Anonymity and security improvements in heterogeneous connected vehicle networks

被引:0
|
作者
Sivasankari, S. A. [1 ]
Gupta, Deepak [2 ]
Keshta, Ismail [3 ]
Reddy, Ch. Venkata Krishna [4 ]
Singh, Pavitar Parkash [5 ]
Byeon, Haewon [6 ]
机构
[1] Vignans Fdn Sci Technol & Res, Guntur, India
[2] Inst Technol & Management, Dept CSE, Gwalior, India
[3] AlMaarefa Univ, Coll Appl Sci, Comp Sci & Informat Syst Dept, Riyadh, Saudi Arabia
[4] Chaitanya Bharathi Inst Technol, Dept Elect & Elect Engn, Hyderabad, India
[5] Lovely Profess Univ, Dept Management, Phagwara, India
[6] Inje Univ, Dept Digital Antiaging Healthcare, Gimhae 50834, South Korea
关键词
IoT; Connected vehicle network; Security; Intelligent transportation; SMART; INTERNET; OPTIMIZATION; MANAGEMENT; DESIGN; SYSTEM;
D O I
10.1007/s41060-023-00499-1
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The connected vehicle network is an important part of intelligent transportation since it provides a wide variety of online vehicle services and helps to lower the risk of accidents for drivers while also being a prominent example of the IoT inside futuristic smart vertical networks. However, the connected vehicle network's communication protocols reveal a great deal of private data, including individual vehicles' whereabouts and travel plans. Sensitive data, including vehicle positions and trajectories created during communication, must be protected as wireless communication technology by its very nature entails broadcasting and allows for open communication between vehicles. Therefore, a key objective in vehicular network security is to increase the anonymity of vehicle identities within secure services. Using a batch verification technique, we present a novel approach to anonymous identity authentication in this research. The approach uses zero-knowledge proofs and other forms of anonymized authentication to bolster the privacy of IEEE WAVE's security services. It also provides a new way to retrieve lost identification with the help of an independent party. This study primarily contributes to the improvement of privacy in IEEE WAVE security services and applications such as near-field vehicle payment and DSRC security services by proposing an improved anonymous authentication system based on batch verification and zero-knowledge proofs. According to experimental findings, the recommended method has a lower computational overhead than a number of competing systems up until the batch of signatures that have to be checked contains more than eleven. Furthermore, we suggest the optimal batch processing verification cycle, tailored to the scheme's use in the near-field vehicle payment and basic safety message (BSM) use cases of DSRC.
引用
下载
收藏
页数:14
相关论文
共 50 条
  • [1] Physical Layer Security in Intelligently Connected Vehicle Networks
    Luo, Xuewen
    Liu, Yiliang
    Chen, Hsiao-Hwa
    Guo, Qing
    IEEE NETWORK, 2020, 34 (05): : 232 - 239
  • [2] Connected Vehicle Security
    Francia, Guillermo A., III
    PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2020), 2020, : 173 - 181
  • [3] An Analysis Platform for the Information Security of In-Vehicle Networks Connected with External Networks
    Ezaki, Takaya
    Date, Tomohiro
    Inoue, Hiroyuki
    ADVANCES IN INFORMATION AND COMPUTER SECURITY (IWSEC 2015), 2015, 9241 : 301 - 315
  • [4] Anonymity and security in delay tolerant networks
    Kate, Aniket
    Zaverucha, Gregory M.
    Hengartner, Urs
    2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPS, 2007, : 504 - 513
  • [5] Decomposing the dynamics of heterogeneous delayed networks with applications to connected vehicle systems
    Szalai, Robert
    Orosz, Gabor
    PHYSICAL REVIEW E, 2013, 88 (04):
  • [6] Poster: Opinion Dynamics for Enhancing Trust and Security in Connected Vehicle Networks
    Voce, Gianna
    Castillo, Marbella
    Griffith, Henry
    Rathore, Heena
    PROCEEDINGS OF THE 2023 INTERNATIONAL SYMPOSIUM ON THEORY, ALGORITHMIC FOUNDATIONS, AND PROTOCOL DESIGN FOR MOBILE NETWORKS AND MOBILE COMPUTING, MOBIHOC 2023, 2023, : 562 - 564
  • [7] A Threat Model and Security Recommendations for IoT Sensors in Connected Vehicle Networks
    Kuri, Sajib Kumar
    Islam, Tarim
    Jaskolka, Jason
    Ibnkahla, Mohamed
    2022 IEEE 95TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2022-SPRING), 2022,
  • [8] Connected Vehicle Security Vulnerabilities
    Takefuji, Yoshiyasu
    IEEE TECHNOLOGY AND SOCIETY MAGAZINE, 2018, 37 (01) : 15 - 18
  • [9] Anonymity and Security in Mobile Ad Hoc Networks
    Bolla, Jhansi Vazram
    Vatsavayi, Valli Kumari
    Murthy, J. V. R.
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, 2012, 7154 : 71 - +
  • [10] Physical Layer Security Assisted Computation Offloading in Intelligently Connected Vehicle Networks
    Liu, Yiliang
    Wang, Wei
    Chen, Hsiao-Hwa
    Lyu, Feng
    Wang, Liangmin
    Meng, Weixiao
    Shen, Xuemin
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2021, 20 (06) : 3555 - 3570