Skip to main content
Erschienen in: Wireless Personal Communications 2/2017

23.11.2016

Privacy Preserving Dynamic Pseudonym-Based Multiple Mix-Zones Authentication Protocol over Road Networks

verfasst von: Qasim Ali Arain, Deng Zhongliang, Imran Memon, Salman Arain, Faisal Kareem Shaikh, Asma Zubedi, Mukhtiar Ali Unar, Aisha Ashraf, Roshan Shaikh

Erschienen in: Wireless Personal Communications | Ausgabe 2/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, we propose an efficient dynamic pseudonymous based multiple mix-zones authentication protocol for privacy preservation to enhance security over road networks. Most of the existing protocols either utilize pseudonym based approaches with certificate revocation list that cause significant communicational and storage overhead or they use group signature based approaches, which are computationally expensive. In this paper, we present a dynamic pseudonymous based multiple mix-zones authentication protocol that only requires mobile vehicles to communicate with reported server for registration and dynamic pseudonym change. Furthermore, we formulate a mechanism to provide users with dynamic pseudonyms named as; base pseudonyms and short time pseudonyms, to achieve users’ privacy. Finally, we analyze our protocol by determining the communication cost as well as various attack scenarios to prove that our approach is most efficient and robust as compared to existing techniques.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Memon, I. (2015). Authentication user’s privacy: An integrating location privacy protection algorithm for secure moving objects in location based services. Wireless Personal Communications, 82, 1585–1600.CrossRef Memon, I. (2015). Authentication user’s privacy: An integrating location privacy protection algorithm for secure moving objects in location based services. Wireless Personal Communications, 82, 1585–1600.CrossRef
2.
Zurück zum Zitat Memon, I., Hussain, I., Akhtar, R., & Chen, G. (2015). Enhanced privacy and authentication: An efficient and secure anonymous communication for location based service using asymmetric cryptography scheme. Wireless Personal Communications, 84(2), 1487–1508.CrossRef Memon, I., Hussain, I., Akhtar, R., & Chen, G. (2015). Enhanced privacy and authentication: An efficient and secure anonymous communication for location based service using asymmetric cryptography scheme. Wireless Personal Communications, 84(2), 1487–1508.CrossRef
3.
Zurück zum Zitat Horng, S.-J., Tzeng, S.-F., Pan, Y., Fan, P., Wang, X., Li, T., et al. (2013). b-SPECS+: Batch verification for secure pseudonymous authentication in VANET. IEEE Transactions on Information Forensics and Security, 8(11), 1860.CrossRef Horng, S.-J., Tzeng, S.-F., Pan, Y., Fan, P., Wang, X., Li, T., et al. (2013). b-SPECS+: Batch verification for secure pseudonymous authentication in VANET. IEEE Transactions on Information Forensics and Security, 8(11), 1860.CrossRef
4.
5.
Zurück zum Zitat IEEE Trial-Use Standard for Wireless Access in Vehicular Environments Security Services for Applications and Management Messages, IEEE Standard 1609.2 (2006). IEEE Trial-Use Standard for Wireless Access in Vehicular Environments Security Services for Applications and Management Messages, IEEE Standard 1609.2 (2006).
6.
Zurück zum Zitat Ghaleb, F. A., Razzaque, M. A., & FauziIsnin, I. (2013). Security and privacy enhancement in VANETs using mobility pattern. In Fifth international conference on ubiquitous and future networks (ICUFN) (pp. 184–189) (ISSN: 2165-8528). Ghaleb, F. A., Razzaque, M. A., & FauziIsnin, I. (2013). Security and privacy enhancement in VANETs using mobility pattern. In Fifth international conference on ubiquitous and future networks (ICUFN) (pp. 184–189) (ISSN: 2165-8528).
7.
Zurück zum Zitat Liu, Y., Wang, L., & Chen, H.-H. (2015). Message authentication using proxy vehicles in vehicular ad Hoc networks. IEEE Transactions on Vehicular Technology, 64(8), 3697–3710.CrossRef Liu, Y., Wang, L., & Chen, H.-H. (2015). Message authentication using proxy vehicles in vehicular ad Hoc networks. IEEE Transactions on Vehicular Technology, 64(8), 3697–3710.CrossRef
8.
9.
Zurück zum Zitat Memon, M. H., Li, J.-P., Memon, I., & Arain, Q. A. (2016). GEO matching regions: Multiple regions of interests using content based image retrieval based on relative locations. Multimedia Tools and Applications. doi:10.1007/s11042-016-3834-z. Memon, M. H., Li, J.-P., Memon, I., & Arain, Q. A. (2016). GEO matching regions: Multiple regions of interests using content based image retrieval based on relative locations. Multimedia Tools and Applications. doi:10.​1007/​s11042-016-3834-z.
10.
Zurück zum Zitat Chim, T. W., Yiu, S. M., Hui, C. K., & Li, O. K. (2014). VSPN: VANET-based secure and privacy-preserving navigation. IEEE Transactions on Computers, 63(2), 510–524.MathSciNetCrossRef Chim, T. W., Yiu, S. M., Hui, C. K., & Li, O. K. (2014). VSPN: VANET-based secure and privacy-preserving navigation. IEEE Transactions on Computers, 63(2), 510–524.MathSciNetCrossRef
11.
Zurück zum Zitat Memon, I. (2015). A secure and efficient communication scheme with authenticated key establishment protocol for road networks. Wireless Personal Communications, 85(3), 1167–1191. doi:10.1007/s11277-015-2833-0.CrossRef Memon, I. (2015). A secure and efficient communication scheme with authenticated key establishment protocol for road networks. Wireless Personal Communications, 85(3), 1167–1191. doi:10.​1007/​s11277-015-2833-0.CrossRef
12.
Zurück zum Zitat Memon, I., Chen, L., Majid, A., Lv, M., Hussain, I., & Chen, G. (2015). Travel recommendation using geo-tagged photos in social media for tourist. Wireless Personal Communications: An International Journal, 80(4), 1347–1362.CrossRef Memon, I., Chen, L., Majid, A., Lv, M., Hussain, I., & Chen, G. (2015). Travel recommendation using geo-tagged photos in social media for tourist. Wireless Personal Communications: An International Journal, 80(4), 1347–1362.CrossRef
13.
Zurück zum Zitat Memon, I., Mohammed, M. R., Akhtar, R., Memon, H., & Hammad, M. (2014). Design and implementation to authentication over a GSM system using certificate-less public key cryptography (CL-PKC). Wireless Personal Communications: An International Journal, 79(1), 661–686.CrossRef Memon, I., Mohammed, M. R., Akhtar, R., Memon, H., & Hammad, M. (2014). Design and implementation to authentication over a GSM system using certificate-less public key cryptography (CL-PKC). Wireless Personal Communications: An International Journal, 79(1), 661–686.CrossRef
14.
Zurück zum Zitat Akhtar, R., Leng, S., Memon, I., Ali, M., & Zhang, L. (2015). Architecture of hybrid mobile social networks for efficient content delivery. Wireless Personal Communications: An International Journal, 80(1), 85–96.CrossRef Akhtar, R., Leng, S., Memon, I., Ali, M., & Zhang, L. (2015). Architecture of hybrid mobile social networks for efficient content delivery. Wireless Personal Communications: An International Journal, 80(1), 85–96.CrossRef
15.
Zurück zum Zitat Kamenyi, D. M., Wang, Y., Fengli, Z., Imran, M., & Gustav, Y. H. (2013). Authenticated privacy preserving for continuous query in location based services. Journal of Computational Information Systems, 9(24), 9857–9864. Kamenyi, D. M., Wang, Y., Fengli, Z., Imran, M., & Gustav, Y. H. (2013). Authenticated privacy preserving for continuous query in location based services. Journal of Computational Information Systems, 9(24), 9857–9864.
16.
Zurück zum Zitat Memon, I., Jamro, D. L., Mangi, F. A., Basit, M. A., Memon, M. H. (2013). Source localization wireless sensor network using time difference of arrivals (TDOA). International Journal of Scientific and Engineering Research, 4(7), 1046–1054. Memon, I., Jamro, D. L., Mangi, F. A., Basit, M. A., Memon, M. H. (2013). Source localization wireless sensor network using time difference of arrivals (TDOA). International Journal of Scientific and Engineering Research, 4(7), 1046–1054.
17.
Zurück zum Zitat Domenic, K.,Wang, Y., Zhang, F., Memon, I., Gustav, Y. (2013). Preserving users’ privacy for continuous query services in road networks. In 2013 the 6th IEEE International Conference on Information Management, Innovation Management and Industrial Engineering (ICIII2013) (pp. 352–355). Xi’an. Domenic, K.,Wang, Y., Zhang, F., Memon, I., Gustav, Y. (2013). Preserving users’ privacy for continuous query services in road networks. In 2013 the 6th IEEE International Conference on Information Management, Innovation Management and Industrial Engineering (ICIII2013) (pp. 352–355). Xi’an.
18.
Zurück zum Zitat Gustav, Y., Wang, Y., Zhang, F., Domenic, K. M., Memon, I. (2013). Direction and velocity similarity anonymization in continuous query location based services. In 4th International Conference on Computational Problem-Solving (ICCP 2013), Jiuzhai. Gustav, Y., Wang, Y., Zhang, F., Domenic, K. M., Memon, I. (2013). Direction and velocity similarity anonymization in continuous query location based services. In 4th International Conference on Computational Problem-Solving (ICCP 2013), Jiuzhai.
Metadaten
Titel
Privacy Preserving Dynamic Pseudonym-Based Multiple Mix-Zones Authentication Protocol over Road Networks
verfasst von
Qasim Ali Arain
Deng Zhongliang
Imran Memon
Salman Arain
Faisal Kareem Shaikh
Asma Zubedi
Mukhtiar Ali Unar
Aisha Ashraf
Roshan Shaikh
Publikationsdatum
23.11.2016
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2017
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-016-3906-4

Weitere Artikel der Ausgabe 2/2017

Wireless Personal Communications 2/2017 Zur Ausgabe