Securing Location-Aware Services Based on Online/Offline Signatures in VANETs

  • Chul Sur
  • Youngho Park
  • Takashi Nishide
  • Kouichi Sakurai
  • Kyung Hyune Rhee
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6908)

Abstract

In this paper, we propose a novel privacy-preserving location assurance protocol for secure location-aware services over vehicular ad hoc networks (VANETs). In particular, we introduce the notion of location-aware credentials based on “hash-sign-switch” paradigm so as to guarantee the trustworthiness of location in location-aware services while providing conditional privacy preservation which is a desirable property for secure vehicular communications. Furthermore, the proposed protocol provides efficient procedures that alleviate a burden of computation for location-aware signature generation and verification on vehicles in VANETs. In order to achieve these goals, we consider online/offline signature scheme and identity-based aggregate signature scheme as our building blocks. Finally, we demonstrate experimental results to confirm the efficiency and effectiveness of the proposed protocol.

Keywords

VANETs Location Assurance Privacy Preservation Location-Aware Credential Online/Offline Signatures 

References

  1. 1.
    Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: ACM CCS 1993, pp. 62–73 (1993)Google Scholar
  2. 2.
    Chen, L., Chen, Z., Smart, N.P.: Identity-based key agreement protocols from pairings. International Journal of Information Security 6(4), 213–241 (2007)CrossRefGoogle Scholar
  3. 3.
    Chen, X., Zhang, F., Susilo, W., Mu, Y.: Efficient generic on-line/off-line sinatures without key exposure. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 18–30. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  4. 4.
    Dikaiakos, M.D., Florides, A., Nadeem, T., Iftode, L.: Location-aware services over vehicular ad-hoc networks using car-to-car communication. IEEE Journal on Selected Areas in Communications 25(8), 1590–1602 (2007)CrossRefGoogle Scholar
  5. 5.
    Dikaiakos, M.D., Iqbal, S., Nadeem, T., Iftode, L.: VITP: An information transfer protocol for vehicular computing. In: 2nd ACM Internationial Workshop on Vehicular Ad Hoc Networks (VANET 2005), pp. 30–39 (2005)Google Scholar
  6. 6.
    Galindo, D., Garcia, F.D.: A Schnorr-like lightweight identity-based signature scheme. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol. 5580, pp. 135–148. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  7. 7.
    Gentry, C., Ramzan, Z.: Identity-based aggregate signature. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 257–273. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  8. 8.
    Karp, B., Kung, H.: Greedy perimeter stateless routing for wireless networks. In: 6th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom 2000), pp. 243–254 (2000)Google Scholar
  9. 9.
    Kiess, W., Füßler, H., Widmer, J., Mauve, M.: Hierarchical location service for mobile ad-hoc networks. ACM Sigmobile Mobile Computing and Communications Review 8(4), 47–58 (2004)CrossRefGoogle Scholar
  10. 10.
    Krawczyk, H., Rabin, T.: Chameleon signatures. In: Symposium on Network and Distributed Systems Security (NDSS 2000), pp. 143–154 (2000)Google Scholar
  11. 11.
    Leinmuller, T., Schoch, E., Kargl, F.: Position verification approaches for vehicular ad hoc networks. IEEE Wireless Communications 13(5), 16–21 (2006)CrossRefGoogle Scholar
  12. 12.
    Lin, X., Sun, X., Shen, X.: GSIS: A secure and privacy preserving protocol for vehicular communications. IEEE Transactions on Vehicular Technology 56(6), 3442–3456 (2007)CrossRefGoogle Scholar
  13. 13.
    Lu, R., Lin, X., Zhu, H., Ho, P.H., Shen, X.: ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications. In: IEEE INFOCOM 2008, pp. 1229–1237 (2008)Google Scholar
  14. 14.
    Nadeem, T., Dashtinezhadd, S., Liao, C., Iftode, L.: Trafficview: Traffic data dissemination using car-to-car communication. ACM Sigmobile Mobile Computing and Communications Review 8(3), 6–19 (2004)CrossRefGoogle Scholar
  15. 15.
    Park, Y., Sur, C., Jung, C., Rhee, K.H.: An efficient anonymous authentication protocol for secure vehicular communications. Journal of Information Science and Engineering 26(3), 785–800 (2010)Google Scholar
  16. 16.
    Pathak, V., Yao, D., Iftode, L.: Securing location aware services over VANET using geographical secure path routing. In: IEEE International Conference on Vehicular Electronics and Safety (ICVES), pp. 346–353 (2008)Google Scholar
  17. 17.
    Raya, M., Hubaux, J.-P.: Securing vehicular ad hoc networks. Journal of Computer Security 15(1), 39–68 (2007)Google Scholar
  18. 18.
    Ren, Z., Li, W., Yang, Q.: Location verification for VANETs routing. In: IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, pp. 141–146 (2009)Google Scholar
  19. 19.
    Selvi, S.S.D., Vivek, S.S., Shriram, J., Rangan, C.P.: Efficient and provably secure identity based aggregate signature schemes with partial and full aggregation. Cryptography ePrint Archive, Report 2010/461 (2010)Google Scholar
  20. 20.
    Shamir, A., Tauman, Y.: Improved online/offline signature schemes. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 355–367. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  21. 21.
    Dedicated Short Range Communications (DSRC), http://www.leearmstrong.com/dsrc/dsrchomeset.htm
  22. 22.
    Overhaul of IEEE 802.11 Modeling and Simulation in NS-2, http://dsn.tm.uni-karlsruhe.de/Overhaul_NS-2.php
  23. 23.
    Pairing-Based Cryptography Library, http://crypto.stanford.edu/pbc
  24. 24.
    Simulation of Urban Mobility, http://sourceforge.net/projects/sumo

Copyright information

© IFIP International Federation for Information Processing 2011

Authors and Affiliations

  • Chul Sur
    • 1
  • Youngho Park
    • 2
  • Takashi Nishide
    • 1
  • Kouichi Sakurai
    • 1
  • Kyung Hyune Rhee
    • 2
  1. 1.Graduate School of Information Science and Electrical EngineeringKyushu UniversityJapan
  2. 2.Department of IT Convergence and Application EngineeringPukyong National UniversityRepublic of Korea

Personalised recommendations