Secure and Privacy - Preserving Broadcast Authentication for IVC

نویسندگان

  • Liting Huang
  • Geert Heijenk
چکیده

Vehicle-to-Vehicle(V2V) communication is a part of the future vehicular network. As the location information of vehicles is broadcasted frequently, there is a demand on privacy protection on this information. In this thesis we defined the requirements on privacy-protection broadcast authentication schemes for V2V communication. We analyzed the existing authentication schemes according to the requirements. But the major contribution of this thesis is that we devised an authentication scheme CLIBA on the messages of vehicles, which is based on the CL-Idemix protocol suite. The scheme realizes attribute authentication to prevent privacy leakage of vehicles. We also evaluated CLIBA according to the requirements. It shows that CLIBA fulfills most of the requirements except that the performance is not quite satisfactory compared to the strict efficiency requirement of V2V communication.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

متن کامل

Enhancing privacy of recent authentication schemes for low-cost RFID systems

Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...

متن کامل

Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags

The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...

متن کامل

HMAC-Based Authentication Protocol: Attacks and Improvements

As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...

متن کامل

A Scalable Privacy-preserving Authentication Protocol for Secure Vehicular Communications

In this paper, we provide the first scalable privacy-preserving authentication protocol for VANETs without participation of the nearby RSU. Existing authentication methods for VANETs require the participation of the nearby RSUs. So, bottleneck problem can be occurred as increasing the number of vehicles. Also, the time delay to authenticate the nearby vehicle will increase. In order to minimize...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012