A Traceable Self-Generated Pseudonym Scheme in VANETs
نویسندگان
چکیده
Abstract The generation of the pseudonym in vehicular ad hoc networks (VANETs) usually requires participation a trusted center (TA), and it needs multiple interactions with TA. To address these problems, we propose novel traceable self-generated based on non-interactive zero-knowledge proof (NIZK) consortium blockchain VANETs. In our scheme, pseudonyms method is introduced to eliminate excessive communication burden, composed roadside units (RSUs) replace RSUs verify effectiveness OBU’s through consensus mechanism. Multiple trace authorities (TRAs) are designed jointly tracking real identity OBU, which effectively prevents abuse supervision by only supervisor.
منابع مشابه
Cooperative pseudonym change scheme based on the number of neighbors in VANETs
In Vehicular Ad hoc NETworks (VANETs), trigger-based pseudonym change schemes play an important role in providing anonymity. However, the anonymity provided by these schemes usually is low mainly because the behavior of changing pseudonym is individual. Considering cooperation on changing pseudonym can enhance anonymity, in this paper, we give a general cooperation framework. As an application ...
متن کاملImpact of Pseudonym Changes on Geographic Routing in VANETs
Inter-vehicle communication is regarded as one of the major applications of mobile ad hoc networks (MANETs). In these so called vehicular ad hoc networks (VANETs) security and privacy are crucial factors for successful deployment. In a scenario, where each vehicle would have a unique identifier, eavesdroppers could easily accumulate location profiles. As a solution approach, several authors sug...
متن کاملTraitor Traceable Signature Scheme
The new signature scheme, t ra i tor traceable signature scheme is presented, which allows the signer to convince any arbiter of the recipient's infringement, if the recipient distributes illegally the signature which he got. We use the techniques of a proof of knowledge of discrete logarithm[l][2], identification of double spender in an off-line electronic cash[3][4], and a signcryption scheme...
متن کاملA Decentralized Pseudonym Scheme for Cloud-based eHealth Systems
A decentralized pseudonym scheme is proposed for providing storage, encryption and authentication of patients’ EHRs in cloud-based eHealth systems. The pseudonyms of a patient are generated from the patient’s secrets and each of them is used as the index of an EHR entry of the patient. An encryption key derived from the pseudonym can be used to encrypt the corresponding EHR entry. The pseudonym...
متن کاملA Privacy-preserving Pseudonym Acquisition Scheme for Vehicular Communication Systems
Vehicular communication systems rely on temporary anonymous identities, i.e. pseudonyms, in order to establish security and at the same time avoid the possibility of tracking vehicles. If a vehicle uses only one pseudonym, an adversary would be able to follow the vehicle by observing and linking messages, signed under that pseudonym. Therefore, the vehicles acquire a set of pseudonyms from the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of physics
سال: 2022
ISSN: ['0022-3700', '1747-3721', '0368-3508', '1747-3713']
DOI: https://doi.org/10.1088/1742-6596/2384/1/012020