Abstract
Access control of message is required when certain selected vehicles are granted access to information, instead of all vehicles within communication range. In these situations an access policy (consisting of attributes as road situation and vehicle type) is built into the vehicle and messages are encrypted using these access policies. Only valid vehicles possessing these attributes are able to decrypt the message. Huang and Verma [16] had proposed such an access control framework. The scheme assumed that the road-side units (RSU) are not compromised and had a very restricted access structure. We propose a new access control structure which eliminates the drawbacks of their schemes, by providing access control in presence of compromised RSU. Our technique permits a more general boolean access structure. Communication is possible between two vehicles which are monitored by two RSU, which was not permitted in [16]. The costs are comparable to that of [16].
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Beimel, A.: Secure Schemes for Secret Sharing and Key Distribution. Ph D Thesis. Technion, Haifa (1996)
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321–334. IEEE Computer Society, Los Alamitos (2007)
Biswas, S., Mahbubul Haque, M., Misic, J.V.: Privacy and anonymity in vanets: A contemporary study. Ad Hoc & Sensor Wireless Networks 10(2-3), 177–192 (2010)
Chase, M.: Multi-authority attribute based encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 515–534. Springer, Heidelberg (2007)
Chase, M., Chow, S.S.M.: Improving privacy and security in multi-authority attribute-based encryption. In: ACM Conference on Computer and Communications Security, pp. 121–130 (2009)
Chaum, D., van Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257–265. Springer, Heidelberg (1991)
Chen, N., Gerla, M., Hong, D.H.X.: Secure, selective group broadcast in vehicular networks using dynamic attribute based encryption. In: Ad Hoc Networking Workshop, Med-Hoc-Net, pp. 1–8 (2010)
Douceur, J.R.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)
Freeman, D., Scott, M., Teske, E.: A taxonomy of pairing-friendly elliptic curves. J. Cryptology 23(2), 224–280 (2010)
Freudiger, J., Manshaei, M.H., Boudec, J.-Y.L., Hubaux, J.-P.: On the age of pseudonyms in mobile ad hoc networks. In: INFOCOM, pp. 1577–1585. IEEE, Los Alamitos (2010)
Ghosh, M., Varghese, A., Gupta, A., Kherani, A.A., Muthaiah, S.N.: Detecting misbehaviors in vanet with integrated root-cause analysis. Ad Hoc Networks 8(7), 778–790 (2010)
Golle, P., Greene, D.H., Staddon, J.: Detecting and correcting malicious data in vanets. In: Vehicular Ad Hoc Networks, pp. 29–37 (2004)
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: ACM Conference on Computer and Communications Security, pp. 89–98 (2006)
Huang, D., Hong, X., Gerla, M.: Situation-aware trust architecture for vehicular networks. Topics In Automotive Networking 48(11), 128–135 (2010)
Huang, D., Verma, M.: ASPE: attribute-based secure policy enforcement in vehicular ad hoc networks. Ad Hoc Networks 7(8), 1526–1535 (2009)
Kargl, F., Papadimitratos, P., Buttyan, L., Mter, M., Schoch, E., Wiedersheim, B., Thong, T.v., Cal, G., Held, A., Kung, A., Hubaux, J.p.: Secure vehicular communication systems: Implementation, performance, and research challenges. IEEE Wireless Communication Magazine, 110–118 (2008)
Lewko, A., Waters, B.: Decentralizing Attribute-Based Encryption. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 568–588. Springer, Heidelberg (2011), eprint.iacr.org/2010/351.pdf (last accessed February 22, 2011)
Papadimitratos, P., Buttyan, L., Holczer, T., Schoch, E., Freudiger, J., Raya, M., Ma, Z., Kargl, F., Kung, A., Hubaux, J.p.: Secure vehicular communication systems: design and architecture. IEEE Wireless Communication Magazine, 100–109 (2008)
Park, S., Aslam, B., Turgut, D., Zou, C.C.: Defense against sybil attack in vehicular ad hoc network based on roadside unit support. In: MILCOM, pp. 1–7 (2009)
Parno, B., Perrig, A.: Challenges in security vehicular networks. In: HotNets-IV (2005)
Raya, M.: Data-Centric Trust in Ephemeral Networks. Ph D Thesis. EPFL, Lausanne (2009)
Raya, M., Papadimitratos, P., Gligor, V.D., Hubaux, J.-P.: On data-centric trust establishment in ephemeral ad hoc networks. In: INFOCOM, pp. 1238–1246. IEEE, Los Alamitos (2008)
Raya, M., Shokri, R., Hubaux, J.-P.: On the tradeoff between trust and privacy in wireless ad hoc networks. In: Wetzel, S., Nita-Rotaru, C., Stajano, F. (eds.) WISEC, pp. 75–80. ACM, New York (2010)
Ruj, S., Nayak, A., Stojmenovic, I.: Distributed fine-grained access control in wireless sensor networks. IEEE International Parallel & Distributed Processing Symposium (to appear, 2011)
Sahai, A., Waters, B.: Fuzzy Identity-Based Encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005)
Sampigethaya, K., Huang, L., Li, M., Poovendran, R., Matsuura, K., Sezaki, K.: Caravan: Providing location privacy for vanet. In: Proc. of the Workshop on Embedded Security in Cars, ESCAR (2005)
Sampigethaya, K., Li, M., Huang, L., Poovendran, R.: Amoeba: Robust location privacy scheme for vanet. IEEE Journal on Selected Areas in Communications 25(8), 1569–1589 (2007)
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
Stinson, D.R.: Cryptography: Theory and Practice, 3rd edn. CRC Press Inc., Boca Raton (2006)
Sun, Y., Lu, R., Lin, X., Shen, X., Su, J.: An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. IEEE Trans. on Vehicular Technology 59(7), 3589–3603 (2010)
Wasef, A., Jiang, Y., Shen, X.: Ecmv: Efficient certificate management scheme for vehicular networks. In: GLOBECOM, pp. 639–643. IEEE, Los Alamitos (2008)
Waters, B.: Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions, http://www.eprint.iacr.org/2009/385.pdf
Yu, S., Ren, K., Lou, W.: FDAC: Toward fine-grained distributed data access control in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems 22(4), 673–686 (2011)
Zhou, T., Choudhury, R.R., Ning, P., Chakrabarty, K.: Privacy-preserving detection of sybil attacks in vehicular ad hoc networks. In: MobiQuitous, pp. 1–8. IEEE, Los Alamitos (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ruj, S., Nayak, A., Stojmenovic, I. (2011). Improved Access Control Mechanism in Vehicular Ad Hoc Networks. In: Frey, H., Li, X., Ruehrup, S. (eds) Ad-hoc, Mobile, and Wireless Networks. ADHOC-NOW 2011. Lecture Notes in Computer Science, vol 6811. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22450-8_15
Download citation
DOI: https://doi.org/10.1007/978-3-642-22450-8_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22449-2
Online ISBN: 978-3-642-22450-8
eBook Packages: Computer ScienceComputer Science (R0)