Results 1 - 10
of
41
An Efficient Pseudonymous Authentication Scheme with Strong Privacy Preservation for Vehicular Communications
"... Abstract—In this paper, we propose an efficient pseudonymous authentication scheme with strong privacy preservation, named PASS, for vehicular communications. Unlike traditional pseudonymous authentication schemes, the size of Certificate Revocation List (CRL) in PASS is linear with the number of re ..."
Abstract
-
Cited by 35 (7 self)
- Add to MetaCart
(Show Context)
Abstract—In this paper, we propose an efficient pseudonymous authentication scheme with strong privacy preservation, named PASS, for vehicular communications. Unlike traditional pseudonymous authentication schemes, the size of Certificate Revocation List (CRL) in PASS is linear with the number of revoked vehicles and irrelated to how many pseudonymous certificates are held by the revoked vehicles. PASS supports Roadside Unitsaided distributed certificate service that allows the vehicles to update certificates on road, but the service overhead is almost irrelated to the number of the updated certificates. Furthermore, PASS provides strong privacy preservation to the vehicles so that the adversaries can not trace any vehicle even all Roadside Units have been compromised. Extensive simulations demonstrate that PASS outperforms previously reported ones in terms of the revocation cost and the certificate updating overhead. Index Terms—Vehicular communications, privacy preservation, anonymous authentication, revocation I.
A Dynamic Privacy-Preserving Key Management Scheme for Location Based Services in VANETs
"... Abstract—In this paper, for achieving vehicle user’s privacy preservation while improving key update efficiency of location based services (LBSs) in vehicular ad hoc networks (VANETs), we propose a dynamic privacy-preserving key management scheme, called DIKE. Specifically, in the proposed DIKE sche ..."
Abstract
-
Cited by 10 (5 self)
- Add to MetaCart
Abstract—In this paper, for achieving vehicle user’s privacy preservation while improving key update efficiency of location based services (LBSs) in vehicular ad hoc networks (VANETs), we propose a dynamic privacy-preserving key management scheme, called DIKE. Specifically, in the proposed DIKE scheme, we first introduce a privacy-preserving authentication technique which not only provides vehicle user’s anonymous authentication but also enables double-registration detection. We then present efficient LBS session key update procedures: i) we divide the session of a LBS into several time slots so that each time slot holds a different session key, when no vehicle user departs from the service session, each joined user can use one-way hash function to autonomously update the new session key for achieving forwardsecrecy; and ii) we also integrate a novel dynamic threshold technique in traditional V-2-V and V-2-I communications for achieving session key’s backward-secrecy, i.e., when a vehicle user departs from the service session, more than a threshold number of joined users can cooperatively update the new session key. Performance evaluations via extensive simulations demonstrate the efficiency and effectiveness of the proposed DIKE scheme in terms of low key update delay and fast key update ratio. Index Terms—VANETs, secure location based services, dynamic key management, privacy preserving I.
Communication requirements for crash avoidance
- In Proceedings of the seventh ACM international workshop on VehiculAr InterNETworking (2010), VANET ’10, ACM
"... ABSTRACT Safety applications are a driving force behind VANET deployment. Automobile manufacturers, government organizations, and consortia of the two have been investigating using VANETs for safety applications. Though VANETs are in large part designed for safety applications, researchers do not y ..."
Abstract
-
Cited by 10 (1 self)
- Add to MetaCart
(Show Context)
ABSTRACT Safety applications are a driving force behind VANET deployment. Automobile manufacturers, government organizations, and consortia of the two have been investigating using VANETs for safety applications. Though VANETs are in large part designed for safety applications, researchers do not yet know the communication requirements of VANET safety messages. As a result, protocol designers have relied on generic network success metrics, such as packet delivery ratio, to evaluate their protocols. However, a more useful metric is the ability of currently proposed VANET schemes (e.g., for authentication, power control, etc.) to allow vehicles to receive safety messages and warn their drivers sufficiently in advance of an accident so that the driver can avoid the accident. Besides the basic safety message service, researchers have proposed other VANET mechanisms and services including mix zones Previous attempts at answering the above questions have been made using small test beds without any collisions and using vehicle kinematics and message reception probabilities. However, each of these approaches lack the realism (i.e., actual crashes) and scale that VANETs will have. In this paper, we present our results from simulating two vehicular safety applications. We simulated crash scenarios and determined the probability that vehicles could avoid the crashes. Additionally, we measured the communication requirements needed for those probabilities.
SLOW: A Practical Pseudonym Changing Scheme for Location Privacy in VANETs
"... Abstract—Untraceability of vehicles is an important requirement in future vehicle communications systems. Unfortunately, heartbeat messages used by many safety applications provide a constant stream of location data, and without any protection measures, they make tracking of vehicles easy even for a ..."
Abstract
-
Cited by 6 (0 self)
- Add to MetaCart
(Show Context)
Abstract—Untraceability of vehicles is an important requirement in future vehicle communications systems. Unfortunately, heartbeat messages used by many safety applications provide a constant stream of location data, and without any protection measures, they make tracking of vehicles easy even for a passive eavesdropper. One commonly known solution is to transmit heartbeats under pseudonyms that are changed regularly in order to obfuscate the trajectory of vehicles. However, this approach is effective only if some silent period is kept during the pseudonym change and several vehicles change their pseudonyms nearly at the same time and at the same location. Unlike previous works that proposed explicit synchronization between a group of vehicles and/or required pseudonym change in a designated physical area (i.e., a static mix zone), we propose a much simpler approach that does not need any explicit cooperation between vehicles and any infrastructure support. Our basic idea is that vehicles should not transmit heartbeat messages when their speed drops below a given threshold, say 30 km/h, and they should change pseudonym during each such silent period. This ensures that vehicles stopping at traffic lights or moving slowly in a traffic jam will all refrain from transmitting heartbeats and change their pseudonyms nearly at the same time and location. Thus, our scheme ensures both silent periods and synchronized pseudonym change in time and space, but it does so in an implicit way. We also argue that the risk of a fatal accident at a slow speed is low, and therefore, our scheme does not seriously impact safetyof-life. In addition, refraining from sending heartbeat messages when moving at low speed also relieves vehicles of the burden of verifying a potentially large amount of digital signatures, and thus, makes it possible to implement vehicle communications with less expensive equipments. I.
Privacy Preservation over Untrusted Mobile Networks
"... Abstract. The proliferation of mobile devices has given rise to novel user-centric applications and services. In current mobile systems, users gain access to remote servers over mobile network operators. These operators are typically assumed to be trusted and to manage the information they collect i ..."
Abstract
-
Cited by 5 (3 self)
- Add to MetaCart
(Show Context)
Abstract. The proliferation of mobile devices has given rise to novel user-centric applications and services. In current mobile systems, users gain access to remote servers over mobile network operators. These operators are typically assumed to be trusted and to manage the information they collect in a privacy-preserving way. Such information, however, is extremely sensitive and coveted by many companies, which may use it to improve their business. In this context, safeguarding the users ’ privacy against the prying eyes of the network operators is an emerging requirement. In this chapter, we first present a survey of existing state-of-the-art protection mechanisms and their challenges when deployed in the context of wired and wireless networks. Moreover, we illustrate recent and ongoing research that attempts to address different aspects of privacy in mobile applications. Furthermore, we present a new proposal to ensure private communication in the context of hybrid mobile networks, which integrate wired, wireless and cellular technologies. We conclude by outlining open problems and possible future research directions. 1
A Framework for Securing Future e-Enabled Aircraft Navigation and Surveillance ∗
"... Current air traffic management systems suffer from poor radar coverage and a highly centralized architecture which can under heavy traffic loads overwhelm Air Traffic Con-trol (ATC) centers. Such limitations can lead to inefficient use of the available airspace capacity and insecure scenarios such a ..."
Abstract
-
Cited by 5 (0 self)
- Add to MetaCart
Current air traffic management systems suffer from poor radar coverage and a highly centralized architecture which can under heavy traffic loads overwhelm Air Traffic Con-trol (ATC) centers. Such limitations can lead to inefficient use of the available airspace capacity and insecure scenarios such as low-visibility landings. Future air transportation systems with e-enabled aircraft and networked technologies, such as Automated Dependent Surveillance Broadcast (ADS-B), are cyber-physical systems that promise to help reduce traffic congestion and ATC inefficiencies by enabling exchange of precise surveillance data in shared airspace. This paper focuses on cyber security concerns with highly accurate surveil-lance of aircraft navigating in a future shared space. A framework is proposed to protect traffic data for both ground and airborne surveillance of aircraft. The framework identi-fies major threats and vulnerabilities from cyber exploits, specifies security requirements and mitigation solutions. Major security challenges anticipated in supporting networked infrastructure are given along with some open problems. I.
BHigh assurance aerospace CPS and implications for automotive industry
- University of Maryland, College
, 1999
"... Abstract—The future “eEnabled ” airplane, capable of participating as an intelligent node in a global information network, is a cyber-physical system (CPS) that requires real-time, continuous and concurrent monitoring as well as control. Vulnerabilities, however, can emerge from the integration of t ..."
Abstract
-
Cited by 4 (3 self)
- Add to MetaCart
(Show Context)
Abstract—The future “eEnabled ” airplane, capable of participating as an intelligent node in a global information network, is a cyber-physical system (CPS) that requires real-time, continuous and concurrent monitoring as well as control. Vulnerabilities, however, can emerge from the integration of the eEnabled airplane with cyber-infrastructure such as the onboard embedded systems, the ground IT systems as well as other airborne systems. Consequently, high confidence is required for reliable, secure and efficient operation of this next-generation aerospace CPS. This paper presents challenges in addressing the problem of assuring distribution of avionics software and data between ground and the eEnabled airplane. Corruption of any of these information assets can threaten the operation of the CPS. We anticipate that technological innovations in high assurance CPS can mutually benefit aerospace and automotive industries. I.
Requirements and Objectives for Secure Traffic Information Systems
, 2008
"... Early approaches for Traffic Information Systems (TISs) primarily focused on centralized systems using unidirectional downlink communication and employing wireless broadcast or similar techniques. In general, these centralized TISs were operated by public radio stations, thus there were almost no se ..."
Abstract
-
Cited by 4 (1 self)
- Add to MetaCart
Early approaches for Traffic Information Systems (TISs) primarily focused on centralized systems using unidirectional downlink communication and employing wireless broadcast or similar techniques. In general, these centralized TISs were operated by public radio stations, thus there were almost no security issues related to this approach. The situation changes when new Inter Vehicle Communication (IVC) techniques are investigated. The advantages of improved timeliness and accuracy of available traffic information come with a number of security concerns. This paper reviews the requirements and objectives for secure TISs. We outline possible solutions to face the security concerns and clearly depict open issues. In conclusion, we advocate more secure TISs that benefit from recent IVC technologies in a more secure and privacy protecting way.
P.G.: Privacy-preserving secure relative localization in vehicular networks
- Security and Communication Networks
, 2008
"... Abstract. Relative location information helps build vehicle topology maps. Such maps provide location information of nearby vehicles to drivers. In building a vehicle topology, one must consider various at-tacks on vehicular networks. Also the localization system should protect the drivers ’ identit ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
(Show Context)
Abstract. Relative location information helps build vehicle topology maps. Such maps provide location information of nearby vehicles to drivers. In building a vehicle topology, one must consider various at-tacks on vehicular networks. Also the localization system should protect the drivers ’ identity privacy and make it difficult for the adversary to track vehicles. Many techniques have been proposed for relative posi-tioning and location verification. Due to the high speed and the strict security requirements, the existing relative positioning and location ver-ification techniques are not directly applicable to vehicular networks. Hence we present a scheme called P-SRLD 1, which securely determines the relative locations of a set of wirelessly connected vehicles based on the relative locations of each vehicle’s surrounding vehicles. P-SRLD uses cryptographic keys to authenticate location messages and uses a vehicle’s cryptographic pseudonym to identify the vehicle to protect drivers ’ pri-vacy. To defend against Sybil attacks, P-SRLD employs registration and relative location message verification mechanisms. It defends wormhole and black hole attacks by probabilistically monitoring losses of relative location messages. Analysis and simulation results show that P-SRLD is lightweight and is resilient to Sybil, wormhole and some other attacks. Key words: vehicle relative localization, privacy, security, vehicular networks 1
Privacy Issues of Vehicular Ad-Hoc Networks
"... Vehicular Ad-Hoc Networks are networks of communication between vehicles and roadside units. These networks have the potential to increase safety and provide many services to drivers, but they also present risks to privacy. Researching mechanism to protect privacy requires two key ingredients: 1. a ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
(Show Context)
Vehicular Ad-Hoc Networks are networks of communication between vehicles and roadside units. These networks have the potential to increase safety and provide many services to drivers, but they also present risks to privacy. Researching mechanism to protect privacy requires two key ingredients: 1. a precise definition of privacy that reflects citizens’ concern and perceptions, and 2. an upstanding of the type of attacks in VANETs. In this research, we formulate a workable definition of privacy, and focus on tracking attacks, which we found to lacking. Although considerable research has been performed in tracking none of the published solutions ensures full protection. We propose to combine a set of published solutions, namely: Mix Zones, Silent Periods, and Group Signatures in order to improve the privacy of drivers. Vehicles enters a region where, vehicles change their pseudonyms (Mix Zone) as well as network addresses; next enter the silent period, and then use one group key for communication. It could help make tracking more difficult and increase the safety and confidence of drivers using VANET.