Efficient Attribute Based Access Control Mechanism for Vehicular Ad Hoc Network

  • Y. Sreenivasa Rao
  • Ratna Dutta
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7873)


In this work, we provide a solution to help mitigate the problem of the large ciphertext size in designing access control mechanism using Attribute Based Encryption (ABE) for vehicular communications. Our approach is to use access policy in Disjunctive Normal Form (DNF) enabling the length of ciphertext linear in the number of conjunctions instead of number of attributes in the access policy. This reduces communication overhead in contrast to the existing works in the area. The proposed scheme is computationally efficient as it requires only a constant number of pairings during encryption and decryption. Vehicles can validate their secret attribute-keys obtained from the Central Authority (CA) as well as from an Road Side Unit (RSU) individually. Remarkably, our approach allows vehicles to send multiple messages in a single ciphertext. Our scheme is collusion-resistant, secure under compromised RSUs and is proven to be secure in generic group model.


vehicular ad hoc network access control attribute based encryption disjunctive normal form generic group model 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)CrossRefGoogle Scholar
  2. 2.
    Sahai, A., Waters, B.: Fuzzy Identity-Based Encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  3. 3.
    Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute Based Encryption for Fine- Grained Access Control of Encrypted Data. In: ACM Conference on Computer and Communications Security, pp. 89–98 (2006)Google Scholar
  4. 4.
    Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-Policy Attribute-Based Encryption. In: IEEE Symposium on Security and Privacy, pp. 321–334 (2007)Google Scholar
  5. 5.
    Emura, K., Miyaji, A., Nomura, A., Omote, K., Soshi, M.: A Ciphertext- Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length. IJACT 2(1), 46–59 (2010)MathSciNetzbMATHCrossRefGoogle Scholar
  6. 6.
    Chase, M.: Multi-authority Attribute Based Encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 515–534. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  7. 7.
    Chase, M., Chow, S.S.M.: Improving Privacy and Security in Multi-Authority Attribute-Based Encryption. In: Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS 2009), pp. 121–130 (2009)Google Scholar
  8. 8.
    Müller, S., Katzenbeisser, S., Eckert, C.: Distributed Attribute-Based Encryption. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol. 5461, pp. 20–36. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  9. 9.
    Lewko, A., Waters, B.: Decentralizing Attribute-Based Encryption. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 568–588. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  10. 10.
    Huang, D., Verma, M.: ASPE: Attribute-Based Secure Policy Enforcement in Vehicular Ad Hoc Networks. Ad Hoc Networks 7(8), 1526–1535 (2009)CrossRefGoogle Scholar
  11. 11.
    Ruj, S., Nayak, A., Stojmenovic, I.: Improved Access Control Mechanism in Vehicular Ad Hoc Networks. In: Frey, H., Li, X., Ruehrup, S. (eds.) ADHOC-NOW 2011. LNCS, vol. 6811, pp. 191–205. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  12. 12.
    Mishra, B., Nayak, P., Behera, S., Jena, D.: Security in Vehicular Adhoc Networks: A Survey. In: ICCCS 2011, pp. 590–595. ACM, New York (2011)Google Scholar
  13. 13.
    Huang, D., Hong, X., Gerla, M.: Situation-Aware Trust Architecture for Vehicular Networks. IEEE Communications Magazine 48(11), 128–135 (2010)CrossRefGoogle Scholar
  14. 14.
    Chen, N., Gerla, M., Hong, D.H.X.: Secure, Selective Group Broadcast in Vehicular Networks using Dynamic Attribute Based Encryption. In: Ad Hoc Networking Workshop, Med-Hoc-Net, pp. 1–8 (2010)Google Scholar
  15. 15.
    Lo-Yao, Y., Yen-Cheng, C., Jiun-Long, H.: ABACS: An Attribute-Based Access Control System for Emergency Services over VANETs. IEEE Journal on Selected Areas in Communications 29(3), 630–643 (2011)CrossRefGoogle Scholar
  16. 16.
    Studer, A., Shi, E., Bai, F., Perrig, A.: TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs. In: 6th Annual IEEE Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 484–492 (2009)Google Scholar
  17. 17.
    Hao, Y., Chengcheng, Y., Zhou, C., Song, W.: A Distributed Key Management Framework with Cooperative Message Authentication in VANETs. IEEE Journal on Selected Areas in Communications 29(3), 616–629 (2011)CrossRefGoogle Scholar
  18. 18.
    Ming-Chin, C., Jeng-Farn, L.: PPAS: A Privacy Preservation Authentication Scheme for Vehicle-to-Infrastructure Communication Networks. In: CECNet, pp. 1509–1512 (2011)Google Scholar
  19. 19.
    Subir, B., Md. Mahbubul, H., Jelena, M.: Privacy and Anonymity in VANETs: A Contemporary Study. Ad Hoc and Sensor Wireless Networks 10(2-3), 177–192 (2010)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Y. Sreenivasa Rao
    • 1
  • Ratna Dutta
    • 1
  1. 1.Department of MathematicsIndian Institute of Technology KharagpurKharagpurIndia

Personalised recommendations