Secure and privacy-preserving, timed vehicular communications

نویسندگان

  • Mike Burmester
  • Emmanouil Magkos
  • Vassilios Chrissikopoulos
چکیده

We consider the problem of privacy (anonymity) and security in vehicular (V2V) communication, in particular securing routine safety messages. Traditional public key mechanisms are not appropriate for such applications because of the large number of safety messages that have to be transmitted by each vehicle, typically one message every 100−300ms. We first show that a recently proposed V2V communication scheme, the TSVC, based on the Time Efficient Stream Loss-tolerant Authentication (TESLA) scheme, is subject to an impersonation attack in which the adversary can distribute misleading safety information to vehicles, and propose a modification that secures it against such attacks. We then address general concerns regarding the inappropriateness of TESLA for vehicular applications (caused by the delayed authentication and buffer overflows), and propose a V2V communication scheme based on a variant of TESLA, TESLA, for which there is no delay and packets are self-authenticating. This is appropriate for applications in which vehicles are in close proximity. Finally we combine both schemes to get a hybrid communication scheme that addresses in a flexible way the mobility requirements of V2V communications.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

متن کامل

A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks

Privacy and security should be paid much more attention in secure vehicular ad hoc networks (VANETs). However, as far as we know, few researches on secure VANET protocols have addressed both the privacy issues and authenticated key establishment. Therefore, in this work, a lightweight authenticated key establishment scheme with privacy preservation to secure the communications between mobile ve...

متن کامل

APPA: Aggregate Privacy-Preserving Authentication in Vehicular Ad Hoc Networks

Most securityand privacy-preserving protocols in vehicular ad hoc networks (VANETs) heavily rely on time-consuming cryptographic operations which produce a huge volume of cryptographic data. These data are usually employed for many kinds of decisions, which poses the challenge of processing the received cryptographic data fast enough to avoid unaffordable reaction delay. To meet that challenge,...

متن کامل

Efficient and Spontaneous Privacy-Preserving Protocol for Secure Vehicular Communications

This paper introduces an efficient and spontaneous privacy-preserving protocol for vehicular ad-hoc networks based on revocable ring signature. The proposed protocol has three appealing characteristics: First, it offers conditional privacypreservation: while a receiver can verify that a message issuer is an authorized participant in the system only a trusted authority can reveal the true identi...

متن کامل

Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks

Secure aggregate signature schemes have attracted more concern due to their wide application in resource constrained environment. Recently, Horng et al. [S. J. Horng et al., An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks, Information Sciences 317 (2015) 48-66] proposed an efficient certificateless aggregate signature with condi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJAHUC

دوره 10  شماره 

صفحات  -

تاریخ انتشار 2012