Skip to main content

Intermediate Pseudonym Certificate Generation for C-ITS

  • Conference paper
  • First Online:
Innovations for Community Services (I4CS 2021)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1404))

Included in the following conference series:

Abstract

One of the most known mechanism to ensure privacy is the use of anonymity which means that drivers have to change their identity as much as possible. In the meantime, each message has to be authenticated when it is sent. To do so, each driver should sign its messages using its private key and has to send its certificate along with the message. The use of one certificate per driver will not ensure privacy since a certificate is easily correlated to the driver identity. For this reason, each driver will use a set of certificates denoted pseudonyms certificates (PC) Each vehicle has a set of PCs which will be used to sign sent messages and will be used as a part of the driver id. A PC is used for a limited period of time. In this paper we allow to a vehicle to generate additional PCs to its neighbors when they are close together for a period of time. It will allow to these neighbors to have more PCs. The neighbors will be able to change their PCs more frequently. Our choice is to allow a pseudonym derivation when a minimum number of vehicles are driving close to each other. The disadvantage of such a method is the network overhead which will increase due to sending of the driver vehicle certificate in each sent message.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. European Telecommunications Standards Institute (ETSI). http://www.etsi.org

  2. Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Part 3: Specifications of Decentralized Environmental Notification Basic Service. ETSI EN 302 637–3 V1.2.2, November 2014

    Google Scholar 

  3. Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Part 2: Specification of Cooperative Awareness Basic Service. ETSI EN 302 637–2 vol. 1.3.2, November 2014

    Google Scholar 

  4. Eric R. Verheul, Issue First Activate Later Certificates for V2X. Presentation InterCor project, June 2017

    Google Scholar 

  5. Serrai, W., Abdelli, A., Mokdad, L., Hammal, Y.: Towards an efficient and a more accurate web service selection using MCDM methods. J. Comput. Sci. 22, 253–267 (2017)

    Article  Google Scholar 

  6. Sedjelmaci, H., Senouci, S.M., Bouali, T.: Predict and prevent from misbehaving intruders in heterogeneous vehicular networks. Veh. Commun. J. 10, 74–83 (2017). https://doi.org/10.1016/j.vehcom.2016.12.005. Elsevier

    Article  Google Scholar 

  7. Bouali, T., Senouci, S.M., Sedjelmaci, H.: A distributed detection and prevention scheme from malicious nodes in vehicular networks. Int. J. Commun. Syst. (2016). https://doi.org/10.1002/dac.3106. Wiley

    Article  Google Scholar 

  8. Mabrouk, A., Kobbane, A., Koutbi, M.E.: Signaling game-based approach to improve security in vehicular networks. In: Proceedings of the 4th International Conference on Vehicle Technology and Intelligent Transport Systems (VEHITS 2018), pp. 495–500 (2018). ISBN: 978-989-758-293-6

    Google Scholar 

  9. Xua, K., Zhangb, W., Yan, Z.: A privacy-preserving mobile application recommender system based on trust evaluation. J. Comput. Sci. 26, 87–107 (2018)

    Article  Google Scholar 

  10. Ramassamy, C., Fouchal, H., Hunel, P.: Classification of usual protocols over wireless sensor networks. In: 2012 IEEE International Conference on Communications (ICC), pp. 622–626 (2016)

    Google Scholar 

  11. Haddadou, N., Rachedi, A., Ghamri-Doudane, Y.: A job market signaling scheme for incentive and trust management in vehicular ad hoc networks. IEEE Trans. Veh. Technol. 64(8), 3657–3674 (2015)

    Article  Google Scholar 

  12. Bourass, A., Cherkaoui, S., Khoukhi, L.: Secure optimal itinerary planning for electric vehicles in the smart grid. IEEE Trans. Industr. Inf. 13(6), 3236–3245 (2017)

    Article  Google Scholar 

  13. Boualouache, A., Senouci, S.M., Moussaoui, S.: A survey on pseudonym changing strategies for vehicular ad-hoc networks. IEEE Commun. Surv. Tutor. 20(1), 770–790 (2018)

    Article  Google Scholar 

  14. Sun, Y., Lu, R., Lin, X., Shen, X., Su, J.: An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. IEEE Trans. Veh. Technol. 59(7), 3589–3603 (2010)

    Article  Google Scholar 

  15. Lu, R., Lin, X., Luan, T.H., Liang, X., Shen, X.: Pseudonym changing at social spots: an effective strategy for location privacy in VANETs. IEEE Trans. Veh. Technol. 61(1), 86–96 (2012)

    Article  Google Scholar 

  16. Boualouache, A., Senouci, S.M., Moussaoui, S.: PRIVANET: an efficient pseudonym changing and management framework for vehicular ad-hoc networks, IEEE Trans. Intell. Transp. Syst. (T-ITS), 1–10 (2019) https://doi.org/10.1109/TITS.2019.2924856

  17. Kim, H., Ben-Othman, J., Mokdad, L.: UDiPP: a framework for differential privacy preserving movements of unmanned aerial vehicles in smart cities. IEEE Trans. Veh. Technol. 68, 3933–3943 (2019)

    Article  Google Scholar 

  18. Fouchal, H., Bourdy, E., Wilhelm, G., Ayaida, M.: Secured communications on vehicular networks over cellular networks. In: Fahrnberger, G., Gopinathan, S., Parida, L. (eds.) ICDCIT 2019. LNCS, vol. 11319, pp. 31–41. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-05366-6_3

    Chapter  Google Scholar 

  19. Wilhelm, G., Fouchal, H., Thomas, K., Ayaida, M.: A C-ITS central station as a communication manager. In: Hodoň, M., Eichler, G., Erfurth, C., Fahrnberger, G. (eds.) I4CS 2018. CCIS, vol. 863, pp. 33–43. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-93408-2_3

    Chapter  Google Scholar 

  20. Khelifi, H., Luo, S., Nour, B., Moungla, H., Ahmed, S.H.: Reputation-based Blockchain for secure NDN caching in vehicular networks. In: IEEE Conference on Standards for Communications and Networking (CSCN 2018), October 2018, Paris, France (2018)

    Google Scholar 

  21. Celdrán, A.H., Pérez, M.G., Clemente, F.J., Pérez, G.M.: Design of a recommender system based on users’ behavior and collaborative location and tracking. J. Comput. Sci. 12, 83–94 (2016)

    Article  Google Scholar 

  22. Jafarnejad, S., Castignani, G., Engel, T.: Towards a real-time driver identification mechanism based on driving sensing data. In: 2017 IEEE 20th International Conference on Intelligent Transportation Systems (ITSC), pp. 1–7. IEEE (2017)

    Google Scholar 

Download references

Acknowledgments

This work was made possible by EC Grant No. 2018-FR-TM-0097-S from the INEA Agency for Indid project. The statements made herein are solely the responsibility of the authors.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hacène Fouchal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Fouchal, H. (2021). Intermediate Pseudonym Certificate Generation for C-ITS. In: Krieger, U.R., Eichler, G., Erfurth, C., Fahrnberger, G. (eds) Innovations for Community Services. I4CS 2021. Communications in Computer and Information Science, vol 1404. Springer, Cham. https://doi.org/10.1007/978-3-030-75004-6_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-75004-6_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-75003-9

  • Online ISBN: 978-3-030-75004-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics