About this Journal Submit a Manuscript Table of Contents
International Journal of Vehicular Technology
Volume 2009 (2009), Article ID 702346, 14 pages
http://dx.doi.org/10.1155/2009/702346
Research Article

Noninteractive, Anonymously Authenticated, and Traceable Message Transmission for VANETs

Department of Electronics, Communications and Computers, Faculty of Engineering, Helwan University, 1 Sherif Street, 11792 Helwan, Cairo, Egypt

Received 15 July 2009; Accepted 24 November 2009

Academic Editor: Kui Wu

Copyright © 2009 Maged Hamada Ibrahim. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. H. J. Miller and S.-L. Shaw, Geographic Information Systems for Transportation, Oxford University Press, Oxford, UK, 2009.
  2. http://www.standards.its.dot.gov/.
  3. Dedicated Short Range Communications (DSRC), http://www.leearmstrong.com/DSRC/DSRCHomeset.htm.
  4. R. Bishop, “A survey of intelligent vehicle applications worldwide,” in Proceedings of IEEE Intelligent Vehicles Symposium (IVS '00), pp. 25–30, Dearborn, Mich, USA, October 2000. View at Publisher · View at Google Scholar
  5. C. Schroth, M. Strassberger, R. Eigner, and S. Eichler, “A framework for network utility maximization in VANETs,” in Proceedings of the 3rd ACM International Workshop on Vehicular Ad Hoc Networks (VANET '06), pp. 86–87, Los Angeles, Calif, USA, September 2006. View at Publisher · View at Google Scholar · View at Scopus
  6. http://www.kvh.com/.
  7. http://trac-net.com/.
  8. J. Yin, T. Elbatt, G. Yeung, et al., “Performance evaluation of safety applications over DSRC vehicular ad hoc networks,” in Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks (VANET '04), pp. 1–9, Philadelphia, Pa, USA, October 2004. View at Publisher · View at Google Scholar
  9. T. Mak, K. Laberteaux, and R. Sengupta, “A multi-channel VANET providing concurrent safety and commercial services,” in Proceedings of the 2nd ACM International Workshop on Vehicular Ad Hoc Networks, pp. 1–9, Cologne, Germany, September 2005. View at Publisher · View at Google Scholar
  10. ITSA, DoT, “National intelligent transportation systems program plan: a ten-year vision,” Report, Intelligent Transportation Society of America and Departemnt of Transportation, Washington, DC, USA, January 2002, http://www.itsa.org/itsa/files/pdf/National10YearPlanITSFull.pdf.
  11. J.-P. Hubaux, S. Capkun, and J. Luo, “The security and privacy of smart vehicles,” IEEE Security and Privacy, vol. 2, no. 3, pp. 49–55, 2004. View at Publisher · View at Google Scholar
  12. M. Raya and J.-P. Hubaux, “The security of vehicular ad hoc networks,” in Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 11–21, Alexandria, Va, USA, November 2005. View at Publisher · View at Google Scholar
  13. X. Sun, X. Lin, and P.-H. Ho, “Secure vehicular communications based on group signature and id-based signature scheme,” in Proceedings of IEEE International Conference on Communications (ICC '07), pp. 1539–1545, Glasgow, UK, June 2007. View at Publisher · View at Google Scholar
  14. G. Calandriello, P. Papadimitratos, A. Lioy, and J.-P. Hubaux, “Efficient and robust pseudonymous authentication in VANET,” in Proceedings of the 4th ACM International Workshop on Vehicular Ad Hoc Networks, in Conjunction with the 13th Annual International Conference on Mobile Computing and Networking (MobiCom '07), pp. 19–28, Montreal, Canada, September 2007. View at Publisher · View at Google Scholar
  15. F. Dötzer, “Privacy issues in vehicular ad hoc networks,” in Proceedings of the 5th International Workshop on Privacy Enhancing Technologies (PET '05), vol. 3856 of Lecture Notes in Computer Science, pp. 197–209, Cavtat, Croatia, May-June 2005. View at Publisher · View at Google Scholar
  16. J. Choi, M. Jakobsson, and S. Wetzel, “Balancing auditability and privacy in vehicular networks,” in Proceedings of the 1st ACM International Workshop on Quality of Service and Security in Wireless and Mobile Networks, pp. 79–87, Montreal, Canada, October 2005. View at Publisher · View at Google Scholar
  17. K. Sampigethaya, L. Huang, M. Li, R. Poovendran, K. Matsuura, and K. Sezaki, “CARAVAN: providing location privacy for VANET,” in Proceedings of Embedded Security in Cars (ESCAR '05), Cologne, Germany, November 2005.
  18. X. Lin, X. Sun, P.-H. Ho, and X. Shen, “GSIS: a secure and privacy-preserving protocol for vehicular communications,” IEEE Transactions on Vehicular Technology, vol. 56, no. 6, pp. 3442–3456, 2007. View at Publisher · View at Google Scholar
  19. J. Guo, J. Baugh, and S. Wang, “A group signature based secure and privacy-preserving vehicular communication framework,” in Proceedings of the Mobile Networking for Vehicular Environments, in Conjunction with the 26th IEEE International Conference on Computer Communications (INFOCOM '07), pp. 103–108, Anchorage, Alaska, USA, May 2007. View at Publisher · View at Google Scholar
  20. E. Fonseca, A. Festag, R. Baldessari, and R. L. Aguiar, “Support of anonymity in VANETs—putting pseudonymity into practice,” in Proceedings of IEEE Wireless Communications and Networking Conference (WCNC '07), pp. 3400–3405, Hong Kong, March 2007. View at Publisher · View at Google Scholar
  21. Y. Xi, K.-W. Sha, W.-S. Shi, L. Schwiebert, and T. Zhang, “Probabilistic adaptive anonymous authentication in vehicular networks,” Journal of Computer Science & Technology, vol. 23, no. 6, pp. 916–928, 2008. View at Publisher · View at Google Scholar
  22. M. Manulis, “Democratic group signatures: on an example of joint ventures,” in Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS '06), p. 365, Taipei, Taiwan, March 2006. View at Publisher · View at Google Scholar
  23. M. Manulis, A.-R. Sadeghi, and J. Schwenk, “Linkable democratic group signatures,” in Proceedings of the 2nd International Conference on Information Security Practice and Experience (ISPEC '06), vol. 3903 of Lecture Notes in Computer Science, pp. 187–201, Hangzhou, China, April 2006. View at Publisher · View at Google Scholar
  24. M. H. Ibrahim, “Resisting traitors in linkable democratic group signatures,” International Journal of Network Security, vol. 9, no. 1, pp. 51–60, 2009.
  25. M. H. Ibrahim, “Eliminating quadratic slowdown in two-prime RSA function sharing,” International Journal of Network Security, vol. 7, no. 1, pp. 106–113, 2008.
  26. M. H. Ibrahim, “Efficient dealer-less threshold sharing of standard RSA,” International Journal of Network Security, vol. 8, no. 2, pp. 139–150, 2009.
  27. M. H. Ibrahim, I. I. Ibrahim, I. A. Ali, and A. H. El-Sawy, “Fast fully distributed and threshold RSA function sharing,” in Proceedings of Information Systems: New Generation Conference (ISNG '04), pp. 11–15, Las Vegas, Nev, USA, November 2004.
  28. M. H. Ibrahim, I. I. Ibrahim, and A. H. El-Sawy, “Fast three party shared generation of RSA keys without distributed primality test,” in Proceedings of Information Systems: New Generation Conference (ISNG '04), pp. 5–10, Las Vegas, Nev, USA, November 2004.
  29. R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin, “Robust threshold DSS signatures,” Information and Computation, vol. 164, no. 1, pp. 54–84, 2001. View at Publisher · View at Google Scholar · View at MathSciNet
  30. R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin, “Secure distributed key generation for discrete-log based cryptosystems,” Journal of Cryptology, vol. 20, no. 1, pp. 51–83, 2007. View at Publisher · View at Google Scholar · View at MathSciNet
  31. http://www.onion-router.net/.
  32. M. G. Reed, P. F. Syverson, and D. M. Goldschlag, “Proxies for anonymous routing,” in Proceedings of the 12th Annual Computer Security Applications Conference (CSAC '96), pp. 95–104, San Diego, Calif, USA, December 1996. View at Publisher · View at Google Scholar
  33. D. L. Chaum, “Untraceable electronic mail, return addresses, and digital pseudonyms,” Communications of the ACM, vol. 24, no. 2, pp. 84–88, 1981. View at Publisher · View at Google Scholar
  34. R.L. Rivest, A. Shamir, and Y. Tauman, “How to leak a secret,” in Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT '01), vol. 2248 of Lecture Notes in Computer Science, pp. 552–565, Springer, Gold Coast, Australia, December 2001.
  35. J. K. Liu, V. K. Wei, and D. S. Wong, “Linkable spontaneous anonymous group signature for ad hoc groups,” in Proceedings of the 9th Australasian Conference on Information Security and Privacy (ACISP '04), vol. 3108 of Lecture Notes in Computer Science, pp. 325–335, Springer, Sydney, Australia, July 2004. View at Publisher · View at Google Scholar
  36. A. Bender, J. Katz, and R. Morselli, “Ring signatures: stronger definitions, and constructions without random oracles,” in Proceedings of the 3rd Theory of Cryptography Conference, vol. 3876 of Lecture Notes in Computer Science, pp. 60–79, Springer, New York, NY, USA, March 2006. View at Publisher · View at Google Scholar
  37. A. Shamir, “How to share a secret,” Communications of the ACM, vol. 22, no. 11, pp. 612–613, 1979. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  38. P. Feldman, “A practical scheme for non-interactive verifiable secret sharing,” in Proceedings of the 28th Annual Symposium on the Foundations of Computer Science (SFCS '87), pp. 427–437, IEEE, Los Angeles, Calif, USA, October 1987. View at Publisher · View at Google Scholar
  39. T. Pedersen, “Non-interactive and information theoretic secure verifiable secret sharing,” in Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology (Crypto '92), J. Feigenbaum, Ed., vol. 576 of Lecture Notes in Computer Science, pp. 129–140, Springer, Santa Barbara, Calif, USA, August 1992. View at Publisher · View at Google Scholar
  40. I. Ingemarsson and G. J. Simmons, “A protocol to set up shared secret schemes without the assistance of mutually trusted party,” in Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology (EUROCRYPT '90), I. B. Damgard, Ed., vol. 473 of Lecture Notes in Computer Science, pp. 266–282, Springer, Aarhus, Denmark, 1990. View at Publisher · View at Google Scholar
  41. A. Wigderson, M. B. Or, and S. Goldwasser, “Completeness theorems for noncryptographic fault-tolerant distributed computations,” in Proceedings of the 20th Annual Symposium on the Theory of Computing (STOC '88), pp. 1–10, ACM, Chicago, Ill, USA, May 1988.
  42. C. P. Schnorr, “Efficient signature generation by smart cards,” Journal of Cryptology, vol. 4, no. 3, pp. 161–174, 1991. View at Publisher · View at Google Scholar · View at Scopus
  43. E. D. Chaum and T. P. Pedersen, “Wallet databases with observers,” in Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology (Crypto '92), vol. 740 of Lecture Notes in Computer Science, pp. 89–105, Santa Barbara, Calif, USA, August 1992. View at Publisher · View at Google Scholar
  44. T. El Gamal, “A public key cryptosystem and a signature scheme based on discrete logarithms,” in Proceedings of Advances in Cryptology (Crypto '84), vol. 196 of Lecture Notes in Computer Science, pp. 10–18, Paris, France, April 1984. View at Publisher · View at Google Scholar
  45. B. Barak, R. Canetti, Y. Lindell, R. Pass, and T. Rabin, “Secure computation without authentication,” in Proceedings of the 25th Annual International Cryptology Conference on Advances in Cryptology (Crypto '05), vol. 3621 of Lecture Notes in Computer Science, pp. 361–377, Santa Barbara, Calif, USA, August 2005. View at Publisher · View at Google Scholar
  46. A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung, “Proactive secret sharing or: how to cope with perpetual leakage,” in Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology (Crypto '95), vol. 963 of Lecture Notes in Computer Science, pp. 339–352, Santa Barbara, Calif, USA, August 1995. View at Publisher · View at Google Scholar
  47. M. Bellare and S. Miner, “A forward-secure digital signature scheme,” in Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology (Crypto '99), M. Wiener, Ed., vol. 1666 of Lecture Notes in Computer Science, pp. 431–448, Springer, Santa Barbara, Calif, USA, August 1999. View at Publisher · View at Google Scholar
  48. R. Canetti, S. Halevi, and J. Katz, “A forward-secure public-key encryption scheme,” in Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT '03), E. Biham, Ed., vol. 2656 of Lecture Notes in Computer Science, p. 646, Springer, Warsaw, Poland, May 2003. View at Publisher · View at Google Scholar