Skip to main content

Conditional Privacy through Ring Signature in Vehicular Ad-hoc Networks

  • Chapter

Part of the book series: Lecture Notes in Computer Science ((TCOMPUTATSCIE,volume 6750))

Abstract

Ring signature allows a signer to disclose reliable information by enabling source authentication while allowing him to be indistinguishable among the possible signers. The scheme is setup free and a vehicle can create a signer group on the fly without taking the consent of the other possible signers to disseminate messages. However, absolute anonymity can be misused. In this paper, a non repudiation mechanism has been proposed in ring signature scheme to make a vehicle’s privacy conditional. A vehicle can obtain the public keys of the vehicles around it to create a signature. This signature can be used to prove the accuracy of a message without revealing the signer’s identity. The signer remains hidden in the crowd of his neighboring vehicles and their public keys giving it both location and identity privacy. Simulation results the time taken by the scheme to create signed message and transfer it over the shared wireless channel is in the order of milliseconds for different traffic conditions on the road. This proves the efficacy of the scheme and makes it attractive for VANETs.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Wasef, A., Shen, X.: REP: Location Privacy for VANETs Using Random Encryption Periods. Mobile Netw. Appl. 15, 172–185 (2010)

    Article  Google Scholar 

  2. Calandriello, G., Papadimitratos, P., Hubaux, J.-P., Lioy, A.: Efficient and Robust Pseudonymous Authentication in VANET. In: Proceedings of the Fourth ACM International Workshop on Vehicular ad hoc Networks, Canada, pp. 19–28 (2007)

    Google Scholar 

  3. Chaum, D., van Heijst, E.: Group signatures. In: EUROCRYPT 1991. LNCS, vol. 576, pp. 257–265. Springer, Heidelberg (1991)

    Google Scholar 

  4. Camenisch, J.L., Stadler, M.A.: Efficient group signature schemes for large groups. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 410–424. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  5. Sampigethaya, K., Li, M., Huang, L., Poovendran, R.: AMOEBA: Robust Location Privacy Scheme for VANET. IEEE JSAC 25(8), 1569–1589 (2007)

    Google Scholar 

  6. Guo, J., Baugh, J.P., Shengquan, W.: A Group Signature Based Secure and Privacy- Preserving Vehicular Communication Framework. In: Proc. of the Mobile Networking for Vehicular Environment (MOVE) Workshop in Conjunction with IEEE INFOCOM, pp. 103–108 (2007)

    Google Scholar 

  7. Lin, X., Sun, X., Ho, P.-H., Shen, X.: GSIS: A Secure and Privacy Preserving Protocol for Vehicular Communications, In. IEEE Transactions on Vehicular Technology 56(6), 3442–3456 (2007)

    Article  Google Scholar 

  8. Lu, R., Lin, X., Zhu, H., Ho, P.-H., Shen, X.: ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications. In: The 27th IEEE International Conference on Computer Communications (INFOCOM 2008), Phoenix, Arizona, USA, pp. 1903–1911 (2008)

    Google Scholar 

  9. Chaurasia, B.K., Verma, S., Bhasker, S.M.: Message broadcast in VANETs using Group Signature. In: Fourth International Conference on Wireless Communication and Sensor Networks, India, pp. 131–136 (2008)

    Google Scholar 

  10. Xi, Y., Shi, W., Schwiebert, L.: Mobile Anonymity of Dynamic Groups in Vehicular Networks. Journal of Security and Communication Networks 1, 219–231 (2008)

    Article  Google Scholar 

  11. Schechter, S., Parnell, T., Hartemink, A.: Anonymous Authentication of Membership in Dynamic Groups. In: Proceedings of the Third International Conference on Financial Data Security and Digital Commerce, pp. 1–12 (1999)

    Google Scholar 

  12. Online Available at http://nsl.csie.nctu.edu.tw/nctuns.html

  13. Shamus Software Ltd. MIRACL, Multiprecision Integer and Rational Arithmetic C/C++ Library, http://indigo.ie/~mscott

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Chaurasia, B.K., Verma, S. (2011). Conditional Privacy through Ring Signature in Vehicular Ad-hoc Networks. In: Gavrilova, M.L., Tan, C.J.K. (eds) Transactions on Computational Science XIII. Lecture Notes in Computer Science, vol 6750. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22619-9_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22619-9_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22618-2

  • Online ISBN: 978-3-642-22619-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics