Anonymity notions for public-key infrastructures in mobile vehicular networks

被引:0
|
作者
Di Crescenzo, Giovanni [1 ]
Zhang, Tao [1 ]
Pietrowicz, Stanley [1 ]
机构
[1] Telcordia Technol, Piscataway, NJ 08854 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As vehicular networks approach practicality, there is wide recognition for security challenges in their use, and pressing need for security solutions. The intrinsically mobile and ad-hoc nature of vehicular networks pose rather novel challenges to the modeling, design and analysis of security solutions for them. One particularly stringent requirement in this area is that of protecting the anonymity of vehicle owners during their participation in a vehicular network, such as in traffic safety applications. In this paper we present novel models of concrete anonymity requirements for vehicular networks. We consider a case study of a simple variant of a public-key infrastructure for vehicular networks and present two techniques to augment it so that it provides improved anonymity properties. The resulting vehicular-network key infrastructures satisfy desirable combinations of anonymity, unlinkability, bad actor detection, and efficiency requirements.
引用
收藏
页码:1047 / 1052
页数:6
相关论文
共 50 条
  • [1] Anonymity notions and techniques for public-key infrastructures in vehicular networks
    Di Crescenzo, G.
    Zhang, T.
    Pietrowicz, S.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (10) : 1185 - 1198
  • [2] Public-key management in mobile ad hoc networks
    Lin, Haifeng
    Jiang, Anna
    Bai, Di
    Liu, Yunfei
    [J]. PIAGENG 2013: INTELLIGENT INFORMATION, CONTROL, AND COMMUNICATION TECHNOLOGY FOR AGRICULTURAL ENGINEERING, 2013, 8762
  • [3] On the security notions for public-key encryption schemes
    Phan, DH
    Pointcheval, D
    [J]. SECURITY IN COMMUNICATION NETWORKS, 2005, 3352 : 33 - 46
  • [4] KeyNote: Trust management for public-key infrastructures
    Blaze, M
    Feigenbaum, J
    Keromytis, AD
    [J]. SECURITY PROTOCOLS, 1999, 1550 : 59 - 66
  • [5] A model for revocation forecasting in public-key infrastructures
    Ganan, Carlos
    Mata-Diaz, Jorge
    Munoz, Jose L.
    Esparza, Oscar
    Alins, Juanjo
    [J]. KNOWLEDGE AND INFORMATION SYSTEMS, 2015, 43 (02) : 311 - 331
  • [6] Self-escrowed public-key infrastructures
    Paillier, P
    Yung, M
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC'99, 2000, 1787 : 257 - 268
  • [7] A model for revocation forecasting in public-key infrastructures
    Carlos Gañán
    Jorge Mata-Díaz
    Jose L. Muñoz
    Oscar Esparza
    Juanjo Alins
    [J]. Knowledge and Information Systems, 2015, 43 : 311 - 331
  • [8] Localized public-key management for mobile ad hoc networks
    Li, RD
    Li, J
    Kameda, H
    Liu, P
    [J]. GLOBECOM '04: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, 2004, : 1284 - 1289
  • [9] Mobile anonymity of dynamic groups in vehicular networks
    Xi, Yong
    Shi, Weisong
    Schwiebert, Loren
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2008, 1 (03) : 219 - 231
  • [10] New security notions and relations for public-key encryption
    Sepahi, Reza
    Pieprzyk, Josef
    Shahandashti, Siamak F.
    Schoenmakers, Berry
    [J]. JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2012, 6 (3-4) : 183 - 227