An anonymous data access scheme for VANET using pseudonym-based cryptography

Original Research

Abstract

Vehicular ad-hoc network (VANET) is an emerging technology which can offer a wide variety of promising applications, such as safety-related and infotainment applications. However, VANET also raises important security and privacy concerns that must be properly addressed for widespread deployment. In this paper, we first proposed a provable secure pseudonym-based cryptosystem with a trusted authority, including a pseudonym-based encryption scheme, a pseudonym-based multi-receiver encryption scheme, a pseudonym-based signature scheme, and a pseudonym-based one-pass key establishment protocol. We then presented a secure and efficient data access scheme for VANET based on cooperative caching technology and the proposed pseudonym-based cryptosystem. The efficiency of data access was greatly improved by allowing the sharing and coordination of cached data among multiple vehicles, and the anonymity of vehicles, data confidentiality, integrity and non-repudiation were guaranteed by employing the proposed pseudonym-based cryptosystem. Simulation results have shown that the proposed data access scheme is suitable to the VANET environment.

Keywords

Vehicular ad-hoc network Cooperative caching Pseudonym-based cryptography Onion packet 

Notes

Acknowledgments

This paper is jointly supported by the National Natural Science Foundation of China (Grant No. 61173189), the Foundation for Innovative Research Team of Yunnan University, Guangdong Province Information Security Key Laboratory Project, Yunnan Province Software Engineering Key Laboratory Project (Grant No. 2015SE203).

References

  1. Abbani N, Artail H (2015) Protecting data flow anonymity in mobile ad hoc networks that employ cooperative caching. Ad Hoc Netw 26(0):69–87. ISSN 1570–8705. doi: 10.1016/j.adhoc.2014.10.018. http://www.sciencedirect.com/science/article/pii/S1570870514002340
  2. Akinyele JA, Garman C, Miers I, Pagano MW, Rushanan M, Green M, Rubin AD (2013) Charm: a framework for rapidly prototyping cryptosystems. J Cryptogr Eng 3(2):111–128. ISSN 2190–8508. doi: 10.1007/s13389-013-0057-3
  3. Baek J, Newmarch J, Safavi-naini R, Susilo W (2004) A survey of identity-based cryptography. In: Proceedings of Australian unix users group annual conference, pp 95–102Google Scholar
  4. Biswas S, Misic J (2013) A cross-layer approach to privacy-preserving authentication in wave-enabled vanets. IEEE Trans Veh Technol 62(5):2182–2192. ISSN 0018–9545. doi: 10.1109/TVT.2013.2238566
  5. Boneh D, Franklin M (2001) Identity-based encryption from the weil pairing. In: Kilian J (ed) Advances in cryptology CRYPTO 2001, volume 2139 of lecture notes in computer science. Springer, Berlin, pp 213–229. ISBN 978-3-540-42456-7. doi: 10.1007/3-540-44647-8_13
  6. Burmester M, Magkos E, Chrissikopoulos V (2008) Strengthening privacy protection in vanets. In: Networking and communications, 2008. WIMOB’08. IEEE international conference on wireless and mobile computing, pp 508–513, Oct 2008. doi: 10.1109/WiMob.2008.32
  7. Choon J, Hee Cheon J (2002) An identity-based signature from gap Diffie–Hellman groups. In: Desmedt YVOG (ed) Public key cryptography—PKC 2003, volume 2567 of lecture notes in computer science. Springer, Berlin, pp 18–30. ISBN 978-3-540-00324-3. doi: 10.1007/3-540-36288-6_2
  8. Dahiya A, Chauhan D (2010) A comparative study of manet and vanet environment. J Comput 2(7):87–92Google Scholar
  9. Fujisaki E, Okamoto T (1999) Secure integration of asymmetric and symmetric encryption schemes. In: Proceedings of the 19th annual international cryptology conference on advances in cryptology, CRYPTO ’99, London, UK. Springer, pp 537–554. ISBN 3-540-66347-9. http://dl.acm.org/citation.cfm?id=646764.706343
  10. Fujisaki E, Okamoto T (2013) Secure integration of asymmetric and symmetric encryption schemes. J Cryptol 26(1):80–101. ISSN 0933–2790. doi: 10.1007/s00145-011-9114-1
  11. Gorantla MC, Boyd C, Nieto JMG (2008) Id-based one-pass authenticated key establishment. In: Proceedings of the sixth Australasian conference on information security—volume 81, AISC ’08, Darlinghurst, Australia, Australia. Australian Computer Society, Inc., pp 39–46. ISBN 978-1-920682-62-0. http://dl.acm.org/citation.cfm?id=1385109.1385118
  12. Li C-T, Hwang M-S, Chu Y-P (2008) A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Comput Commun 31(12):2803–2814. ISSN 0140–3664. doi: 10.1016/j.comcom.2007.12.005. http://www.sciencedirect.com/science/article/pii/S0140366407005154. Mobility Protocols for ITS/VANET
  13. Li F, Wang Y (2007) Routing in vehicular ad hoc networks: a survey. Veh Technol Mag IEEE 2(2):12–22. ISSN 1556–6072. doi: 10.1109/MVT.2007.912927
  14. Lynn B (2014) The pairing-based cryptography library. http://crypto.stanford.edu/pbc/. Accessed 18 July 2014
  15. Razzaque MA, Ahmad Salehi S, Cheraghi SM (2013) Security and privacy in vehicular ad-hoc networks: survey and the road ahead. In: Khan S, Khan Pathan A-S (eds) Wireless networks and security. Signals and communication technology. Springer, Berlin, Heidelberg, pp 107–132Google Scholar
  16. Sailhan F, Issarny V (2003) Cooperative caching in ad hoc networks. In: Chen M-S, Chrysanthis PK, Sloman M, Zaslavsky A (eds) Mobile data management, volume 2574 of lecture notes in computer science. Springer, Berlin, pp 13–28. ISBN 978-3-540-00393-9. doi: 10.1007/3-540-36389-0_2
  17. Shamir A (1985) Identity-based cryptosystems and signature schemes. In: Blakley GR, Chaum D (eds) Advances in cryptology, volume 196 of lecture notes in computer science. Springer, Berlin, pp 47–53. ISBN 978-3-540-15658-1. doi: 10.1007/3-540-39568-7_5
  18. Sun J, Zhang C, Fang Y (2007) An id-based framework achieving privacy and non-repudiation in vehicular ad hoc networks. In: Military communications conference, 2007. MILCOM 2007. IEEE, pp 1–7. doi: 10.1109/MILCOM.2007.4454834
  19. Ting I-W, Chang Y-K (2013) Improved group-based cooperative caching scheme for mobile ad hoc networks. J Parallel Distrib Comput 73(5):595–607. ISSN 0743–7315. doi: 10.1016/j.jpdc.2012.12.013. http://www.sciencedirect.com/science/article/pii/S0743731512002948
  20. Tseng Y-M, Huang Y-H, Chang H-J (2012) Cca-secure anonymous multi-receiver id-based encryption. In: 26th international conference on advanced information networking and applications workshops (WAINA), pp 177–182, March 2012. doi: 10.1109/WAINA.2012.50
  21. Yin L, Cao G (2006) Supporting cooperative caching in ad hoc networks. IEEE Trans Mobile Comput 5(1):77–89. ISSN 1536–1233. doi: 10.1109/TMC.2006.15
  22. Zhao J, Zhang P, Cao G, Das CR (2010) Cooperative caching in wireless p2p networks: design, implementation, and evaluation. IEEE Trans Parallel Distrib Syst 21(2):229–241. ISSN 1045–9219. doi: 10.1109/TPDS.2009.50

Copyright information

© Springer-Verlag Berlin Heidelberg 2015

Authors and Affiliations

  1. 1.Yunnan Key Laboratory of Software Engineering, School of SoftwareYunnan UniversityKunmingChina
  2. 2.Guangdong Key Laboratory of Information Security Technology, School of Information Science and TechnologySun Yat-sen UniversityGuangzhouChina

Personalised recommendations