorsed by nearby peer vehicles. However, neither message generation nor message endorsement should entail any privacy loss on the part of vehicles co-operating in it. This chapter surveys the available solutions to this security-privacy tension and analyzes their limitations. A new privacy-preserving system is sketched which guarantees message authentication through both a priori and a posteriori countermeasures.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aad, I., Hubaux, J.-P., Knightly, R.: Denial of service resilience in ad hoc networks. In: Proceedings of ACM MobiCom, Philadelphia, PA, USA (September 2004)

    Google Scholar 

  2. Armknecht, F., Festag, A., Westhoff, D., Zeng, K.: Cross-layer privacy enhancement and non-repudiation in vehicular communication. In: 4th Workshop on Mobile Ad-Hoc Networks (WMAN), Bern, Switzerland (March 2007)

    Google Scholar 

  3. Au, M.H., Wu, Q., Susilo, W., Mu, Y.: Compact E-cash from bounded accumulator. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol. 4377, pp. 178–195. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  4. Beresford, A., Stajano, F.: Mix Zones: User Privacy in Locationaware Services. In: Proc. of PerSec 2004, pp. 127–131 (March 2004)

    Google Scholar 

  5. Blau, J.: Car talk. IEEE Spectrum 45(10), 16 (2008)

    Article  Google Scholar 

  6. Boyen, X., Waters, B.: Compact group signatures without random oracles. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 427–444. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  7. Calandriello, G., Papadimitratos, P., Lioy, A., Hubaux, J.-P.: Efficient and robust pseudonymous authentication in VANET. In: Proceedings of the 4th ACM International Workshop on Vehicular Ad Hoc Networks-VANET 2007, pp. 19–28 (2007)

    Google Scholar 

  8. Chaum, D., van Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257–265. Springer, Heidelberg (1991)

    Chapter  Google Scholar 

  9. Daza, V., Domingo-Ferrer, J., Sebe, F., Viejo, A.: Trustworthy privacy-preserving car-generated announcements in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology 58(4), 1876–1886 (2009)

    Article  Google Scholar 

  10. Dötzer, F.: Privacy issues in vehicular ad hoc networks. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol. 3856, pp. 197–209. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  11. Douceur, J.: The Sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  12. Eiland, E., Liebrock, L.: An application of information theory to intrusion detection. In: Proceedings of IWIA 2006 (2006)

    Google Scholar 

  13. European Parliament. Legislative resolution on the proposal for a directive of the European Parliament and of the Council on the retention of data processed in connection with the provision of public electronic communication services and amending Directive 2002/58/EC (COM(2005)0438 C6-0293/2005 2005/0182(COD)) (2005)

    Google Scholar 

  14. Feinstein, L., Schnackenberg, D., Balupari, R., Kindred, D.: Statistical approaches to DDoS attack detection and response. In: Proceedings of the DARPA Information Survivability Conference and Exposition (2003)

    Google Scholar 

  15. Fonseca, E., Festag, A., Baldessari, R., Aguiar, R.-L.: Support of anonymity in VANETs - Putting pseudonymity into practice. In: IEEE Wireless Communications and Networking Conference-WCNC 2007 (2007)

    Google Scholar 

  16. Gamage, C., Gras, B., Tanenbaum, A.S.: An identity-based ring signature scheme with enhanced privacy. In: Proceedings of the IEEE SecureComm Conference, pp. 1–5 (2006)

    Google Scholar 

  17. Golle, P., Greene, D., Staddon, J.: Detecting and correcting malicious data in VANETs. In: Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks, pp. 29–37 (2004)

    Google Scholar 

  18. Groth, J.: Fully anonymous group signatures without random oracles. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 164–180. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  19. Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proc. of MobiSys 2003, pp. 31–42 (2003)

    Google Scholar 

  20. Guo, J., Baugh, J.P., Wang, S.: A group signature based secure and privacy-preserving vehicular communication framework. In: Mobile Networking for Vehicular Environments, pp. 103–108 (2007)

    Google Scholar 

  21. Hubaux, J.-P., Capkun, S., Luo, J.: The security and privacy of smart vehicles. IEEE Security and Privacy Magazine 2(3), 49–55 (2004)

    Article  Google Scholar 

  22. IEEE P1609.2 Version 1 - Standard for Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages (2006)

    Google Scholar 

  23. Jakobsson, M., Wetzel, S.: Efficient attribute authentication with applications to ad hoc networks. In: Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks - VANET 2004 (2004)

    Google Scholar 

  24. Lee, W., Xiang, D.: Information-theoretic measures for anomaly detection. In: Proceedings of the IEEE Symposium on Security and Privacy (2001)

    Google Scholar 

  25. Leinmüller, T., Maihöfer, C., Schoch, E., Kargl, F.: Improved security in geographic ad hoc routing through autonomous position verification. In: Proceedings of the 3rd ACM International Workshop on Vehicular Vehicular Ad Hoc Networks - VANET 2006, pp. 57–66 (2006)

    Google Scholar 

  26. Lin, X., Sun, X., Ho, P.-H., Shen, X.: GSIS: A secure and privacy preserving protocol for vehicular communications. IEEE Transactions on Vehicular Technology 56(6), 3442–3456 (2007)

    Article  Google Scholar 

  27. Luo, J., Hubaux, J.-P.: A survey of inter-vehicle communication. Technical Report IC/2004/24, EPFL, Lausanne, Switzerland (2004)

    Google Scholar 

  28. Nakanishi, T., Fujiwara, T., Watanabe, H.: A linkable group signature and its application to secret voting. Transactions of Information Processing Society of Japan 40(7), 3085–3096 (1999)

    MathSciNet  Google Scholar 

  29. Ostermaier, B., Dötzer, F., Strassberger, M.: Enhancing the security of local danger warnings in VANETs - A simulative analysis of voting schemes. In: Proceedings of the Second International Conference on Availability, Reliability and Security, pp. 422–431 (2007)

    Google Scholar 

  30. Papadimitratos, P., Buttyan, L., Hubaux, J.-P., Kargl, F., Kung, A., Raya, M.: Architecture for secure and private vehicular communications. In: ITST 2007, Sophia Antipolis, France (2007)

    Google Scholar 

  31. Parno, B., Perrig, A.: Challenges in securing vehicular networks. In: Proceedings of the ACM Workshop on Hot Topics in Networks (2005)

    Google Scholar 

  32. Picconi, F., Ravi, N., Gruteser, M., Iftode, L.: Probabilistic validation of aggregated data in vehicular ad-hoc networks. In: Proceedings of the 3rd International Workshop on Vehicular Ad hoc Networks - VANET 2006, pp. 76–85 (2006)

    Google Scholar 

  33. Raya, M., Aziz, A., Hubaux, J.-P.: Efficient secure aggregation in VANETs. In: Proceedings of the 3rd International Workshop on Vehicular Ad hoc Networks - VANET 2006, pp. 67–75 (2006)

    Google Scholar 

  34. Raya, M., Hubaux, J.-P.: Securing vehicular ad hoc networks. Journal of Computer Security (special issue on Security of Ad Hoc and Sensor Networks) 15(1), 39–68 (2007)

    Google Scholar 

  35. Raya, M., Hubaux, J.-P.: The security of vehicular ad hoc networks. In: 3rd ACM Workshop on Security of Ad hoc and Sensor Networks-SASN 2005, pp. 11–21 (2005)

    Google Scholar 

  36. Raya, M., Papadimitratos, P., Aad, I., Jungels, D., Hubaux, J.-P.: Eviction of misbehaving and faulty nodes in vehicular networks. IEEE Journal on Selected Areas in Communications 25(8), 1557–1568 (2007)

    Article  Google Scholar 

  37. Raya, M., Papadimitratos, P., Hubaux, J.-P.: Securing vehicular communications. IEEE Wireless Communications Magazine 13(5), 8–15 (2006)

    Article  Google Scholar 

  38. Sampigethaya, K., Huang, L., Li, M., Poovendran, R., Matsuura, K., Sezaki, K.: CARAVAN: Providing Location Privacy for VANET. In: Proc. of ESCAR 2005 (November 2005)

    Google Scholar 

  39. U.S. Department of Transportation, National Highway Traffic Safety Administration, Vehicle Safety Communications Project, Final Report (April 2006), http://www-nrd.nhtsa.dot.gov/pdf/nrd-12/060419-0843/PDFTOC.htm

  40. Wu, Q., Domingo-Ferrer, J.: Balanced trustworthiness, safety and privacy in vehicle-to-vehicle Communications, Manuscript (2008)

    Google Scholar 

  41. Zarki, M.E., Mehrotra, S., Tsudik, G., Venkatasubramanian, N.: Security issues in a future vehicular network. In: Proceedings of European Wireless 2002 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Domingo-Ferrer, J., Wu, Q. (2009). Safety and Privacy in Vehicular Communications. In: Bettini, C., Jajodia, S., Samarati, P., Wang, X.S. (eds) Privacy in Location-Based Applications. Lecture Notes in Computer Science, vol 5599. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03511-1_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-03511-1_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-03510-4

  • Online ISBN: 978-3-642-03511-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics