Table of Contents
International Journal of Vehicular Technology
Volume 2012 (2012), Article ID 862368, 8 pages
http://dx.doi.org/10.1155/2012/862368
Research Article

Efficient Noninteractive Secure Protocol Enforcing Privacy in Vehicle-to-Roadside Communication Networks

Department of Electronics, Communications and Computers, Faculty of Engineering, Helwan University, 1 Sherif Street, Helwan 11792, Egypt

Received 16 June 2012; Accepted 17 October 2012

Academic Editor: Cheng-Min Lin

Copyright © 2012 Fatty M. Salem et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. F. M. Salem, M. H. Ibrahim, and I. I. Ibrahim, “Non-interactive authentication scheme providing privacy among drivers in vehicle-to-vehicle networks,” in Proceedings of the 6th International Conference on Networking and Services (ICNS '10), pp. 156–161, Cancun, Mexico, March 2010. View at Publisher · View at Google Scholar · View at Scopus
  2. F. M. Salem, M. H. Ibrahim, and I. I. Ibrahim, “Non-interactive secure and privacy preserving protocol for inter-vehicle communication networks,” in Proceedings of the 7th International Conference on Information Technology—New Generations (ITNG '10), pp. 108–113, Las Vegas, Nev, USA, April 2010. View at Publisher · View at Google Scholar · View at Scopus
  3. J. Blum and A. Eskandarian, “The threat of intelligent collisions,” IT Professional, vol. 6, no. 1, pp. 24–29, 2004. View at Publisher · View at Google Scholar · View at Scopus
  4. B. Parno and A. Perrig, “Challenges in securing vehicular networks,” in Proceedings of the Workshop on Hot Topics in Networks (HotNets-IV '05), 2005.
  5. P. Papadimitratos, V. Gligor, and J. P. Hubaux, “Securing vehicular communications—assumptions, requirements, and principles,” in Proceedings of the Workshop on Embedded Security in Cars (ESCAR ’06), 2006.
  6. M. Gerlach, “VaneSe—an approach to VANET security,” in Proceedings of the Vehicle-to-Vehicle Communications (V2VCOM '05), 2005.
  7. M. Jakobsson and S. Wetzel, “Efficient attribute authentication with applications to ad hoc networks,” in Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks (VANET '04), pp. 38–46, October 2004. View at Scopus
  8. M. Raya, P. Papadimitratos, and J. P. Hubaux, “Securing vehicular communications,” IEEE Wireless Communications, vol. 13, no. 5, pp. 8–15, 2006. View at Publisher · View at Google Scholar · View at Scopus
  9. M. E. Zarki, S. Mehrotra, G. Tsudik, and N. Venkatasubramanian, “Security issues in a future vehicular network,” in Proceedings of the European Wireless, 2002.
  10. B. Askwith, M. Merabti, Q. Shi, and K. Whiteley, “Achieving user privacy in mobile networks,” in Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC '97), pp. 108–116, December 1997. View at Scopus
  11. D. Samfat and R. Molva, “A method providing identity privacy to mobile users during authentication,” in Proceedings of the Workshop on Mobile Computing Systems and Applications, pp. 196–199, December 1994. View at Scopus
  12. J. Zhu and J. Ma, “A new authentication scheme with anonymity for wireless environments,” IEEE Transactions on Consumer Electronics, vol. 50, no. 1, pp. 231–235, 2004. View at Publisher · View at Google Scholar · View at Scopus
  13. K. Sampigethaya, L. Huang, M. Li, R. Poovendran, K. Matsuura, and K. Sezaki, “CARAVAN: providing location privacy for VANET,” in Proceedings of the Conference on Embedded Security in Cars (ESCAR '05), 2005.
  14. M. Raya and J. P. Hubaux, “Securing vehicular ad hoc networks,” Journal of Computer Security, vol. 15, no. 1, pp. 39–68, 2007. View at Google Scholar · View at Scopus
  15. X. Lin, X. Sun, P. H. Ho, and X. Shen, “GSIS: a secure and privacy-preserving protocol for vehicular communications,” IEEE Transactions on Vehicular Technology, vol. 56, no. 6, pp. 3442–3456, 2007. View at Publisher · View at Google Scholar · View at Scopus
  16. C. T. Li, M. S. Hwang, and Y. P. Chu, “A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks,” Computer Communications, vol. 31, no. 12, pp. 2803–2814, 2008. View at Publisher · View at Google Scholar · View at Scopus
  17. J. -S. Chou and Y. Chen, “A secure anonymous communication scheme in vehicular ad hoc networks from pairings,” http://eprint.iacr.org/2010/028.pdf.
  18. M. H. Ibrahim, “Noninteractive, anonymously authenticated, and traceable message transmission for VANETs,” International Journal of Vehicular Technology, vol. 2009, Article ID 702346, 14 pages, 2009. View at Google Scholar
  19. M. H. Ibrahim, “Resisting traitors in linkable democratic group signatures,” International Journal of Network Security, vol. 9, no. 1, pp. 51–60, 2009. View at Google Scholar
  20. P. Wex, J. Breuer, A. Held, T. Leinmüller, and L. Delgrossi, “Trust issues for vehicular ad hoc networks,” in Proceedings of the IEEE 67th Vehicular Technology Conference-Spring (VTC '08), pp. 2800–2804, May 2008. View at Publisher · View at Google Scholar · View at Scopus
  21. F. Doetzer, “Privacy issues in vehicular ad hoc networks,” in Proceedings of the 5th international conference on Privacy Enhancing Technologies (PET '05), Lecture Notes in Computer Science, pp. 197–209, 2005.
  22. P. Golle, D. Greene, and J. Staddon, “Detecting and correcting malicious data in VANETs,” in Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks (VANET '04), pp. 29–37, New York, NY, USA, October 2004. View at Scopus
  23. G. Calandriello, P. Papadimitratos, A. Lioy, and J. P. Hubaux, “Efficient and robust pseudonymous authentication in VANET,” in Proceedings of the 4th ACM International Workshop on Vehicular Ad Hoc Networks (VANET'07) in conjunction with ACM MobiCom, pp. 19–28, September 2007. View at Publisher · View at Google Scholar · View at Scopus
  24. Y. Xi, K. Sha, W. Shi, L. Schwiebert, and T. Zhang, “Enforcing privacy using symmetric random key-set in vehicular networks,” in Proceedings of the 8th International Symposium on Autonomous Decentralized Systems (ISADS '07), pp. 344–351, March 2007. View at Publisher · View at Google Scholar · View at Scopus
  25. C. A. Nataraj, “Problems and their solutions when using GPAS based on VANETs,” in Proceedings of the International Conference on Information and Computer Networks (ICICN '12), 2012.
  26. B. Qin, Q. Wu, J. Domingo-Ferrer, and L. Zhang, “Preserving security and privacy in large-scale,” in Proceedings of the 13th International Conference on Information and Communications Security (ICICS '11), pp. 121–135, 2011.
  27. S. -B. Lee, J. -S. Park, M. Gerla, and S. Lu, “Secure incentives for commercial ad dissemination in vehicular networks,” Transactions on Vehicular Technology, vol. 61, no. 6, pp. 2715–2728, 2012. View at Google Scholar
  28. H. K. Choi, I. H. Kim, and J. C. Yoo, “Secure and efficient protocol for vehicular ad hoc network with privacy preservation,” Eurasip Journal on Wireless Communications and Networking, vol. 2011, Article ID 716794, 2011. View at Publisher · View at Google Scholar · View at Scopus
  29. Smart Card Alliance, http://www.smartcardalliance.org.
  30. R. Gennaro, A. Lysyanskaya, T. Malkin, S. Micali, and T. Rabin, “Algorithmic tamper-proof (ATP) security: theoretical foundations for security against hardware tampering,” in Proceedings of the Theory of Cryptography Conference (TCC '04), vol. 2951 of Lecture Notes in Computer Science, pp. 258–277, Berlin, Germany, 2004.
  31. FIPS PUB 140-1, Security Requirements for Cryptographic Modules, National Institute of Standards and Technology, U.S. Department of Commerce, 1994.
  32. Over-The-Air-Rekeying (OTAR) Protocol, New Technology Standards Project, Digital Radio Technical Standards, TSB-102.AACA, January 1996, Telecommunications Industry Association.
  33. P. Papadimitratos, L. Buttyan, J. P. Hubaux, F. Kargl, A. Kung, and M. Raya, “Architecture for secure and private vehicular communications,” in Proceedings of the 7th International Conference on Intelligent Transport Systems Telecommunications (ITST '07), pp. 339–344, June 2007. View at Publisher · View at Google Scholar · View at Scopus
  34. SafeNet Inc Data sheet for SafeXcel 1841 security co-processor.
  35. SafeNet Inc Data sheet for SafeXcel 1842 security co-processor.