Anonymity and security improvements in heterogeneous connected vehicle networks

被引:0
|
作者
Sivasankari, S. A. [1 ]
Gupta, Deepak [2 ]
Keshta, Ismail [3 ]
Reddy, Ch. Venkata Krishna [4 ]
Singh, Pavitar Parkash [5 ]
Byeon, Haewon [6 ]
机构
[1] Vignans Fdn Sci Technol & Res, Guntur, India
[2] Inst Technol & Management, Dept CSE, Gwalior, India
[3] AlMaarefa Univ, Coll Appl Sci, Comp Sci & Informat Syst Dept, Riyadh, Saudi Arabia
[4] Chaitanya Bharathi Inst Technol, Dept Elect & Elect Engn, Hyderabad, India
[5] Lovely Profess Univ, Dept Management, Phagwara, India
[6] Inje Univ, Dept Digital Antiaging Healthcare, Gimhae 50834, South Korea
关键词
IoT; Connected vehicle network; Security; Intelligent transportation; SMART; INTERNET; OPTIMIZATION; MANAGEMENT; DESIGN; SYSTEM;
D O I
10.1007/s41060-023-00499-1
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The connected vehicle network is an important part of intelligent transportation since it provides a wide variety of online vehicle services and helps to lower the risk of accidents for drivers while also being a prominent example of the IoT inside futuristic smart vertical networks. However, the connected vehicle network's communication protocols reveal a great deal of private data, including individual vehicles' whereabouts and travel plans. Sensitive data, including vehicle positions and trajectories created during communication, must be protected as wireless communication technology by its very nature entails broadcasting and allows for open communication between vehicles. Therefore, a key objective in vehicular network security is to increase the anonymity of vehicle identities within secure services. Using a batch verification technique, we present a novel approach to anonymous identity authentication in this research. The approach uses zero-knowledge proofs and other forms of anonymized authentication to bolster the privacy of IEEE WAVE's security services. It also provides a new way to retrieve lost identification with the help of an independent party. This study primarily contributes to the improvement of privacy in IEEE WAVE security services and applications such as near-field vehicle payment and DSRC security services by proposing an improved anonymous authentication system based on batch verification and zero-knowledge proofs. According to experimental findings, the recommended method has a lower computational overhead than a number of competing systems up until the batch of signatures that have to be checked contains more than eleven. Furthermore, we suggest the optimal batch processing verification cycle, tailored to the scheme's use in the near-field vehicle payment and basic safety message (BSM) use cases of DSRC.
引用
下载
收藏
页数:14
相关论文
共 50 条
  • [21] Connected Vehicle Security: Overview of Risks and Mitigation Strategies
    Riffee, Allen A.
    Riffee, Asa
    Youssef, Tarek A.
    SOUTHEASTCON 2024, 2024, : 1432 - 1437
  • [22] Vehicle Trajectory Prediction in Connected Environments via Heterogeneous Context-Aware Graph Convolutional Networks
    Lu, Yuhuan
    Wang, Wei
    Hu, Xiping
    Xu, Pengpeng
    Zhou, Shengwei
    Cai, Ming
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (08) : 8452 - 8464
  • [23] An authentication protocol for vehicular ad hoc networks with heterogeneous anonymity requirements
    Bhavesh, N. Bharadiya
    Maity, Soumyadev
    Hansdah, R. C.
    INTERNATIONAL JOURNAL OF SPACE-BASED AND SITUATED COMPUTING, 2014, 4 (01) : 1 - 14
  • [24] Experimental verification platform for connected vehicle networks
    Avedisov, Sergei S.
    Bansal, Gaurav
    Kiss, Adam K.
    Orosz, Gabor
    2018 21ST INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION SYSTEMS (ITSC), 2018, : 818 - 823
  • [25] A geographical segment architecture for connected vehicle networks
    Huang, Aidi
    Motani, Mehul
    VEHICULAR COMMUNICATIONS, 2019, 19
  • [26] Public anonymity and the connected world
    Tony Doyle
    Judy Veranas
    Ethics and Information Technology, 2014, 16 : 207 - 218
  • [27] Identity-based roaming protocol with anonymity for heterogeneous wireless networks
    Jiang, Qi
    Ma, Jian-Feng
    Li, Guang-Song
    Liu, Hong-Yue
    Tongxin Xuebao/Journal on Communications, 2010, 31 (10): : 138 - 145
  • [28] SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
    Sun, Jinyuan
    Zhang, Chi
    Zhang, Yanchao
    Fang, Yuguang
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (02) : 295 - 307
  • [29] A Systematic Survey on Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and Formalization
    Chao, Daichong
    Xu, Dawei
    Gao, Feng
    Zhang, Chuan
    Zhang, Weiting
    Zhu, Liehuang
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2024, 26 (03): : 1775 - 1829
  • [30] Public anonymity and the connected world
    Doyle, Tony
    Veranas, Judy
    ETHICS AND INFORMATION TECHNOLOGY, 2014, 16 (03) : 207 - 218