Skip to main content

Infrastructure Aided Privacy Preserving-Authentication in VANETs

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 76))

Abstract

The paper presents a privacy preserving authentication protocol for vehicles in a VANET. The authentication process involves authentication of the vehicle and the corresponding RSU by a fixed infrastructure (CTA). Every RSU has a public key infrastructure and continuously broadcasts public key. The vehicle encrypts its identity, RSU Id and timestamp using its symmetric key. The encrypted bits along with the pseudonym of vehicle and timestamp are again encrypted by the public key of RSU and send to the RSU. RSU forwards the encrypted part to the CTA. CTA sends its verification to the RSU. The verification of the vehicle is encrypted by the vehicle symmetric key and sends along with authentication of the vehicle to the RSU. The encrypted portion is forwarded to the vehicle which confirms the authentication of the RSU after decryption. The CTA also sends a temporary short certificate to the vehicle for vehicle to vehicle communication. The whole process needs only one request and reply between different entities. Simulation results indicate the time taken (~ 223 ms) for the whole process is small and constitutes only a small portion of the stay time of a vehicle within an RSU region.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Dotzer, F.: Privacy Issues in Vehicular Ad Hoc Networks. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol. 3856, pp. 197–209. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  2. Dedicated Short Range Communications (DSRC), http://www.leearmstrong.com/Dsrc/DSRCHomeset.htm

  3. Papadimitratos, P., Buttyan, L., Hubaux, J.-P., Kargl, F., Kung, A., Raya, M.: Architecture for Secure and Private Vehicular Communications. In: International Conference on ITS Telecommunications (ITST 2007), Sophia Antipolis, France, pp. 1–6 (2007)

    Google Scholar 

  4. Gerlach, M., Guttler, F.: Privacy in VANETs using Changing Pseudonyms - Ideal and Real (Poster Presentation). In: Proceedings of 65th Vehicular Technology Conference VTC 2007-Spring, Dublin, Ireland, pp. 2521–2525 (2007)

    Google Scholar 

  5. Armknecht, F., Festag, A., Westhoff, D., Zang, K.: Cross-layer privacy enhancement and non-repudiation in vehicular communication. In: Proceedings of the 4th Workshop on Mobile Ad-Hoc Networks, WMAN 2007 (March 2007)

    Google Scholar 

  6. Raya, M., Hubaux, J.-P.: The Security of VANETs. In: VANET 2005, Cologne, Germany, pp. 93–94 (2005)

    Google Scholar 

  7. Ma, Z., Kargl, F., Weber, M.: Pseudonym-On-Demand: A New Pseudonym Refill Strategy for Vehicular Communications. In: Proc. IEEE 68th Vehicular Technology Conference, pp. 1–5 (2008)

    Google Scholar 

  8. Gruteser, M., Grunwald, D.: Enhancing location privacy in wireless LAN through disposable interface identifiers: a quantitative analysis. Paper presented in the Proceedings of ACM WMASH, pp. 46–55 (2003)

    Google Scholar 

  9. Chaurasia, B.-K., Verma, S., Tomar, G.-S., Abraham, A.: Optimizing Pseudonym Updation in Vehicular Ad-hoc Networks. In: Gavrilova, M.L., Tan, C.J.K., Moreno, E.D. (eds.) Transactions on Computational Science IV. LNCS, vol. 5430, pp. 136–148. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  10. Chaurasia, B.-K., Verma, S.: Maximising Anonymity of a Vehicle. Inderscience, International Journal of Autonomous and Adaptive Communications Systems (IJAACS), Special Issue on: Security, Trust, and Privacy in DTN and Vehicular Communications 3(2), 198–216 (2010)

    Google Scholar 

  11. Raya, M., Hubaux, J.-P.: Securing Vehicular Ad Hoc Networks. Journal of Computer Security, Special Issue on Security, Ad Hoc and Sensor Networks 15(1), 39–68 (2007)

    Google Scholar 

  12. Hubaux, J.-P., Capkun, S., Luo, J.: The security and privacy of smart vehicles. IEEE Security & Privacy Magazine 2(3), 49–55 (2004)

    Article  Google Scholar 

  13. Raya, M., Hubaux, J.-P.: The security of vehicular ad hoc networks. In: Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), pp. 11–21 (2005)

    Google Scholar 

  14. Studer, A., Shi, E., Bai, F., Perrig, A.: TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs. In: IEEE SECON 2009, Rom, Italy, pp. 1–9 (2009)

    Google Scholar 

  15. Golle, P., Greene, D., Staddon, J.: Detecting and correcting malicious data in VANETs. In: Proceedings of VANET 2004, pp. 29–37 (2004)

    Google Scholar 

  16. Sampigethaya, K., Li, M., Huang, L., Poovendran, R.: AMOEBA: Robust Location Privacy Scheme for VANET. IEEE JSAC 25(8), 1569–1589 (2007)

    Google Scholar 

  17. Guo, J., Baugh, J.-P., Wang, S.: A Group Signature Based Secure and Privacy- Preserving Vehicular Communication Framework. In: Proc. of the Mobile Networking for Vehicular Environment (MOVE) workshop in conjunction with IEEE INFOCOM, pp. 103–108 (2007)

    Google Scholar 

  18. Calandriello, G., Papadimitratos, P., Lioy, A., Hubaux, J.-P.: Efficient and robust pseudonymous authentication in VANET. In: Proceedings of the Workshop on Vehicular Ad Hoc Networks (2007)

    Google Scholar 

  19. Lu, R., Lin, X., Zhu, H., Ho, P.-H., Shen, X.: ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications. In: Proceedings of the workshop INFOCOM (2008)

    Google Scholar 

  20. Verma, M., Huang, D.: SeGCom: Secure Group Communication in VANETs. In: 6th IEEE Consumer Communications and Networking Conference (CCNC 2009), pp. 1–5 (2009)

    Google Scholar 

  21. Lin, X., Sun, X., Wang, X., Zhang, C., Ho, P.-H., Shen, X.: TSVC: Timed Efficient and Secure Vehicular Communications with Privacy Preserving. IEEE Trans. on Wireless Communications 7(12), 4987–4998 (2009)

    Article  Google Scholar 

  22. Zhang, C., Lin, X., Lu, R., Ho, P.-H.: RAISE: an efficient rsu-aided message authentication scheme in vehicular communication networks. In: Proc. IEEE ICC 2008, Beijing, China (2008)

    Google Scholar 

  23. http://nsl.csie.nctu.edu.tw/nctuns.html

  24. Shamus Software Ltd. MIRACL, Multiprecision Integer and Rational Arithmetic C/C++ Library, http://indigo.ie/~mscott

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chaurasia, B.K., Verma, S., Tomar, G.S. (2010). Infrastructure Aided Privacy Preserving-Authentication in VANETs. In: Bandyopadhyay, S.K., Adi, W., Kim, Th., Xiao, Y. (eds) Information Security and Assurance. ISA 2010. Communications in Computer and Information Science, vol 76. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13365-7_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-13365-7_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-13364-0

  • Online ISBN: 978-3-642-13365-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics