Abstract
Recently, Lu et al. proposed an efficient conditional privacy preservation protocol, named ECPP, based on group signature scheme for secure vehicular communications. However, ECPP dose not provide unlinkability and traceability when multiple RSUs are compromised. In this paper, we make up for the limitations and propose a robust conditional privacy-preserving authentication protocol without loss of efficiency as compared with ECPP. Furthermore, in our protocol, RSUs can issue multiple anonymous certificates to an OBU to alleviate system overheads for validity check of RSUs. In order to achieve these goals, we consider a universal re-encryption scheme as our building block.
This work was supported by the Korea Research Foundation Grant funded by the Korean Government (MOEHRD, Basic Research Promotion Fund) (KRF-2008-521-D00454).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Blum, J., Eskandarian, A.: The threat of intelligent collisions. IT Professional, pp 6(1), 22–29 (2004)
Boneh, D., Shacham, H.: Group signatures with verifier-local revocation. In: CCS 2004, pp. 168–177 (2004)
Freudiger, J., Raya, M., Felegyhazi, M.: Mix-Zones for Location Privacy in Vehicular Networks. In: WiN-ITS 2007 (2007)
Golle, P., Jakobsson, M., Juels, A., Syverson, P.F.: Universal re-encryption for mixnets. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 163–178. Springer, Heidelberg (2004)
Hubaux, J.-P., Capkun, S., Luo, J.: The security and privacy of smart vehicles. IEEE Security and Privacy Magazine 2(3), 49–55 (2004)
Kamat, P., Baliga, A., Trappe, W.: Secure, pseudonymous, and auditable communication in vehicular ad hoc networks. Security Comm. Networks (1), 233–244 (2008)
Luo, J., Hubaux, J.-P.: A survey of Inter-Vehicle Communication Technical Report. EPFL Technical Report IC/2004/24 (2004)
Lu, R., Lin, X., Zhu, H., Ho, P.-H., Shen, X.: ECPP: Efficient Conditional Privacy Preservation Protocol for secure Vehicular Communications. In: IEEE INFOCOM 2008, pp. 1903–1911 (2008)
Lin, X., Sun, X., Shen, X.: GSIS: a secure and privacy preserving protocol for vehicular communications. IEEE Transaction on Vehicular Technology 56(6), 3442–3456 (2007)
Parno, B., Perrig, A.: Challenges in securing vehicular networks. HotNets-IV (2005)
Peng, Y., Abichar, Z., Chang, J.M.: Roadside-aided Routing (RAR) in Vehicular Networks. IEEE ICC 2006 8, 3602–3607 (2006)
Raya, M., Hubaux, J.-P.: The Security of Vehicular Ad Hoc Networks. In: SASN 2005, pp. 11–21 (2005)
Raya, M., Hubaux, J.-P.: Security Aspects of Inter-Vehicle Communications. In: STRC (2005)
Raya, M., Hubaux, J.-P.: Securing Vehicle Ad Hoc Networks. Journal of Computer Security 15(1), 39–68 (2007)
Ren, K., Lou, W., Deng, R.H., Kim, K.: A Novel Privacy Preserving Authentication and Access Control Scheme in Pervasive Computing Environments. IEEE Transaction on Vehicular Technology 55(4), 1373–1384 (2006)
Varsheney, U.: Vehicular mobile commerce. IEEE Computer Magazine Online (2004)
Xu, Q., Mak, T., Ko, J., Sengupta, R.: Medium Access Control Protocol Design for Vehicle-Vehicle Safety Messages. IEEE Transaction on Vehicular Technology 56(2), 499–518 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Jung, C.D., Sur, C., Park, Y., Rhee, KH. (2009). A Robust Conditional Privacy-Preserving Authentication Protocol in VANET. In: Schmidt, A.U., Lian, S. (eds) Security and Privacy in Mobile Information and Communication Systems. MobiSec 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 17. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04434-2_4
Download citation
DOI: https://doi.org/10.1007/978-3-642-04434-2_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04433-5
Online ISBN: 978-3-642-04434-2
eBook Packages: Computer ScienceComputer Science (R0)