The Community for Technology Leaders
RSS Icon
Issue No.09 - September (2010 vol.21)
pp: 1227-1239
Jinyuan Sun , University of Tennessee, Knoxville
Chi Zhang , University of Florida, Gainesville
Yanchao Zhang , New Jersey Institute of Technology, Newark
Yuguang Fang , University of Florida, Gainesville
Vehicular ad hoc network (VANET) can offer various services and benefits to users and thus deserves deployment effort. Attacking and misusing such network could cause destructive consequences. It is therefore necessary to integrate security requirements into the design of VANETs and defend VANET systems against misbehavior, in order to ensure correct and smooth operations of the network. In this paper, we propose a security system for VANETs to achieve privacy desired by vehicles and traceability required by law enforcement authorities, in addition to satisfying fundamental security requirements including authentication, nonrepudiation, message integrity, and confidentiality. Moreover, we propose a privacy-preserving defense technique for network authorities to handle misbehavior in VANET access, considering the challenge that privacy provides avenue for misbehavior. The proposed system employs an identity-based cryptosystem where certificates are not needed for authentication. We show the fulfillment and feasibility of our system with respect to the security goals and efficiency.
Privacy, traceability, pseudonym, misbehavior, revocation, identity-based cryptography, vehicular ad hoc network.
Jinyuan Sun, Chi Zhang, Yanchao Zhang, Yuguang Fang, "An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks", IEEE Transactions on Parallel & Distributed Systems, vol.21, no. 9, pp. 1227-1239, September 2010, doi:10.1109/TPDS.2010.14
[1] K. Plößl, T. Nowey, and C. Mletzko, "Towards a Security Architecture for Vehicular Ad Hoc Networks," Proc. First Int'l Conf. Availability, Reliability and Security (ARES '06), Apr. 2006.
[2] B. Parno and A. Perrig, "Challenges in Securing Vehicular Networks," Proc. Fourth Workshop Hot Topics in Networks (HotNets IV), Nov. 2005.
[3] M. Raya and J-P. Hubaux, "Securing Vehicular Ad Hoc Networks," J. Computer Security, special issue on security of ad hoc and sensor networks, vol. 15, no. 1, pp. 39-68, 2007.
[4] J.Y. Choi, M. Jakobsson, and S. Wetzel, "Balancing Auditability and Privacy in Vehicular Networks," Proc. First ACM Int'l Workshop QoS and Security for Wireless and Mobile Networks (Q2SWinet '05), pp. 79-87, Oct. 2005.
[5] T. Leinmüller, C. Maihöfer, E. Schoch, and F. Kargl, "Improved Security in Geographic Ad Hoc Routing through Autonomous Position Verification," Proc. Third ACM Int'l Workshop Vehicular Ad Hoc Networks (VANET '06), Sept. 2006.
[6] M.E. Zarki, S. Mehrotra, G. Tsudik, and N. Venkatasubramanian, "Security Issues in a Future Vehicular Network," Proc. European Wireless Conf. '02, Feb. 2002.
[7] J. Sun, C. Zhang, and Y. Fang, "An Id-Based Framework Achieving Privacy and Non-Repudiation in Vehicular Ad Hoc Networks," Proc. IEEE Military Comm. Conf., pp. 1-7, Oct. 2007.
[8] X. Lin, X. Sun, P.-H. Ho, and X. Shen, "GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications," IEEE Trans. Vehicular Technology, vol. 56, no. 6, pp. 3442-3456, Nov. 2007.
[9] C. Zhang, R. Lu, X. Lin, P.-H. Ho, and X. Shen, "An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks," Proc. IEEE INFOCOM, pp. 816-824, Apr. 2008.
[10] L. Nguyen and R. Safavi-Naini, "Dynamic K-Times Anonymous Authentication," Proc. Applied Cryptography and Network Security Conf., vol. 3531, pp. 318-333, 2005.
[11] M. Raya, P. Papadimitratos, I. Aad, D. Jungels, and J.-P. Hubaux, "Eviction of Misbehaving and Faulty Nodes in Vehicular Networks," IEEE J. Selected Areas Comm., vol. 25, no. 8, pp. 1557-1568, Oct. 2007.
[12] C. Gamage, B. Gras, B. Crispo, and A.S. Tanenbaum, "An Identity-Based Ring Signature Scheme with Enhanced Privacy," Proc. Second Int'l Conf. Security and Privacy in Comm. Networks (SecureComm '06), Aug. 2006.
[13] R. Lu, X. Lin, H. Zhu, P.-H. Ho, and X. Shen, "ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications," Proc. IEEE INFOCOM, Apr. 2008.
[14] A. Studer, E. Shi, F. Bai, and A. Perrig, "TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs," Proc. Sixth Ann. IEEE SECON Conf. (SECON '09), 2009.
[15] K. Sampigethaya, L. Huang, M. Li, R. Poovendran, K. Matsuura, and K. Sezaki, "Caravan: Providing Location Privacy for Vanet," Proc. Embedded Security in Cars (ESCAR), 2005.
[16] P. Kamat, A. Baliga, and W. Trappe, "An Identity-Based Security Framework for VANETs," Proc. Third ACM Int'l Workshop Vehicular Ad Hoc Networks (VANET '06), pp. 94-95, Sept. 2006.
[17] P. Kamat, A. Baliga, and W. Trappe, "Secure, Pseudonymous, and Auditable Communication in Vehicular Ad Hoc Networks," J. Security and Comm. Networks, vol. 1, no. 3, pp. 233-244, June 2008.
[18] J. Sun and Y. Fang, "Defense Against Misbehavior in Anonymous Vehicular Ad Hoc Networks," Ad Hoc Networks, vol. 7, no. 8, pp. 1515-1525, Nov. 2009.
[19] G. Calandriello, P. Papadimitratos, J.-P. Hubaux, and A. Lioy, "Efficient and Robust Pseudonymous Authentication in VANET," Proc. Fourth ACM Int'l Workshop Vehicular Ad Hoc Networks (VANET '07), pp. 19-28, 2007.
[20] P. Tsang, M.H. Au, A. Kapadia, and S.W. Smith, "Blacklistable Anonymous Credentials: Blocking Misbehaving Users without TTPs," Proc. ACM Conf. Computer and Comm. Security (CCS), pp. 72-81, 2007.
[21] J. Sun and Y. Fang, "A Defense Technique Against Misbehavior in VANETs Based on Threshold Authentication," Proc. IEEE Military Comm. Conf., Nov. 2008.
[22] D. Boneh and M. Franklin, "Identity-Based Encryption from the Weil Pairings," Advances in Cryptology-Asiacrypt, Springer-Verlag, pp. 514-532, 2001.
[23] A. Shamir, "How to Share a Secret," Comm. ACM, vol. 22, pp. 612-613, 1979.
[24] C.-P. Schnorr, "Efficient Signature Generation by Smart Cards," vol. 4, no. 3, pp. 161-174, Jan. 1991.
[25] J. Sun, C. Zhang, and Y. Fang, "A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks," Proc. IEEE INFOCOM, pp. 1687-1695, Apr. 2008.
[26] A. Menezes, P.V. Oorschot, and S. Vanston, Handbook of Applied Cryptography. CRC Press, 1996.
[27] J. Baek and Y. Zheng, "Identity-Based Threshold Signature Scheme from the Bilinear Pairings," Proc. Int'l Conf. Information Technology (ITCC '04), Information Assurance and Security Track (IAS '04), pp. 124-128, 2004.
[28] X. Chen, F. Zhang, D.M. Konidala, and K. Kim, "New ID-Based Threshold Signature Scheme from Bilinear Pairings," Proc. Fifth Int'l Conf. Cryptology in India (INDOCRYPT '04), 2004.
[29] J. Shao, Z. Cao, and L. Wang, Efficient ID-Based Threshold Signature Schemes without Pairings, Cryptology ePrint Archive, Report 2006/308,, 2006.
[30] J. Camenisch et al., "How to Win the Clonewars: Efficient Periodic n-Times Anonymous Authentication," Proc. ACM Conf. Computer and Comm. Security (CCS), pp. 201-210, 2006.
[31] J. Camenisch and A. Lysyanskaya, "Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials," Proc. 22nd Ann. Int'l Cryptology Conf. (CRYPTO '02), pp. 61-76, 2002.
[32] IEEE Std 1609.2-2006, IEEE Trial-Use Standard for Wireless Access in Vehicular Environmentsł Security Services for Applications and Management Messages, punumber=11000 , 2006.
[33] R. Dingledine, N. Mathewson, and P. Syverson, "Tor: The Second-Generation Onion Router," Proc. USENIX Security Symp., pp. 303-320, Aug. 2004.
[34] P. Golle, D. Greene, and J. Staddon, "Detecting and Correcting Malicious Data in VANETs," Proc. First ACM Int'l Workshop Vehicular Ad Hoc Networks (VANET '04), pp. 29-37, Oct. 2004.
[35] J. Yin, T. Elbatt, G. Yeung, B. Ryu, S. Habermas, H. Krishnan, and T. Talty, "Performance Evaluation of Safety Applications over DSRC Vehicular Ad Hoc Networks," Proc. First ACM Int'l Workshop Vehicular Ad Hoc Networks (VANET '04), Oct. 2004.
[36] T. Leinmüller, E. Schoch, and F. Kargl, "Position Verification Approaches for Vehicular Ad Hoc Networks," Proc. IEEE Wireless Comm., pp. 16-21, Oct. 2006.
[37] M. Raya, A. Aziz, and J.P. Hubaux, "Efficient Secure Aggregation in VANETs," Proc. Third ACM Int'l Workshop Vehicular Ad Hoc Networks (VANET '06), pp. 67-75, Sept. 2006.
[38] F. Hess, "Efficient Identity-Based Signature Schemes Based on Pairings," Selected Areas in Cryptography, Springer-Verlag, pp. 310-324, 2002.
[39] P.S.L.M. Barreto, H.Y. Kim, B. Lynn, and M. Scott, "Efficient Algorithms for Pairing-Based Cryptosystems," Proc. 22nd Ann. Int'l Cryptology Conf. (CRYPTO '02), pp. 354-368, 2002.
[40] P.S.L.M. Barreto, S.D. Galbraith, C. ÓhÉigeartaigh, and M. Scott, Efficient Pairing Computation on Supersingular Abelian Varieties, Cryptology ePrint Archive, Report 2004/375, http://eprint.iacr. org/2004375.pdf, Sept. 2005.
[41] M. Scott, N. Costigan, and W. Abdulwahab, Implementing Cryptographic Pairings on Smartcards, L. Goubin and M. Matsui, eds. Springer-Verlag, 2006.
[42] G.M. Bertoni, L. Chen, P. Fragneto, K.A. Harrison, and G. Pelosi, "Computing Tate Pairing on Smartcards," smartcardches2005_v4.pdf, 2005.
4 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool