Secure and privacy-preserving, timed vehicular communications

被引:5
|
作者
Burmester, Mike [1 ]
Magkos, Emmanouil [2 ]
Chrissikopoulos, Vassilis [2 ]
机构
[1] Florida State Univ, Dept Comp Sci, Tallahassee, FL 32306 USA
[2] Ionian Univ, Dept Informat, Corfu 49100, Greece
基金
美国国家科学基金会;
关键词
vehicle-to-vehicle communication; security; privacy; TESLA; time efficient stream loss-tolerant authentication; timed hash chains; MESSAGE AUTHENTICATION SCHEME; EFFICIENT; DESIGN;
D O I
10.1504/IJAHUC.2012.049068
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider the problem of privacy and security of routine safety messages in vehicular (V2V) communication. Traditional public key mechanisms are not appropriate because of the large number of messages that have to be transmitted. We first show that a recently proposed scheme, the TSVC based on TESLA is subject to an impersonation attack, and propose a modification that secures it. We then propose a communication scheme based on a variant of TESLA, for which packets are self-authenticating and combine both schemes to get a hybrid scheme that addresses in a flexible way the mobility requirements of V2V communications.
引用
收藏
页码:219 / 229
页数:11
相关论文
共 50 条
  • [31] Secure authentication and privacy-preserving techniques in Vehicular Ad-hoc NETworks (VANETs)
    Manivannan, D.
    Moni, Shafika Showkat
    Zeadally, Sherali
    [J]. VEHICULAR COMMUNICATIONS, 2020, 25
  • [32] Privacy-Preserving Object Detection with Secure Convolutional Neural Networks for Vehicular Edge Computing
    Bai, Tianyu
    Fu, Song
    Yang, Qing
    [J]. FUTURE INTERNET, 2022, 14 (11):
  • [33] A privacy-preserving quantum authentication for vehicular communication
    Challagundla, Koushik
    Sutradhar, Kartick
    [J]. Quantum Information Processing, 2024, 23 (11)
  • [34] A Privacy-preserving Incentive Framework for the Vehicular Cloud
    Alamer, Abdulrahman
    Basudan, Sultan
    Lin, Xiaodong
    [J]. IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 435 - 441
  • [35] Secure and Privacy-Preserving AMI-Utility Communications via LTE-A Networks
    Haddad, Zaher
    Mahmoud, Mohamed
    Taha, Sanaa
    Saroit, Imane Aly
    [J]. 2015 IEEE 11TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2015, : 748 - 755
  • [36] A robust and privacy-preserving aggregation scheme for secure smart grid communications in digital communities
    Fu, Shuai
    Ma, Jianfeng
    Li, Hongtao
    Jiang, Qi
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (15) : 2779 - 2788
  • [37] Secure and Privacy-Preserving Trust Management System for Trustworthy Communications in Intelligent Transportation Systems
    Din, Ikram Ud
    Awan, Kamran Ahmad
    Almogren, Ahmad
    [J]. IEEE ACCESS, 2023, 11 : 65407 - 65417
  • [38] Toward Vehicular Digital Forensics From Decentralized Trust: An Accountable, Privacy-Preserving, and Secure Realization
    Li, Ming
    Weng, Jian
    Liu, Jia-Nan
    Lin, Xiaodong
    Obimbo, Charlie
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (09) : 7009 - 7024
  • [39] SPCEX: Secure and Privacy-Preserving Cryptocurrency Exchange
    Xie, Haomeng
    Yan, Zheng
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (05) : 4404 - 4417
  • [40] Secure and Privacy-Preserving Proxy Voting System
    Zwattendorfer, Bernd
    Hillebold, Christoph
    Teufl, Peter
    [J]. 2013 IEEE 10TH INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE), 2013, : 472 - 477