VIPER: A vehicle-to-infrastructure communication privacy enforcement protocol

被引:0
|
作者
Cencioni, Paolo [1 ]
Di Pietro, Roberto [2 ]
机构
[1] Univ Roma La Sapienza, Dipartimento Informat, Via Salaria 113, I-00198 Rome, Italy
[2] Univ Roma La Sapienza, Dipartimento Matemat, I-00146 Rome, Italy
关键词
vehicular communication; anonymity; privacy; traffic analysis;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy-related issues are crucial for the wide diffusion of Vehicular Communications (VC). In particular traffic analysis is one of the subtler threats to privacy in VC. In this paper we first briefly review current work in literature addressing privacy issues. Then we present VIPER: a Vehicle-,to-Infrastructure communication Privacy Enforcement pRotocol. VIPER is inspired to solutions provided for the Internet -mix- and cryptography-universal reencryption. The protocol is shown to be resilient to traffic analysis attacks and analytical results suggest that it also performs well with respect to two key performance indicators: queue occupancy and message delivery time. Finally, simulation results support our analytical findings.
引用
收藏
页码:1041 / +
页数:2
相关论文
共 50 条
  • [1] A mechanism to enforce privacy in vehicle-to-infrastructure communication
    Cencioni, Paolo
    Di Pietro, Roberto
    [J]. COMPUTER COMMUNICATIONS, 2008, 31 (12) : 2790 - 2802
  • [2] An efficient conditional privacy-preserving authentication scheme for Vehicle-To-Infrastructure communication in VANETs
    Ali, Ikram
    Li, Fagen
    [J]. VEHICULAR COMMUNICATIONS, 2020, 22
  • [3] MAC Performance Analysis for Vehicle-to-Infrastructure Communication
    Luan, Tom H.
    Ling, Xinhua
    Shen, Xuemin
    [J]. 2010 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC 2010), 2010,
  • [4] Intelligent behaviors through vehicle-to-vehicle and vehicle-to-infrastructure communication
    Garcia, Richard D.
    Sturgeon, Purser
    Brown, Mike
    [J]. UNMANNED SYSTEMS TECHNOLOGY XIV, 2012, 8387
  • [5] Predictive longitudinal vehicle control based on vehicle-to-infrastructure communication
    Knauder, Bernhard
    Karner, Michael
    Schratter, Markus
    [J]. 2014 INTERNATIONAL CONFERENCE ON CONNECTED VEHICLES AND EXPO (ICCVE), 2014, : 258 - 263
  • [6] Study of Connectivity Probability of Vehicle-to-Vehicle and Vehicle-to-Infrastructure Communication Systems
    Zhao, Junhui
    Chen, Yan
    Gong, Yi
    [J]. 2016 IEEE 83RD VEHICULAR TECHNOLOGY CONFERENCE (VTC SPRING), 2016,
  • [7] Privacy-Preserving Data Aggregation Protocol for Fog Computing-Assisted Vehicle-to-Infrastructure Scenario
    Chen, Yanan
    Lu, Zhenyu
    Xiong, Hu
    Xu, Weixiang
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [8] Intersection management for autonomous vehicles with vehicle-to-infrastructure communication
    Li, Yuying
    Liu, Qipeng
    [J]. PLOS ONE, 2020, 15 (07):
  • [9] A Novel Network Selection Mechanism for Vehicle-to-Infrastructure Communication
    Ndashimye, Emmanuel
    Sarkar, Nurul I.
    Ray, Sayan Kumar
    [J]. 2016 IEEE 14TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 14TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 2ND INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/DATACOM/CYBERSC, 2016, : 483 - 488
  • [10] A Vehicle-to-Infrastructure Wireless Communication System Based on ZigBee
    Pan, Shenghui
    Wu, Tiantian
    Cao, Peng
    [J]. 5TH INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING FOR ADVANCED TECHNOLOGIES, (ICMEAT 2016), 2016, : 135 - 138