A Traceable Self-Generated Pseudonym Scheme in VANETs

نویسندگان

چکیده

Abstract The generation of the pseudonym in vehicular ad hoc networks (VANETs) usually requires participation a trusted center (TA), and it needs multiple interactions with TA. To address these problems, we propose novel traceable self-generated based on non-interactive zero-knowledge proof (NIZK) consortium blockchain VANETs. In our scheme, pseudonyms method is introduced to eliminate excessive communication burden, composed roadside units (RSUs) replace RSUs verify effectiveness OBU’s through consensus mechanism. Multiple trace authorities (TRAs) are designed jointly tracking real identity OBU, which effectively prevents abuse supervision by only supervisor.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cooperative pseudonym change scheme based on the number of neighbors in VANETs

In Vehicular Ad hoc NETworks (VANETs), trigger-based pseudonym change schemes play an important role in providing anonymity. However, the anonymity provided by these schemes usually is low mainly because the behavior of changing pseudonym is individual. Considering cooperation on changing pseudonym can enhance anonymity, in this paper, we give a general cooperation framework. As an application ...

متن کامل

Impact of Pseudonym Changes on Geographic Routing in VANETs

Inter-vehicle communication is regarded as one of the major applications of mobile ad hoc networks (MANETs). In these so called vehicular ad hoc networks (VANETs) security and privacy are crucial factors for successful deployment. In a scenario, where each vehicle would have a unique identifier, eavesdroppers could easily accumulate location profiles. As a solution approach, several authors sug...

متن کامل

Traitor Traceable Signature Scheme

The new signature scheme, t ra i tor traceable signature scheme is presented, which allows the signer to convince any arbiter of the recipient's infringement, if the recipient distributes illegally the signature which he got. We use the techniques of a proof of knowledge of discrete logarithm[l][2], identification of double spender in an off-line electronic cash[3][4], and a signcryption scheme...

متن کامل

A Decentralized Pseudonym Scheme for Cloud-based eHealth Systems

A decentralized pseudonym scheme is proposed for providing storage, encryption and authentication of patients’ EHRs in cloud-based eHealth systems. The pseudonyms of a patient are generated from the patient’s secrets and each of them is used as the index of an EHR entry of the patient. An encryption key derived from the pseudonym can be used to encrypt the corresponding EHR entry. The pseudonym...

متن کامل

A Privacy-preserving Pseudonym Acquisition Scheme for Vehicular Communication Systems

Vehicular communication systems rely on temporary anonymous identities, i.e. pseudonyms, in order to establish security and at the same time avoid the possibility of tracking vehicles. If a vehicle uses only one pseudonym, an adversary would be able to follow the vehicle by observing and linking messages, signed under that pseudonym. Therefore, the vehicles acquire a set of pseudonyms from the ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of physics

سال: 2022

ISSN: ['0022-3700', '1747-3721', '0368-3508', '1747-3713']

DOI: https://doi.org/10.1088/1742-6596/2384/1/012020