Abstract
One of the most known mechanism to ensure privacy is the use of anonymity which means that drivers have to change their identity as much as possible. In the meantime, each message has to be authenticated when it is sent. To do so, each driver should sign its messages using its private key and has to send its certificate along with the message. The use of one certificate per driver will not ensure privacy since a certificate is easily correlated to the driver identity. For this reason, each driver will use a set of certificates denoted pseudonyms certificates (PC) Each vehicle has a set of PCs which will be used to sign sent messages and will be used as a part of the driver id. A PC is used for a limited period of time. In this paper we allow to a vehicle to generate additional PCs to its neighbors when they are close together for a period of time. It will allow to these neighbors to have more PCs. The neighbors will be able to change their PCs more frequently. Our choice is to allow a pseudonym derivation when a minimum number of vehicles are driving close to each other. The disadvantage of such a method is the network overhead which will increase due to sending of the driver vehicle certificate in each sent message.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
European Telecommunications Standards Institute (ETSI). http://www.etsi.org
Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Part 3: Specifications of Decentralized Environmental Notification Basic Service. ETSI EN 302 637–3 V1.2.2, November 2014
Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Part 2: Specification of Cooperative Awareness Basic Service. ETSI EN 302 637–2 vol. 1.3.2, November 2014
Eric R. Verheul, Issue First Activate Later Certificates for V2X. Presentation InterCor project, June 2017
Serrai, W., Abdelli, A., Mokdad, L., Hammal, Y.: Towards an efficient and a more accurate web service selection using MCDM methods. J. Comput. Sci. 22, 253–267 (2017)
Sedjelmaci, H., Senouci, S.M., Bouali, T.: Predict and prevent from misbehaving intruders in heterogeneous vehicular networks. Veh. Commun. J. 10, 74–83 (2017). https://doi.org/10.1016/j.vehcom.2016.12.005. Elsevier
Bouali, T., Senouci, S.M., Sedjelmaci, H.: A distributed detection and prevention scheme from malicious nodes in vehicular networks. Int. J. Commun. Syst. (2016). https://doi.org/10.1002/dac.3106. Wiley
Mabrouk, A., Kobbane, A., Koutbi, M.E.: Signaling game-based approach to improve security in vehicular networks. In: Proceedings of the 4th International Conference on Vehicle Technology and Intelligent Transport Systems (VEHITS 2018), pp. 495–500 (2018). ISBN: 978-989-758-293-6
Xua, K., Zhangb, W., Yan, Z.: A privacy-preserving mobile application recommender system based on trust evaluation. J. Comput. Sci. 26, 87–107 (2018)
Ramassamy, C., Fouchal, H., Hunel, P.: Classification of usual protocols over wireless sensor networks. In: 2012 IEEE International Conference on Communications (ICC), pp. 622–626 (2016)
Haddadou, N., Rachedi, A., Ghamri-Doudane, Y.: A job market signaling scheme for incentive and trust management in vehicular ad hoc networks. IEEE Trans. Veh. Technol. 64(8), 3657–3674 (2015)
Bourass, A., Cherkaoui, S., Khoukhi, L.: Secure optimal itinerary planning for electric vehicles in the smart grid. IEEE Trans. Industr. Inf. 13(6), 3236–3245 (2017)
Boualouache, A., Senouci, S.M., Moussaoui, S.: A survey on pseudonym changing strategies for vehicular ad-hoc networks. IEEE Commun. Surv. Tutor. 20(1), 770–790 (2018)
Sun, Y., Lu, R., Lin, X., Shen, X., Su, J.: An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. IEEE Trans. Veh. Technol. 59(7), 3589–3603 (2010)
Lu, R., Lin, X., Luan, T.H., Liang, X., Shen, X.: Pseudonym changing at social spots: an effective strategy for location privacy in VANETs. IEEE Trans. Veh. Technol. 61(1), 86–96 (2012)
Boualouache, A., Senouci, S.M., Moussaoui, S.: PRIVANET: an efficient pseudonym changing and management framework for vehicular ad-hoc networks, IEEE Trans. Intell. Transp. Syst. (T-ITS), 1–10 (2019) https://doi.org/10.1109/TITS.2019.2924856
Kim, H., Ben-Othman, J., Mokdad, L.: UDiPP: a framework for differential privacy preserving movements of unmanned aerial vehicles in smart cities. IEEE Trans. Veh. Technol. 68, 3933–3943 (2019)
Fouchal, H., Bourdy, E., Wilhelm, G., Ayaida, M.: Secured communications on vehicular networks over cellular networks. In: Fahrnberger, G., Gopinathan, S., Parida, L. (eds.) ICDCIT 2019. LNCS, vol. 11319, pp. 31–41. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-05366-6_3
Wilhelm, G., Fouchal, H., Thomas, K., Ayaida, M.: A C-ITS central station as a communication manager. In: Hodoň, M., Eichler, G., Erfurth, C., Fahrnberger, G. (eds.) I4CS 2018. CCIS, vol. 863, pp. 33–43. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-93408-2_3
Khelifi, H., Luo, S., Nour, B., Moungla, H., Ahmed, S.H.: Reputation-based Blockchain for secure NDN caching in vehicular networks. In: IEEE Conference on Standards for Communications and Networking (CSCN 2018), October 2018, Paris, France (2018)
Celdrán, A.H., Pérez, M.G., Clemente, F.J., Pérez, G.M.: Design of a recommender system based on users’ behavior and collaborative location and tracking. J. Comput. Sci. 12, 83–94 (2016)
Jafarnejad, S., Castignani, G., Engel, T.: Towards a real-time driver identification mechanism based on driving sensing data. In: 2017 IEEE 20th International Conference on Intelligent Transportation Systems (ITSC), pp. 1–7. IEEE (2017)
Acknowledgments
This work was made possible by EC Grant No. 2018-FR-TM-0097-S from the INEA Agency for Indid project. The statements made herein are solely the responsibility of the authors.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Fouchal, H. (2021). Intermediate Pseudonym Certificate Generation for C-ITS. In: Krieger, U.R., Eichler, G., Erfurth, C., Fahrnberger, G. (eds) Innovations for Community Services. I4CS 2021. Communications in Computer and Information Science, vol 1404. Springer, Cham. https://doi.org/10.1007/978-3-030-75004-6_6
Download citation
DOI: https://doi.org/10.1007/978-3-030-75004-6_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-75003-9
Online ISBN: 978-3-030-75004-6
eBook Packages: Computer ScienceComputer Science (R0)