Advertisement

Conditional Privacy through Ring Signature in Vehicular Ad-hoc Networks

  • Brijesh Kumar Chaurasia
  • Shekhar Verma
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6750)

Abstract

Ring signature allows a signer to disclose reliable information by enabling source authentication while allowing him to be indistinguishable among the possible signers. The scheme is setup free and a vehicle can create a signer group on the fly without taking the consent of the other possible signers to disseminate messages. However, absolute anonymity can be misused. In this paper, a non repudiation mechanism has been proposed in ring signature scheme to make a vehicle’s privacy conditional. A vehicle can obtain the public keys of the vehicles around it to create a signature. This signature can be used to prove the accuracy of a message without revealing the signer’s identity. The signer remains hidden in the crowd of his neighboring vehicles and their public keys giving it both location and identity privacy. Simulation results the time taken by the scheme to create signed message and transfer it over the shared wireless channel is in the order of milliseconds for different traffic conditions on the road. This proves the efficacy of the scheme and makes it attractive for VANETs.

Keywords

Ring signature vehicular networks anonymity and traceability 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Wasef, A., Shen, X.: REP: Location Privacy for VANETs Using Random Encryption Periods. Mobile Netw. Appl. 15, 172–185 (2010)CrossRefGoogle Scholar
  2. 2.
    Calandriello, G., Papadimitratos, P., Hubaux, J.-P., Lioy, A.: Efficient and Robust Pseudonymous Authentication in VANET. In: Proceedings of the Fourth ACM International Workshop on Vehicular ad hoc Networks, Canada, pp. 19–28 (2007)Google Scholar
  3. 3.
    Chaum, D., van Heijst, E.: Group signatures. In: EUROCRYPT 1991. LNCS, vol. 576, pp. 257–265. Springer, Heidelberg (1991)Google Scholar
  4. 4.
    Camenisch, J.L., Stadler, M.A.: Efficient group signature schemes for large groups. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 410–424. Springer, Heidelberg (1997)CrossRefGoogle Scholar
  5. 5.
    Sampigethaya, K., Li, M., Huang, L., Poovendran, R.: AMOEBA: Robust Location Privacy Scheme for VANET. IEEE JSAC 25(8), 1569–1589 (2007)Google Scholar
  6. 6.
    Guo, J., Baugh, J.P., Shengquan, W.: A Group Signature Based Secure and Privacy- Preserving Vehicular Communication Framework. In: Proc. of the Mobile Networking for Vehicular Environment (MOVE) Workshop in Conjunction with IEEE INFOCOM, pp. 103–108 (2007)Google Scholar
  7. 7.
    Lin, X., Sun, X., Ho, P.-H., Shen, X.: GSIS: A Secure and Privacy Preserving Protocol for Vehicular Communications, In. IEEE Transactions on Vehicular Technology 56(6), 3442–3456 (2007)CrossRefGoogle Scholar
  8. 8.
    Lu, R., Lin, X., Zhu, H., Ho, P.-H., Shen, X.: ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications. In: The 27th IEEE International Conference on Computer Communications (INFOCOM 2008), Phoenix, Arizona, USA, pp. 1903–1911 (2008)Google Scholar
  9. 9.
    Chaurasia, B.K., Verma, S., Bhasker, S.M.: Message broadcast in VANETs using Group Signature. In: Fourth International Conference on Wireless Communication and Sensor Networks, India, pp. 131–136 (2008)Google Scholar
  10. 10.
    Xi, Y., Shi, W., Schwiebert, L.: Mobile Anonymity of Dynamic Groups in Vehicular Networks. Journal of Security and Communication Networks 1, 219–231 (2008)CrossRefGoogle Scholar
  11. 11.
    Schechter, S., Parnell, T., Hartemink, A.: Anonymous Authentication of Membership in Dynamic Groups. In: Proceedings of the Third International Conference on Financial Data Security and Digital Commerce, pp. 1–12 (1999)Google Scholar
  12. 12.
  13. 13.
    Shamus Software Ltd. MIRACL, Multiprecision Integer and Rational Arithmetic C/C++ Library, http://indigo.ie/~mscott

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Brijesh Kumar Chaurasia
    • 1
  • Shekhar Verma
    • 1
  1. 1.Indian Institute of Information Technology-AllahabadAllahabadIndia

Personalised recommendations