Journal of Computer Science and Technology

, Volume 23, Issue 6, pp 916–928

Probabilistic Adaptive Anonymous Authentication in Vehicular Networks

  • Yong Xi
  • Ke-Wei Sha
  • Wei-Song Shi
  • Loren Schwiebert
  • Tao Zhang
Regular Paper

Abstract

Vehicular networks have attracted extensive attention in recent years for their promises in improving safety and enabling other value-added services. Most previous work focuses on designing the media access and physical layer protocols. Privacy issues in vehicular systems have not been well addressed. We argue that privacy is a user-specific concept, and a good privacy protection mechanism should allow users to select the levels of privacy they wish to have. To address this requirement, we propose an adaptive anonymous authentication mechanism that can trade off the anonymity level with computational and communication overheads (resource usage). This mechanism, to our knowledge, is the first effort on adaptive anonymous authentication. The resources used by our protocol are few. A high traffic volume of 2000 vehicles per hour consumes about 60kbps bandwidth, which is less than one percent of the bandwidth of DSRC (Dedicated Short Range Communications). By using adaptive anonymity, the protocol response time can further be improved 2∼4 times with less than 20% bandwidth overheads.

Keywords

anonymous authentication vehicular network privacy adaptive anonymity 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Supplementary material

11390_2008_9194_MOESM1_ESM.pdf (66 kb)
(PDF 66.1 kb).

References

  1. [1]
    Vehicle infrastructure integration. U.S. Department of Transportation, 2006, http://www.its.dot.gov/vii/docs/vii_factsheet.pdf.
  2. [2]
    Bishop R. A survey of intelligent vehicle applications worldwide. In Proc. IEEE Intelligent Vehicles Symposium 2000, Dearborn, MI, USA, Oct. 2000, pp.25–30.Google Scholar
  3. [3]
    National intelligent transportation systems program plan: A ten-year vision. A Report from Intelligent Transportation Society of America and Department of Transportation. ITSA, DoT, 2002, http://www.itsa.org/itsa/files/pdf/National10YearPlanITSFull.pdf.
  4. [4]
    Mak T, Laberteaux K, Sengupta R. A multi-channel VANET providing concurrent safety and commercial services. In Proc. the 2nd ACM International Workshop on Vehicular Ad Hoc Networks, Cologne, Germany, Sept. 2005, pp.1–9.Google Scholar
  5. [5]
    Dedicated Short Range Communications (DSRC) home. DSRC, 2006, http://grouper.ieee.org/groups/scc32/dsrc/.
  6. [6]
    Hubaux J, Capkun S, Luo J. The security and privacy of smart vehicles. IEEE Security and Privacy, 2004, 4(3): 49–55.CrossRefGoogle Scholar
  7. [7]
    Raya M, Hubaux J. The security of vehicular ad hoc networks. In Proc. the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, Alexandria, VA, USA, Nov. 2005, pp.11–21.Google Scholar
  8. [8]
    Dötzer F. Privacy issues in vehicular ad hoc networks. In Proc. Workshop on Privacy Enhancing Technologies, Dubrovnik, Croatia, May 2005, pp.197–209.Google Scholar
  9. [9]
    Choi J, Jakobsson M, Wetzel S. Balancing auditability and privacy in vehicular networks. In Proc. the 1st ACM International Workshop on Quality of Service and Security in Wireless and Mobile Networks, Montreal, Canada, Oct. 2005, pp.79–87.Google Scholar
  10. [10]
    Sampigethaya K et al. CARAVAN: Providing location privacy for VANET. In Proc. Embedded Security in Cars (ESCAR), Cologne, Germany, Nov. 2005.Google Scholar
  11. [11]
    Sun X, Lin X, Ho P P. Secure vehicular communications based on group signature and id-based signature scheme. In Proc. International Conference on Communications (ICC), Glasgow, Scotland, Jun. 2007, pp.1539–1545.Google Scholar
  12. [12]
    Lin X, Sun X, Ho P P, Shen X. GSIS: A secure and privacy preserving protocol for vehicular communications. IEEE Transactions on Vehicular Technology, Nov. 2007, 56: 3442–3456.CrossRefGoogle Scholar
  13. [13]
    Guo J, Baugh J, Wang S. A group signature based secure and privacy-preserving vehicular communication framework. In Proc. the Mobile Networking for Vehicular Environments (MOVE) Workshop in Conjunction with IEEE INFOCOM, Anchorage, Alaska, USA, May 2007, pp.103–108.Google Scholar
  14. [14]
    Fonseca E, Festag A, Baldessari R, Aguiar R. Support of anonymity in VANETs — putting pseudonymity into practice. In Proc. IEEE Wireless Communications and Networking Conference (WCNC), Hong Kong, China, March 2007, pp.3400–3405.Google Scholar
  15. [15]
    Calandriello G, Papadimitratos P, Lloy A, Hubaux J P. Efficient and robust pseudonymous authentication in VANET. In Proc. the Fourth ACM International Workshop on Vehicular Ad Hoc Networks (VANET 2007), in Conjunction with ACM MobiCom 2007, Montreal, Canada, 2007, pp.19–28.Google Scholar
  16. [16]
    Gedik B, Liu L. Location privacy in mobile systems: A personalized anonymization model. In Proc. the 25th International Conference on Distributed Computing Systems, Columbus, Ohio, USA, Jun. 2005, pp.620–629.Google Scholar
  17. [17]
    Reid D B. An algorithm for tracking multiple targets. IEEE Transactions on Automatic Control, Dec. 1979, 24(6): 843–854.CrossRefGoogle Scholar
  18. [18]
    Rivest R L, Shamir A, Tauman Y. How to leak a secret. Lecture Notes in Computer Science 2248, 2001, pp.552–565. http://citeseer.ist.psu.edu/rivest01how.html.
  19. [19]
    Schechter S, Parnell T, Hartemink A. Anonymous authentication of membership in dynamic groups. In Proc. the Third International Conference on Financial Data Security and Digital Commerce, Anguilla, British West Indies, Jan. 1999, pp.184–195.Google Scholar
  20. [20]
    Auto theft key statistics. Insurance Information Institute, 2007, http://www.iii.org/.
  21. [21]
    GM OnStar System Could Halt Stolen Cars. Associated Press, 2007.Google Scholar
  22. [22]
    Zeng X, Bagrodia R, Gerla M. GloMoSim: A library for parallel simulation of large-scale wireless networks. In Proc. Workshop on Parallel and Distributed Simulation, Banff, Alberta, Canada, 1998, pp.154–161.Google Scholar
  23. [23]
    Yin J, ElBatt T, Yeung G, Ryu B, Habermas S, Krishnan H, Talty T. Performance evaluation of safety applications over DSRC vehicular ad hoc networks. In Proc. the 1st ACM International Workshop on Vehicular Ad Hoc Networks, Philadelphia, PA, USA, Oct. 2004, pp.1–9.Google Scholar
  24. [24]
    Gruteser M, Grunwald D. Anonymous usage of location-based services through spatial and temporal cloaking. In Proc. ACM MobiSys'03, San Francisco, CA, USA, May 2003, pp.31–42.Google Scholar
  25. [25]
    Munaka T, Yamamoto T, Watanabe T. A reliable advanced-join system for data multicasting in its networks. IEEE Transactions on Intelligent Transportation Systems, Dec. 2005, 6(4): 424–437.CrossRefGoogle Scholar
  26. [26]
    TrafNet: Real-time seattle area traffic conditions over the Internet. University of Washington, 2006, http://www. its.washington.edu/trafnet/.
  27. [27]
    Aijaz A, Bochow B, Dötzer F, Festag A, Gerlach M, Kroh R. Attacks on inter-vehicle communication systems — An analysis. In Proc. 3rd International Workshop on Intelligent Transportation (WIT 2006), Hamburg, Germany, March 2006.Google Scholar
  28. [28]
    Zarki M, Mehrotra S, Tsudik G, Venkatasubramanian N. Security issues in a future vehicular network. In Proc. EuroWireless 2002, Florence, Italy, Feb. 2002.Google Scholar
  29. [29]
    Ren K et al. A novel privacy preserving authentication and access control scheme for pervasive computing environments. IEEE Transactions on Vehicular Technology, 2006, 55(4): 1373–1384.CrossRefGoogle Scholar

Copyright information

© Springer 2008

Authors and Affiliations

  • Yong Xi
    • 1
  • Ke-Wei Sha
    • 1
  • Wei-Song Shi
    • 1
  • Loren Schwiebert
    • 1
  • Tao Zhang
    • 2
  1. 1.Department of Computer ScienceWayne State UniversityDetroitU.S.A.
  2. 2.Telcordia Technologies, Inc.New JerseyU.S.A.

Personalised recommendations