Skip to main content
Erschienen in: Mobile Networks and Applications 1/2010

01.02.2010

REP: Location Privacy for VANETs Using Random Encryption Periods

verfasst von: Albert Wasef, Xuemin (Sherman) Shen

Erschienen in: Mobile Networks and Applications | Ausgabe 1/2010

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

It is well recognized that security is vital for reliable operation of vehicular ad-hoc networks (VANETs). Location privacy is one of the main security challenges in VANETs, which is concerned with preventing an attacker from tracking a specific vehicle. In this paper, we propose a novel location privacy preservation scheme for VANETs using random encryption periods (REP). REP is based on a privacy preserving group communication protocol, which has a conditional full statelessness property. In addition, REP ensures that the requirements to track a vehicle are always violated. By conducting detailed analysis and simulation, REP is demonstrated to be reliable, efficient, and scalable.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Literatur
1.
Zurück zum Zitat Raya M, Hubaux J-P (2005) The security of vehicular ad hoc networks. In: Proceedings of the 3rd ACM workshop on security of ad hoc and sensor networks, pp 11–21 Raya M, Hubaux J-P (2005) The security of vehicular ad hoc networks. In: Proceedings of the 3rd ACM workshop on security of ad hoc and sensor networks, pp 11–21
2.
Zurück zum Zitat Dötzer F (2006) Privacy issues in vehicular ad hoc networks. In: Proceedings of the 2nd ACM workshop on vehicular ad hoc networks Dötzer F (2006) Privacy issues in vehicular ad hoc networks. In: Proceedings of the 2nd ACM workshop on vehicular ad hoc networks
3.
Zurück zum Zitat Papadimitratos P, Kung A, Hubaux J-P, Kargl F (2006) Privacy and identity management for vehicular communication systems: a position paper. In: Proceedings of the workshop on standards for privacy in user-centric identity management, Zurich Papadimitratos P, Kung A, Hubaux J-P, Kargl F (2006) Privacy and identity management for vehicular communication systems: a position paper. In: Proceedings of the workshop on standards for privacy in user-centric identity management, Zurich
4.
Zurück zum Zitat Choi J, Jakobsson M, Wetzel S (2005) Balancing auditability and privacy in vehicular networks. In: Proceedings of the 1st ACM international workshop on quality of service and security in wireless and mobile networks, pp 79–87 Choi J, Jakobsson M, Wetzel S (2005) Balancing auditability and privacy in vehicular networks. In: Proceedings of the 1st ACM international workshop on quality of service and security in wireless and mobile networks, pp 79–87
5.
Zurück zum Zitat Sha K, Xi Y, Shi W, Schwiebert L, Zhang T (2006) Adaptive privacy-preserving authentication in vehicular networks. In: Proceedings of the ChinaCom ’06, pp 1–8 Sha K, Xi Y, Shi W, Schwiebert L, Zhang T (2006) Adaptive privacy-preserving authentication in vehicular networks. In: Proceedings of the ChinaCom ’06, pp 1–8
6.
Zurück zum Zitat Sampigethaya K, Huang L, Li M, Poovendran R, Matsuura K, Sezaki K (2005) CARAVAN: providing location privacy for VANET. In: Proceedings of the embedded security in cars (ESCAR) Sampigethaya K, Huang L, Li M, Poovendran R, Matsuura K, Sezaki K (2005) CARAVAN: providing location privacy for VANET. In: Proceedings of the embedded security in cars (ESCAR)
7.
Zurück zum Zitat Lin X, Sun X, Ho P-H, Shen X (2007) GSIS: a secure and privacy-preserving protocol for vehicular communications. IEEE Trans Veh Technol 56:3442–3456CrossRef Lin X, Sun X, Ho P-H, Shen X (2007) GSIS: a secure and privacy-preserving protocol for vehicular communications. IEEE Trans Veh Technol 56:3442–3456CrossRef
9.
Zurück zum Zitat Freudiger J, Raya M (2007) Mix-zones for location privacy in vehicular networks. In: Proceedings of the WiN-ITS Freudiger J, Raya M (2007) Mix-zones for location privacy in vehicular networks. In: Proceedings of the WiN-ITS
10.
Zurück zum Zitat Kaya T, Lin G, Noubir G, Yilmaz A (2003) Secure multicast groups on ad hoc networks. In: Proceedings of the 1st ACM workshop on security of ad hoc and sensor networks, pp 94–102 Kaya T, Lin G, Noubir G, Yilmaz A (2003) Secure multicast groups on ad hoc networks. In: Proceedings of the 1st ACM workshop on security of ad hoc and sensor networks, pp 94–102
11.
Zurück zum Zitat Chiang T-C, Huang Y-M (2003) Group keys and the multicast security in ad hoc networks. In: Proceedings of the international conference on parallel processing workshops, pp 385–390 Chiang T-C, Huang Y-M (2003) Group keys and the multicast security in ad hoc networks. In: Proceedings of the international conference on parallel processing workshops, pp 385–390
12.
Zurück zum Zitat Steiner M, Tsudik G, Waidner M (1996) Diffie-Hellman key distribution extended to group communication. In: Proceedings of the 3rd ACM conference on computer and communications security, pp 31–37 Steiner M, Tsudik G, Waidner M (1996) Diffie-Hellman key distribution extended to group communication. In: Proceedings of the 3rd ACM conference on computer and communications security, pp 31–37
13.
Zurück zum Zitat Chan H, Perrig A, Song D (2003) Random key predistribution schemes for sensor networks. In: Proceedings of the 2003 IEEE symposium on security and privacy, pp 197–213 Chan H, Perrig A, Song D (2003) Random key predistribution schemes for sensor networks. In: Proceedings of the 2003 IEEE symposium on security and privacy, pp 197–213
14.
Zurück zum Zitat Eschenauer L, Gligor V-D (2002) A key-management scheme for distributed sensor networks. In: Proceedings of the ACM conference on computer and communications security, pp 41–47 Eschenauer L, Gligor V-D (2002) A key-management scheme for distributed sensor networks. In: Proceedings of the ACM conference on computer and communications security, pp 41–47
15.
Zurück zum Zitat Zhu S, Xu S, Setia S, Jajodia S (2003) Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach. In: Proceedings of the 11th IEEE international conference on network protocols, pp 326–335 Zhu S, Xu S, Setia S, Jajodia S (2003) Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach. In: Proceedings of the 11th IEEE international conference on network protocols, pp 326–335
16.
Zurück zum Zitat Zhu S, Setia S, Xu S, Jajodia S (2006) GKMPAN: an efficient group rekeying scheme for secure multicast in ad-hoc networks. J Comput Secur 14:301–325 Zhu S, Setia S, Xu S, Jajodia S (2006) GKMPAN: an efficient group rekeying scheme for secure multicast in ad-hoc networks. J Comput Secur 14:301–325
17.
Zurück zum Zitat Wasef A, Jiang Y, Shen X (2008) ECMV: efficient certificate management scheme for vehicular networks. In: Proceedings of the IEEE GLOBECOM 2008 Wasef A, Jiang Y, Shen X (2008) ECMV: efficient certificate management scheme for vehicular networks. In: Proceedings of the IEEE GLOBECOM 2008
18.
Zurück zum Zitat Pfitzmann A, KÄhntopp M (2001) Anonymity, unobservability, and pseudonymity- a proposal for terminology. In: Designing privacy enhancing technologies, pp 1–9 Pfitzmann A, KÄhntopp M (2001) Anonymity, unobservability, and pseudonymity- a proposal for terminology. In: Designing privacy enhancing technologies, pp 1–9
20.
Zurück zum Zitat Jiang Y, Lin C, Shi M, Shen X (2006) Multiple key sharing and distribution scheme with (n,t) threshold for NEMO group communications. IEEE J Sel Areas Commun 24(9):1738–1747CrossRef Jiang Y, Lin C, Shi M, Shen X (2006) Multiple key sharing and distribution scheme with (n,t) threshold for NEMO group communications. IEEE J Sel Areas Commun 24(9):1738–1747CrossRef
21.
Zurück zum Zitat Lu R, Lin X, Zhu H, Ho P-H, Shen X (2008) ECPP: efficient conditional privacy preservation protocol for secure vehicular communications. In: Proceedings of the INFOCOM 2008, pp 1229–1237 Lu R, Lin X, Zhu H, Ho P-H, Shen X (2008) ECPP: efficient conditional privacy preservation protocol for secure vehicular communications. In: Proceedings of the INFOCOM 2008, pp 1229–1237
Metadaten
Titel
REP: Location Privacy for VANETs Using Random Encryption Periods
verfasst von
Albert Wasef
Xuemin (Sherman) Shen
Publikationsdatum
01.02.2010
Verlag
Springer US
Erschienen in
Mobile Networks and Applications / Ausgabe 1/2010
Print ISSN: 1383-469X
Elektronische ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-009-0175-4

Weitere Artikel der Ausgabe 1/2010

Mobile Networks and Applications 1/2010 Zur Ausgabe

Neuer Inhalt