Anonymity and security improvements in heterogeneous connected vehicle networks

被引:0
|
作者
Sivasankari, S. A. [1 ]
Gupta, Deepak [2 ]
Keshta, Ismail [3 ]
Reddy, Ch. Venkata Krishna [4 ]
Singh, Pavitar Parkash [5 ]
Byeon, Haewon [6 ]
机构
[1] Vignans Fdn Sci Technol & Res, Guntur, India
[2] Inst Technol & Management, Dept CSE, Gwalior, India
[3] AlMaarefa Univ, Coll Appl Sci, Comp Sci & Informat Syst Dept, Riyadh, Saudi Arabia
[4] Chaitanya Bharathi Inst Technol, Dept Elect & Elect Engn, Hyderabad, India
[5] Lovely Profess Univ, Dept Management, Phagwara, India
[6] Inje Univ, Dept Digital Antiaging Healthcare, Gimhae 50834, South Korea
关键词
IoT; Connected vehicle network; Security; Intelligent transportation; SMART; INTERNET; OPTIMIZATION; MANAGEMENT; DESIGN; SYSTEM;
D O I
10.1007/s41060-023-00499-1
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The connected vehicle network is an important part of intelligent transportation since it provides a wide variety of online vehicle services and helps to lower the risk of accidents for drivers while also being a prominent example of the IoT inside futuristic smart vertical networks. However, the connected vehicle network's communication protocols reveal a great deal of private data, including individual vehicles' whereabouts and travel plans. Sensitive data, including vehicle positions and trajectories created during communication, must be protected as wireless communication technology by its very nature entails broadcasting and allows for open communication between vehicles. Therefore, a key objective in vehicular network security is to increase the anonymity of vehicle identities within secure services. Using a batch verification technique, we present a novel approach to anonymous identity authentication in this research. The approach uses zero-knowledge proofs and other forms of anonymized authentication to bolster the privacy of IEEE WAVE's security services. It also provides a new way to retrieve lost identification with the help of an independent party. This study primarily contributes to the improvement of privacy in IEEE WAVE security services and applications such as near-field vehicle payment and DSRC security services by proposing an improved anonymous authentication system based on batch verification and zero-knowledge proofs. According to experimental findings, the recommended method has a lower computational overhead than a number of competing systems up until the batch of signatures that have to be checked contains more than eleven. Furthermore, we suggest the optimal batch processing verification cycle, tailored to the scheme's use in the near-field vehicle payment and basic safety message (BSM) use cases of DSRC.
引用
收藏
页数:14
相关论文
共 50 条
  • [41] Physical Layer Security in Heterogeneous Cellular Networks
    Wang, Hui-Ming
    Zheng, Tong-Xing
    Yuan, Jinhong
    Towsley, Don
    Lee, Moon Ho
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2016, 64 (03) : 1204 - 1219
  • [42] Black-Box Modeling of Connected Vehicle Networks
    Zhang, Linjun
    Orosz, Gabor
    2016 AMERICAN CONTROL CONFERENCE (ACC), 2016, : 2421 - 2426
  • [43] Towards Security Assurance for Heterogeneous Industrial Networks
    Ray, Apala
    Akerberg, Johan
    Bjorkman, Mats
    Gidlund, Mikael
    IECON 2015 - 41ST ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2015, : 4488 - 4493
  • [44] Security concepts for the dynamics of autonomous vehicle networks
    Xue, Mengran
    Wang, Wei
    Roy, Sandip
    AUTOMATICA, 2014, 50 (03) : 852 - 857
  • [45] DATA AND CYBER SECURITY IN AUTONOMOUS VEHICLE NETWORKS
    Raiyn, Jamal
    TRANSPORT AND TELECOMMUNICATION JOURNAL, 2018, 19 (04) : 325 - 334
  • [46] Study of security and effectiveness of DoIP in vehicle networks
    Ajin, V. W.
    Kumar, Lekshmy D.
    Joy, James
    PROCEEDINGS OF IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT 2016), 2016,
  • [47] Security architecture for field area networks connected to Internet
    Gordeev, M
    FIELDBUS TECHNOLOGY: SYSTEMS INTEGRATION, NETWORKING, AND ENGINEERING, 1999, : 69 - 75
  • [48] Group Anonymity in Security Protocols
    Tiplea, Ferucio Laurentiu
    Varlan, Cosmin
    PROCEEDINGS OF THE 2018 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2018, : 407 - 416
  • [49] Vehicle Trajectory Prediction Based on Graph Convolutional Networks in Connected Vehicle Environment
    Shi, Jian
    Sun, Dongxian
    Guo, Baicang
    APPLIED SCIENCES-BASEL, 2023, 13 (24):
  • [50] BLOCKCHAIN: BALANCE OF ANONYMITY AND SECURITY
    Sharafanova, Elena E.
    Barabanova, Marina I.
    FACTA UNIVERSITATIS-SERIES ELECTRONICS AND ENERGETICS, 2024, 37 (01) : 149 - 156