The Community for Technology Leaders
RSS Icon
Issue No.03 - May-June (2013 vol.28)
pp: 62-65
Rongxing Lu , Nanyang Technological University
Xiaodong Lin , University of Ontario Institute of Technology
Zhiguo Shi , Zhejiang University
Xuemin Sherman Shen , University of Waterloo
Vehicular traffic monitoring (VTM) is a promising cyber-physical system, but it faces many security and privacy challenges. Here, a new lightweight conditional privacy preservation (LCPP) protocol utilizes simple hash-chain techniques to secure VTM systems. The protocol not only supports the requirement of conditional privacy preservation, but also achieves efficient local revocation verification on the road.
Road vehicles, Vehicles, Road transportation, Educational institutions, Safety, Traffic control, Vehicular ad hoc networks, Intelligent systems,intelligent systems, Road vehicles, Vehicles, Road transportation, Educational institutions, Safety, Traffic control, Vehicular ad hoc networks, Intelligent systems, Vehicular Ad Hoc Network, Vanet, vehicular traffic monitoring, lightweight conditional privacy preservation, LCPP
Rongxing Lu, Xiaodong Lin, Zhiguo Shi, Xuemin Sherman Shen, "A Lightweight Conditional Privacy-Preservation Protocol for Vehicular Traffic-Monitoring Systems", IEEE Intelligent Systems, vol.28, no. 3, pp. 62-65, May-June 2013, doi:10.1109/MIS.2013.56
1. X. Lin et al., “Security in Vehicular Ad Hoc Networks,” IEEE Comm., vol. 46, no. 4, 2008, pp. 88-95.
2. A. Skordylis and N. Trigoni, “Efficient Data Propagation in Traffic Monitoring Vehicular Networks,” IEEE Trans. Intelligent Transportation Systems, vol. 12, no. 3, 2011, pp. 680-694.
3. R. Lu et al., “ECCP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications,” Proc. 27th Conf. Computer Comm., IEEE, 2008, pp. 1229-1237.
4. X. Lin et al., “GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications,” IEEE Trans. Vehicular Technology, vol. 56, no. 6, 2007, pp. 3442-3456.
5. M. Raya and J.-P. Hubaux, “Securing Vehicular Ad Hoc Networks,” J. Computer Security, vol. 15, no. 1, 2007, pp. 39-68.
6. J.J. Haas, Y.-C. Hu, and K.P. Laberteaux, “Design and Analysis of a Lightweight Certificate Revocation Mechanism for Vanet,” Proc. Vehicular Ad Hoc Networks, ACM, 2009, pp. 89-98.
7. D. Boneh and M.K. Franklin, “Identity-Based Encryption from the Weil Pairing,” Advances in Cryptology, LNCS 2139, Springer, 2001, pp. 213-229.
8. P.S.L.M. Barreto et al., “Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps,” Advances in Cryptology, LNCS 3788, Springer, 2005, pp. 515-532.
9. R. Lu et al., “Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in Vanets,” IEEE Trans. Vehicular Technology, vol. 61, no. 1, 2012, pp. 86-96.
556 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool