Advertisement

Soft Computing

, Volume 20, Issue 8, pp 3335–3346 | Cite as

Scalable privacy-enhanced traffic monitoring in vehicular ad hoc networks

  • Yi Liu
  • Jie Ling
  • Qianhong WuEmail author
  • Bo Qin
Methodologies and Application

Abstract

Vehicular ad hoc network (VANET) has been proposed to improve traffic safety and driving experience. This is realized by equipping vehicles with capacity to talk to each other. Vehicular communication security and privacy are viewed as a major obstacle to widely deploy VANET. Most existing works devote to the authenticity and identity anonymity of vehicle-to-vehicle (V2V) communications. In this paper, we investigate secure vehicle-to-infrastructure (V2I) communications for applications in which a traffic monitoring center collects information about the traffic and road status through VANET. We propose a scalable privacy-enhanced traffic monitoring (SPETM) framework. In this framework, the traffic monitoring center can collect authenticated individual vehicle driving status and the road usage information, with the help of the distributed roadside units (RSUs) who can simultaneously obtain local view of the traffic in their respective domains. Neither external attackers, malicious vehicles nor compromised RSUs can know the identity of the reporting vehicles, which guarantees enhanced privacy for vehicles. However, misbehaving vehicles abusing the privacy mechanisms can be jointly traced by the semi-trusted vehicle management authorities, which provides desirable liability in privacy-preserving vehicular reports. We instantiate a concrete SPETM scheme with well-established cryptographic technologies. Thorough analyses show that our scheme is secure and practical for deployment.

Keywords

Vehicle ad hoc network Traffic monitoring Spatio-temporal identity Vehicle privacy 

Notes

Acknowledgments

This paper is partially supported by the National Key Basic Research Program (973 program) under Project 2012CB315905, by the Natural Science Foundation under Projects 61370190, 61272501, 61173154, 61402029 and 61003214, by the Beijing Natural Science Foundation through Projects 4132056 and 4122041, by the Natural Science Foundation of Guangdong Province through Projects 2014A030313517 and S2012020011071, the Fundamental Research Funds for the Central Universities, and the Research Funds (No. 14XNLF02) of Renmin University of China, the Open Research Fund of the State Key Laboratory of Information Security, Open Project of Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University (Institute of Information Engineering, Chinese Academy of Sciences and the Open Research Fund of Beijing Key Laboratory of Trusted Computing.

References

  1. (2006) IEEE trial-use standard for wireless access in vehicular environments security services for applications and management messages, IEEE Std. 1609.2-2006Google Scholar
  2. (2009) Standard specification for telecommunications and information exchange between roadside and vehicle systems—5 GHz band dedicated short range communications (DSRC) medium access control (MAC) and physical layer (PHY) specifications, ASTM E2213–03. http://www.iteris.com/itsarch/html/standard/dsrc5ghz.htm
  3. Boyen X, Waters B (2006) Compact group signatures without random oracles. In: Proceeding of Eurocrypt’06, Lecture Notes in Computer Science, vol. 4004, Springer, pp 427–444Google Scholar
  4. Calandriello G, Papadimitratos P, Hubaux J-P, Lioy A (2011) On the performance of secure vehicular communication systems. IEEE Trans Dependable Secur Comput 8(6):898–912CrossRefGoogle Scholar
  5. Calandriello G, Papadimitratos P, Lioy A, Hubaux J-P (2007) Efficient and robust pseudonymous authentication in VANET. Montréal, QC, Canada. In: Proceeding of ACM international workshop on vehicular Ad Hoc networks-VANET, pp 19–28Google Scholar
  6. Chaum D, Pedersen TP (1993) Wallet databases with observers. In: Proceeding of Crypto 1992. Lecture Notes in Computer Science 740:89–105Google Scholar
  7. Damgård IB (1991) Towards practical public key systems secure against chosen ciphertext attacks. In: Proceeding of Crypto’91, Lecture Notes in Computer Science, vol. 576, Springer, pp 445–456Google Scholar
  8. Daza V, Domingo-Ferrer J, Sebé F, Viejo A (2009) Trustworthy privacy-preserving car-generated announcements in vehicular ad hoc networks. IEEE Trans Veh Technol 58(4):1876–1886CrossRefGoogle Scholar
  9. Galbraith SD, Paterson KG, Smart NP (2008) Pairings for cryptographers. Discrete Applied Mathematics. 156(16):3113–3121Google Scholar
  10. Haas JJ, Hu Y-C, Laberteaux KP (2011) Efficient certificate revocation list organization and distribution. IEEE J Sel Areas Commun 29(3):595–604CrossRefGoogle Scholar
  11. Hartmut S (2005) Organic computing C A new vision for distributed embedded systems. In: Proceeding of ISORC’05, IEEE, IEEE Computer Society, pp 201–203Google Scholar
  12. Huang D, Misra S, Verma M, Xue G (2011) PACP: an efficient pseudonymous authentication-based conditional privacy protocol for VANETs. IEEE Trans Intell Transp Syst 12(3):736–746CrossRefGoogle Scholar
  13. Joux A (2004) A one round protocol for tripartite Diffie–Hellman. J Cryptol 17:263–276MathSciNetCrossRefzbMATHGoogle Scholar
  14. Kamat P, Baliga A, Trappe W (2008) Secure, pseudonymous, and auditable communication in vehicular ad hoc networks. Secur Commun Netw 1(3):233–244CrossRefGoogle Scholar
  15. Kamat P, Baliga A, Trappe W (2006) An identity-based security framework for VANETs. In: Proceeding of third ACM Int’l workshop vehicular Ad Hoc networks (VANET’06), pp 94–95Google Scholar
  16. Kocher PC (1996) Timing attacks on implementations of Diffie–Hellman, RSA, DSS, and other systems. In: Proceeding of Crypto 96, LNCS 1109, Springer, pp 104–113Google Scholar
  17. Lin X, Sun X, Ho P-H, Shen X (2007) GSIS: a secure and privacy preserving protocol for vehicular communications. IEEE Trans Veh Technol 56(6):3442–3456CrossRefGoogle Scholar
  18. Lu R, Lin X, Luan TH, Liang X, Shen X (2012) Pseudonym changing at social spots: an effective strategy for location privacy in VANETs. IEEE Trans Veh Technol 61(1):86–96CrossRefGoogle Scholar
  19. Nguyen L, Safavi-Naini R (2005) Dynamic \(k\)-times anonymous authentication. In: Proceeding of ACNS 2005, LNCS 3531, Springer, pp 318–333Google Scholar
  20. Qin B, Wu Q, Domingo-Ferrer J, Zhang L (2011) Preserving security and privacy in large-scale VANETs. In: Proceeding of ICICS 2011, LNCS 7043, Springer, pp 121–135Google Scholar
  21. Raya M, Hubaux J-P (2007) Securing vehicular ad hoc networks. J Comput Secur 15(1):39–68CrossRefGoogle Scholar
  22. Ross PE (2015) Thus spoke the autobahn. IEEE Spectr 52(1):52–55CrossRefGoogle Scholar
  23. Schnorr CP (1990) Efficient identification and signatures for smart cards. In: Proceeding of Crypto’89, Lecture Notes in Computer Science, vol. 435, Springer, Berlin, pp 235–251Google Scholar
  24. Shamir A (1979) How to share a secret. Communications of the ACM 22:612–613Google Scholar
  25. Shamir A (1984) Identity based cryptosystems and signature schemes. In: Proceeding of Crypto 84, LNCS 196, Springer, pp 47–53Google Scholar
  26. Standaert F, Malkin T, Yung M (2009) A unified framework for the analysis of side-channel key recovery attacks. In: Proceeding of Eurocrypt 2009, LNCS 5479, Springer, pp 443–461Google Scholar
  27. Sun J, Zhang C, Zhang Y, Fang Y (2010) An identity-based security system for user privacy in vehicular ad hoc networks. IEEE Trans Parallel Distrib Syst 21(9):1227–1239MathSciNetCrossRefGoogle Scholar
  28. van den Berg E, Zhang T, Pietrowicz S (2009) Blend-in: a privacy-enhancing certificate-selection method for vehicular communication. IEEE Trans Veh Technol 58(9):5190–5198CrossRefGoogle Scholar
  29. Wasef A, Lu R, Lin X, Shen X (2010) Complementing public key infrastructure to secure vehicular ad hoc networks. IEEE Wirel Commun 17(5):22–28CrossRefGoogle Scholar
  30. Wasef A, Jiang Y, Shen X (2010) DCS: an efficient distributed-certificate-service scheme for vehicular networks. IEEE Trans Veh Technol 59(2):533–549CrossRefGoogle Scholar
  31. Wasef A, Shen X (2009) EDR: efficient decentralized revocation protocol for vehicular ad hoc networks. IEEE Trans Veh Technol 58(9):5214–5224CrossRefGoogle Scholar
  32. Wasef A, Shen X (2013) EMAP: expedite message authentication protocol for vehicular Ad Hoc networks. IEEE Trans Mobile Comput 12(1):78–89CrossRefGoogle Scholar
  33. Wu Q, Domingo-Ferrer J, González-Nicolás U (2010) Balanced trustworthiness, safety and privacy in vehicle-to-vehicle communications. IEEE Trans Veh Technol 59(2):559–573CrossRefGoogle Scholar
  34. Zhang L, Wu Q, Solanas A, Domingo-Ferrer J (2010) A scalable robust authentication protocol for secure vehicular communications. IEEE Trans Veh Technol 59(4):1606–1617CrossRefGoogle Scholar
  35. Zhang C, Lu R, Lin X, Ho P, Shen X (2008) An efficient identity-based batch verification scheme for vehicular sensor networks. Proc. IEEE INFOCOM, pp 246–250Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2015

Authors and Affiliations

  1. 1.School of Computer Science and TechnologyGuangdong University of TechnologyGuangzhouChina
  2. 2.The State Key Laboratory of Integrated Services NetworksXidian UniversityXi’anChina
  3. 3.The State Key Laboratory of Information Security, Institute of Information EngineeringChinese Academy of SciencesBeijingChina
  4. 4.School of Electronics and Information EngineeringBeihang UniversityBeijingChina
  5. 5.The Key Laboratory of Data Engineering and Knowledge Engineering (Renmin University of China) Ministry of Education, School of InformationRenmin University of ChinaBeijingChina
  6. 6.Key Laboratory of Cryptologic Technology and Information SecurityMinistry of Education, Shandong UniversityShandongChina

Personalised recommendations