Proceedings ArticleDOI
TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs
Ahren Studer,Elaine Shi,Fan Bai,Adrian Perrig +3 more
- pp 484-492
TLDR
This work proposes a VANET key management scheme based on Temporary Anonymous Certified Keys (TACKs), which efficiently prevents eavesdroppers from linking a vehicle's different keys and provides timely revocation of misbehaving participants while maintaining the same or less overhead for vehicle-to-vehicle communication as the current IEEE 1609.2 standard.Abstract:
Vehicular Ad Hoc Networks (VANETs) require a mechanism to help authenticate messages, identify valid vehicles, and remove malevolent vehicles. A Public Key Infrastructure (PKI) can provide this functionality using certificates and fixed public keys. However, fixed keys allow an eavesdropper to associate a key with a vehicle and a location, violating drivers' privacy. In this work we propose a VANET key management scheme based on Temporary Anonymous Certified Keys (TACKs). Our scheme efficiently prevents eavesdroppers from linking a vehicle's different keys and provides timely revocation of misbehaving participants while maintaining the same or less overhead for vehicle-to-vehicle communication as the current IEEE 1609.2 standard for VANET security.read more
Citations
More filters
Journal ArticleDOI
Pseudonym Schemes in Vehicular Networks: A Survey
TL;DR: This survey covers pseudonym schemes based on public key and identity-based cryptography, group signatures and symmetric authentication, and compares the different approaches, gives an overview of the current state of standardization, and identifies open research challenges.
Journal ArticleDOI
A Security and Privacy Review of VANETs
TL;DR: The general secure process and point out authentication methods involved in these processes involved in VANETs are presented and detailed survey of these authentication algorithms followed by discussions comes afterward.
Journal ArticleDOI
An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks
TL;DR: This paper proposes a security system for VANETs to achieve privacy desired by vehicles and traceability required by law enforcement authorities, in addition to satisfying fundamental security requirements including authentication, nonrepudiation, message integrity, and confidentiality.
Journal ArticleDOI
${\cal CPAS}$ : An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks
TL;DR: A conditional privacy-preserving authentication scheme, called CPAS, using pseudo-identity-based signatures for secure vehicle-to-infrastructure communications in vehicular ad hoc networks, and can be reduced by 18%, compared with the previous scheme.
Journal ArticleDOI
An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks Without Pairings
Nai-Wei Lo,Jia-Lun Tsai +1 more
TL;DR: This paper develops a new identity-based (ID-based) signature based on the elliptic curve cryptosystem (ECC) and proposes a novel conditional privacy-preserving authentication scheme based on this signature, which provides secure authentication process for messages transmitted between vehicles and RSUs.
References
More filters
Book ChapterDOI
The Sybil Attack
TL;DR: It is shown that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.
Journal ArticleDOI
Untraceable electronic mail, return addresses, and digital pseudonyms
TL;DR: A technique based on public key cryptography is presented that allows an electronic mail system to hide who a participant communicates with as well as the content of the communication - in spite of an unsecured underlying telecommunication system.
Book ChapterDOI
Short Group Signatures
TL;DR: In this article, the authors proposed a group signature scheme based on the Strong Diffie-Hellman assumption and a new assumption in bilinear groups called the Decision Linear assumption.
Proceedings Article
Group signatures
David Chaum,Eugène van Heyst +1 more
TL;DR: A new type of signature for a group of persons, called a group signature, which has the following properties: only members of the group can sign messages; and if necessary, the signature can be "opened", so that the person who signed the message is revealed.
Journal ArticleDOI
Securing vehicular ad hoc networks
Maxim Raya,Jean-Pierre Hubaux +1 more
TL;DR: This paper provides a set of security protocols, it is shown that they protect privacy and it is analyzed their robustness and efficiency, and describes some major design decisions still to be made.