Zone Encryption with Anonymous Authentication for V2V Communication

被引:21
|
作者
Camenisch, Jan [1 ,3 ]
Drijvers, Manu [1 ,3 ]
Lehmann, Anja [2 ,3 ]
Neven, Gregory [1 ,3 ]
Towa, Patrick [3 ,4 ,5 ]
机构
[1] DFINITY, Zurich, Switzerland
[2] Univ Potsdam, Hasso Plattner Inst, Potsdam, Germany
[3] IBM Res Zurich, Zurich, Switzerland
[4] ENS, Paris, France
[5] PSL Res Univ, Paris, France
基金
欧盟地平线“2020”;
关键词
Privacy; V2X; Zone Encryption; CREDENTIALS; SIGNATURES; SECURITY; PRIVACY;
D O I
10.1109/EuroSP48549.2020.00033
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Vehicle-to-vehicle (V2V) communication systems are currently being prepared for real-world deployment, but they face strong opposition over privacy concerns. Position beacon messages are the main culprit, being broadcast in cleartext and pseudonymously signed up to 10 times per second. So far, no practical solutions have been proposed to encrypt or anonymously authenticate V2V messages. We propose two cryptographic innovations that enhance the privacy of V2V communication. As a core contribution, we introduce zone-encryption schemes, where vehicles generate and authentically distribute encryption keys associated to static geographic zones close to their location. Zone encryption provides security against eavesdropping, and, combined with a suitable anonymous authentication scheme, ensures that messages can only be sent by genuine vehicles, while adding only 224 Bytes of cryptographic overhead to each message. Our second contribution is an authentication mechanism fine-tuned to the needs of V2V which allows vehicles to authentically distribute keys, and is called dynamic group signatures with attributes. Our instantiation features unlimited locally generated pseudonyms, negligible credential download-and-storage costs, identity recovery by a trusted authority, and compact signatures of 216 Bytes at a 128-bit security level.
引用
收藏
页码:405 / 424
页数:20
相关论文
共 50 条
  • [1] A Lightweight Authentication Protocol for V2V Communication in VANETs
    Vasudev, Harsha
    Das, Debasis
    [J]. 2018 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2018, : 1237 - 1242
  • [2] Provably Secure and Anonymous V2I and V2V Authentication Protocol for VANETs
    Xie, Qi
    Ding, Zixuan
    Zheng, Panpan
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (07) : 7318 - 7327
  • [3] V2V Communication and Authentication: The Internet of Things Vehicles(Iotv)
    Peter, Mary N.
    Rani, M. Pushpa
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2021, 120 (01) : 231 - 247
  • [4] V2V Communication and Authentication: The Internet of Things Vehicles(Iotv)
    Mary N. Peter
    M. Pushpa Rani
    [J]. Wireless Personal Communications, 2021, 120 : 231 - 247
  • [5] A Lightweight Mutual Authentication Protocol for V2V Communication in Internet of Vehicles
    Vasudev, Harsha
    Deshpande, Varad
    Das, Debasis
    Das, Sajal K.
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (06) : 6709 - 6717
  • [6] Analysis of V2V Communication for ADAS
    Cheong, Mukoe
    Lee, Youngseok
    Park, Weijin
    Yeom, Ikjun
    [J]. 2017 NINTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2017), 2017, : 284 - 286
  • [7] Conditional privacy-preserving authentication scheme for V2V communication without pseudonyms
    Wang, QingLong
    Li, YongYong
    Tan, ZhiQiang
    Fan, Na
    Yao, GuDi
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 78
  • [8] Group-Based Authentication in V2V communications
    Hasrouny, Hamssa
    Bassil, Carole
    Samhat, Abed Ellatif
    Laouiti, Anis
    [J]. 2015 FIFTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION AND COMMUNICATION TECHNOLOGY AND ITS APPLICATIONS (DICTAP), 2015, : 173 - 177
  • [9] Ensuring Privacy and Authentication for V2V Resource Sharing
    Benarous, Leila
    Kadri, Benamar
    [J]. 2017 SEVENTH INTERNATIONAL CONFERENCE ON EMERGING SECURITY TECHNOLOGIES (EST), 2017, : 1 - 6
  • [10] V2V communication analysis by a probabilistic approach
    Mourllion, Benjamin
    Glaser, Sebastien
    [J]. 2007 IEEE 65TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-6, 2007, : 2575 - 2579