Infrastructure Aided Privacy Preserving-Authentication in VANETs

  • Brijesh Kumar Chaurasia
  • Shekhar Verma
  • G. S. Tomar
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6485)


The paper presents a privacy preserving authentication protocol for vehicles in a VANET. The authentication process involves authentication of the vehicle and the corresponding RSU by a fixed infrastructure (CTA). Every RSU has a public key infrastructure and continuously broadcasts public key. The vehicle encrypts its identity, RSU Id and timestamp using its symmetric key. The encrypted bits along with the pseudonym of vehicle and timestamp are again encrypted by the public key of RSU and send to the RSU. RSU forwards the encrypted part to the CTA. CTA sends its verification to the RSU. The verification of the vehicle is encrypted by the vehicle symmetric key and sends along with authentication of the vehicle to the RSU. The encrypted portion is forwarded to the vehicle which confirms the authentication of the RSU after decryption. The CTA also sends a temporary short certificate to the vehicle for vehicle to vehicle communication. The whole process needs only one request and reply between different entities. Simulation results indicate the time taken (~ 223 ms) for the whole process is small and constitutes only a small portion of the stay time of a vehicle within an RSU region.


Mutual authentication public-private key VANETs Vehicles Road Side Units 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Dotzer, F.: Privacy Issues in Vehicular Ad Hoc Networks. In: Workshop on Privacy Enhancing Technologies, Dubrovnik, Cavtat, Croatia, pp. 197–209 (2005)Google Scholar
  2. 2.
    Dedicated Short Range Communications (DSRC),
  3. 3.
    Papadimitratos, P., Buttyan, L., Hubaux, J.-P., Kargl, F., Kung, A., Raya, M.: Architecture for Secure and Private Vehicular Communications. In: International Conference on ITS Telecommunications (ITST 2007), Sophia Antipolis, France, pp. 1–6 (2007)Google Scholar
  4. 4.
    Gerlach, M., Guttler, F.: Privacy in VANETs using Changing Pseudonyms - Ideal and Real (Poster Presentation). In: Proceedings of 65th Vehicular Technology Conference VTC 2007.Spring, Dublin, Ireland (2007)Google Scholar
  5. 5.
    Armknecht, F., Festag, A., Westhoff, D., Zang, K.: Cross-layer privacy enhancement and non-repudiation in vehicular communication. In: Proceedings of the 4th Workshop on Mobile Ad-Hoc Networks, WMAN 2007 (March 2007)Google Scholar
  6. 6.
    Raya, M., Hubaux, J.-P.: The Security of VANETs. In: VANET 2005, Cologne, Germany, pp. 93–94 (2005)Google Scholar
  7. 7.
    Ma, Z., Kargl, F., Weber, M.: Pseudonym-On-Demand: A New Pseudonym Refill Strategy for Vehicular Communications. In: Proc. IEEE 68th Vehicular Technology Conference, pp. 1–5 (2008)Google Scholar
  8. 8.
    Gruteser, M., Grunwald, D.: Enhancing location privacy in wireless LAN through disposable interface identifiers: a quantitative analysis. Paper presented in the Proceedings of ACM WMASH, pp. 46–55 (2003)Google Scholar
  9. 9.
    Chaurasia, B.-K., Verma, S., Tomar, G.-S., Abraham, A.: Optimizing Pseudonym Updation in Vehicular Ad-hoc Networks. In: Gavrilova, M.L., Tan, C.J.K., Moreno, E.D. (eds.) Transactions on Computational Science IV. LNCS, vol. 5430, pp. 136–148. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  10. 10.
    Chaurasia, B.-K., Verma, S.: Maximising Anonymity of a Vehicle. Inderscience, International Journal of Autonomous and Adaptive Communications Systems (IJAACS), Special Issue on: Security, Trust, and Privacy in DTN and Vehicular Communications 3(2), 198–216 (2010)CrossRefGoogle Scholar
  11. 11.
    Raya, M., Hubaux, J.-P.: Securing Vehicular Ad Hoc Networks. Journal of Computer Security, Special Issue on Security, Ad Hoc and Sensor Networks 15(1), 39–68 (2007)Google Scholar
  12. 12.
    Hubaux, J.-P., Capkun, S., Luo, J.: The security and privacy of smart vehicles. IEEE Security & Privacy magazine 2(3), 49–55 (2004)CrossRefGoogle Scholar
  13. 13.
    Raya, M., Hubaux, J.-P.: The security of vehicular ad hoc networks. In: Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), pp. 11–21 (2005)Google Scholar
  14. 14.
    Studer, A., Shi, E., Bai, F., Perrig, A.: TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs. In: IEEE SECON 2009, Rom, Italy, pp. 1–9 (2009)Google Scholar
  15. 15.
    Golle, P., Greene, D., Staddon, J.: Detecting and correcting malicious data in VANETs. In: Proceedings of VANET 2004, pp. 29–37 (2004)Google Scholar
  16. 16.
    Sampigethaya, K., Li, M., Huang, L., Poovendran, R.: AMOEBA: Robust Location Privacy Scheme for VANET. IEEE JSAC 25(8), 1569–1589 (2007)Google Scholar
  17. 17.
    Guo, J., Baugh, J.-P., Wang, S.: A Group Signature Based Secure and Privacy- Preserving Vehicular Communication Framework. In: Proc. of the Mobile Networking for Vehicular Environment (MOVE) workshop in conjunction with IEEE INFOCOM, pp. 103–108 (2007)Google Scholar
  18. 18.
    Calandriello, G., Papadimitratos, P., Lioy, A., Hubaux, J.-P.: Efficient and robust pseudonymous authentication in VANET. In: Proceedings of the Workshop on Vehicular Ad Hoc Networks (2007)Google Scholar
  19. 19.
    Lu, R., Lin, X., Zhu, H., Ho, P.-H., Shen, X.: ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications. In: Proceedings of the Workshop INFOCOM (2008)Google Scholar
  20. 20.
    Verma, M., Huang, D.: SeGCom: Secure Group Communication in VANETs. In: 6th IEEE Consumer Communications and Networking Conference (CCNC 2009), pp. 1–5 (2009)Google Scholar
  21. 21.
    Lin, X., Sun, X., Wang, X., Zhang, C., Ho, P.-H., Shen, X.: TSVC: Timed Efficient and Secure Vehicular Communications with Privacy Preserving. IEEE Trans. on Wireless Communications 7(12), 4987–4998 (2009)CrossRefGoogle Scholar
  22. 22.
    Zhang, C., Lin, X., Lu, R., Ho, P.-H.: RAISE: an efficient rsu-aided message authentication scheme in vehicular communication networks. In: Proc. IEEE ICC 2008, Beijing, China (2008)Google Scholar
  23. 23.
  24. 24.
    Shamus Software Ltd. MIRACL, Multiprecision Integer and Rational Arithmetic C/C++ Library,

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Brijesh Kumar Chaurasia
    • 1
  • Shekhar Verma
    • 1
  • G. S. Tomar
    • 2
  1. 1.Indian Institute of Information TechnologyAllahabadIndia
  2. 2.Malwa Institute of Technology and ManagementGwaliorIndia

Personalised recommendations