Advertisement

An Anonymous Communication Scheme with Non-reputation for Vehicular Ad Hoc Networks

  • Ching-Hung YehEmail author
  • Meng-Yen Hsieh
  • Kuan-Ching Li
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 274)

Abstract

Vehicular Ad hoc Network (VANET) is a kind of open wireless communication network and uses 802.11p protocol to interconnect vehicles and provides numerous services. Although it brings many of convenient applications but unlike traditionally wired networks are protected by several defenses such as firewalls and gateways, it may face a variety of security challenges such as security and privacy. The users need anonymous mechanisms to enable unlink ability but impartial third party requests non-reputation for accidents or certain events. In brief, the privacy preserving and non-reputation are contradictory. To overcome these flaws, an anonymous communication scheme with non-reputation for vehicular ad hoc networks is proposed. Our proposed scheme not only accomplishes anonymously communication between vehicle-to-vehicle and vehicle-to-roadside infrastructure for protecting privacy, but also achieves non-reputation function for identifying vehicle.

Keywords

vehicular ad hoc network security privacy non-reputation 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Lin, X., Lu, R., Zhang, C., Zhu, H., Ho, P.H., Shen, X.S.: Security in Vehicular Ad Hoc Networks. IEEE Communications Magazine 46(4), 88–95 (2008)CrossRefGoogle Scholar
  2. 2.
    Yang, H., Luo, H., Ye, F., Lu, S., Zhang, L.: Security in Mobile Ad Hoc Networks: Challenges and Solutions. IEEE Wireless Communications 11(1), 38–47 (2004)CrossRefGoogle Scholar
  3. 3.
    Liu, B., Khorashadi, B., Ghosal, D., Chuah, C.-N., Zhang, M.H.: Assessing the VANET’s Local Information Storage Capability under Different Traffic Mobility. In: INFOCOM 2010, pp. 1–5 (2010)Google Scholar
  4. 4.
    Raya, M., Papadimitratos, P., Hubaux, J.P.: Securing Vehicular Communications. IEEE Wireless Communications 13(5), 8–15 (2006)CrossRefGoogle Scholar
  5. 5.
    Papadimitratos, P., Kung, A., Kargl, F., Ma, Z., Raya, M., Freudiger, J., Schoch, E., Holczer, T., Buttyan, L., Hubaux, J.P.: Secure Vehicular Communication Systems: Design and Architecture. IEEE Communications Magazine 46(11), 100–109 (2008)CrossRefGoogle Scholar
  6. 6.
    Yeh, C.-H., Huang, Y.-M., Wang, T.-I., Chen, H.: A secure Wireless Communication Scheme for Vehicle Ad Hoc Networking. Mobile Networks and Applications 14(5), 611–624 (2009)CrossRefGoogle Scholar
  7. 7.
    Yeh, C.-H., Hsieh, M.-Y., Li, K.-C.: A Certificate Enhanced Group Key Framework for Vehicular Ad Hoc Networks. In: Han, Y.-H., Park, D.-S., Jia, W., Yeo, S.-S. (eds.) Ubiquitous Information Technologies and Applications. LNEE, vol. 214, pp. 215–222. Springer, Heidelberg (2013)CrossRefGoogle Scholar
  8. 8.
    Xi, Y., Sha, K., Shi, W., Schwiebert, L., Zhang, T.: Enforcing Privacy Using Symmetric Random Key-Set in Vehicular Networks. In: Proc. of the 8th International Symposium on Autonomous Decentralized Systems (ISADS 2007), Sedona, AZ, USA, pp. 344–351 (March 2007)Google Scholar
  9. 9.
    Zhang, C., Lu, R., Ho, P.H., Chen, A.: A Location Privacy Preserving Authentication Scheme in Vehicular Networks. In: Proc. of WCNC 2008, pp. 2543–2548 (2008)Google Scholar
  10. 10.
    Raya, M., Hubaux, J.-P.: Securing vehicular ad hoc networks. Journal of Computer Security, Special Issue on Security of Ad Hoc and Sensor Networks 15(1), 39–68 (2007)Google Scholar
  11. 11.
    Lin, X., Sun, X., Ho, P.H., Shen, X.: GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications. IEEE Transactions on Vehicular Technology 56(6), 3442–3456 (2007)CrossRefGoogle Scholar
  12. 12.
    Li, C.T., Hwang, M.S., Chu, Y.P.: A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Comput. Commun. 31(12), 2803–2814 (2008)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2014

Authors and Affiliations

  1. 1.Department of Computer Science and Information, EngineeringFar East UniversityTainanTaiwan
  2. 2.Department of Computer Science and Information, EngineeringProvidence UniversityTaichungTaiwan

Personalised recommendations