Skip to main content

RGH: An Efficient RSU-Aided Group-Based Hierarchical Privacy Enhancement Protocol for VANETs

  • Conference paper
Web-Age Information Management (WAIM 2012)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 7418))

Included in the following conference series:

  • 1658 Accesses

Abstract

VANETs are gaining significant prominence from both academia and industry in recent years. In this paper, we introduce an Efficient RSU-aided Group-based Hierarchical Privacy Enhancement Protocol for VANETs. The protocol exploits the Road-Side-Unit (RSU) to form a temporary group based on the vehicles around it. As the group leader, the RSU takes charge of the verification of the member car through the Revocation List from the DoT (Department of Transportation). The RSU also generates the session key and determines the configuration for the group. The RSU handles the message from the group member, and then sends it to other group members. RSUs have hierarchical security because of the real environment secure threats. RSUs are divided into High-level RSU (HRSU) and Low-level RSU (LRSU). HRSU inserts a message-related trace entry into the trace log while LRSU attaches trace Tag on the message. HRSU has to submit the trace log to the Department of Audit (DoA) by secure way periodically. If required, DoA can trace out the disputed message’s real signer with the cooperation of the DoT. Comparison with other existing classic schemes in the literature has been performed to show the efficiency and applicability of our scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Raya, M., Hubaux, J.: The security of vehicular ad hoc networks. In: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 11–21. ACM, Alexandria (2005)

    Chapter  Google Scholar 

  2. Raya, M., Hubaux, J.: Securing vehicular ad hoc networks. Journal of Computer Security, Special Issue on Security of Ad Hoc and Sensor Networks 15, 39–68 (2007)

    Google Scholar 

  3. Lin, X., Sun, X., Ho, P., Shen, X.: GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications. IEEE Transactions on Vehicular Technology 56, 3442–3456 (2007)

    Article  Google Scholar 

  4. Lu, R., Lin, X., Zhu, H., Ho, P., Shen, X.: ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications. In: Proceedings of the 27th IEEE International Conference on Computer Communications, INFOCOM 2008, pp. 1229–1237. IEEE (2008)

    Google Scholar 

  5. Wasef, A., Shen, X.: Efficient Group Signature Scheme Supporting Batch Verification for Securing Vehicular Networks. In: Proceedings of IEEE International Conference on Communications, ICC 2010, pp. 1–5. IEEE (2010)

    Google Scholar 

  6. Calandriello, G., Papadimitratos, P., Hubaux, J., Lioy, A.: Efficient and robust pseudonymous authentication in VANET. In: Proceedings of the Fourth ACM International Workshop on Vehicular Ad Hoc Network, VANET 2007, pp. 19–28. ACM, Montreal (2007)

    Chapter  Google Scholar 

  7. Raya, M., Papadimitratos, P., Aad, I., Jungels, D., Hubaux, J.P.: Eviction of Misbehaving and Faulty Nodes in Vehicular Networks. IEEE Journal on Selected Areas in Communications 25, 1557–1568 (2007)

    Article  Google Scholar 

  8. Chaum, D., van Heyst, E.: Group Signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257–265. Springer, Heidelberg (1991)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yang, T., Kong, L., Yu, L., Hu, J., Chen, Z. (2012). RGH: An Efficient RSU-Aided Group-Based Hierarchical Privacy Enhancement Protocol for VANETs. In: Gao, H., Lim, L., Wang, W., Li, C., Chen, L. (eds) Web-Age Information Management. WAIM 2012. Lecture Notes in Computer Science, vol 7418. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32281-5_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-32281-5_35

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-32280-8

  • Online ISBN: 978-3-642-32281-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics