Providing k-anonymity and revocation in ubiquitous VANETs
نویسندگان
چکیده
منابع مشابه
Limits on Revocation in VANETs
We examine the limitations on revocation approaches in VANETs, including local revocation and global revocation. Local revocation schemes often use a local vote to identify and revoke an attacker. However, such votes often require that not only a majority of local nodes are honest, but that they also are able to detect the attack. We argue that these requirements may not be practical, particula...
متن کاملHidden attribute-based signatures without anonymity revocation
We propose a new notion called hidden attribute-based signature, which is inspired by the recent developments in attribute-based cryptosystem. With this technique, users are able to sign messages with any subset of their attributes issued from an attribute center. In this notion, a signature attests not to the identity of the individual who endorsed a message, but instead to a claim regarding t...
متن کاملAn Anonymity Revocation Technology for Anonymous Communication
A number of Privacy Enhancing Technologies (PETs) have been proposed in the last three decades offering unconditional communication anonymity to their users. Unconditional anonymity can, however, be a security threat because it allows users to employ a PET in order to act maliciously while hiding their identity. In the last few years, several technologies which revoke the identity of users who ...
متن کاملHow to Bypass Two Anonymity Revocation Schemes
In recent years, there have been several proposals for anonymous communication systems that provide intentional weaknesses to allow anonymity to be circumvented in special cases. These anonymity revocation schemes attempt to retain the properties of strong anonymity systems while granting a special class of people the ability to selectively break through their protections. We evaluate the two d...
متن کاملPrivacy and Anonymity in VANETs: A Contemporary Study
Security and Privacy issues are among the most important concerns for Vehicular Ad hoc Network (VANET) users, and a number of papers have proposed various implementation schemes for one or the other, or both, in recent years. In this paper, we survey the existing work on security and privacy in VANETs from several distinct viewpoints, and classify them into distinct categories based on their cr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Ad Hoc Networks
سال: 2016
ISSN: 1570-8705
DOI: 10.1016/j.adhoc.2015.05.016