Anonymity notions for public-key infrastructures in mobile vehicular networks

被引:0
|
作者
Di Crescenzo, Giovanni [1 ]
Zhang, Tao [1 ]
Pietrowicz, Stanley [1 ]
机构
[1] Telcordia Technol, Piscataway, NJ 08854 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As vehicular networks approach practicality, there is wide recognition for security challenges in their use, and pressing need for security solutions. The intrinsically mobile and ad-hoc nature of vehicular networks pose rather novel challenges to the modeling, design and analysis of security solutions for them. One particularly stringent requirement in this area is that of protecting the anonymity of vehicle owners during their participation in a vehicular network, such as in traffic safety applications. In this paper we present novel models of concrete anonymity requirements for vehicular networks. We consider a case study of a simple variant of a public-key infrastructure for vehicular networks and present two techniques to augment it so that it provides improved anonymity properties. The resulting vehicular-network key infrastructures satisfy desirable combinations of anonymity, unlinkability, bad actor detection, and efficiency requirements.
引用
收藏
页码:1047 / 1052
页数:6
相关论文
共 50 条
  • [41] PUBLIC-KEY SYSTEMS
    BRASSARD, G
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1988, 325 : 20 - 39
  • [42] PUBLIC-KEY PATENT
    BENNETT, R
    [J]. BYTE, 1985, 10 (07): : 16 - 16
  • [43] PUBLIC-KEY CRYPTOGRAPHY
    ODLYZKO, AM
    [J]. AT&T TECHNICAL JOURNAL, 1994, 73 (05): : 17 - 23
  • [44] PUBLIC-KEY ENCRYPTION
    STUBBS, E
    [J]. EDN MAGAZINE-ELECTRICAL DESIGN NEWS, 1984, 29 (04): : 29 - 29
  • [45] Secure Public-Key Based Effective and Efficient Sensor Networks
    Huang, Xu
    [J]. INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS (IMECS 2010), VOLS I-III, 2010, : 768 - 773
  • [46] New security protocol for mobile agent based on public-key infrastructure
    Mazlan, MA
    Dibba, M
    Samsudin, A
    Kamarulhali, H
    [J]. 6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XII, PROCEEDINGS: INDUSTRIAL SYSTEMS AND ENGINEERING II, 2002, : 96 - 101
  • [47] High-performance Public-key Cryptoprocessor for Wireless Mobile Applications
    Kazuo Sakiyama
    Lejla Batina
    Bart Preneel
    Ingrid Verbauwhede
    [J]. Mobile Networks and Applications, 2007, 12 : 245 - 258
  • [48] A Survey of Public-Key Cryptographic Primitives in Wireless Sensor Networks
    Shim, Kyung-Ah
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (01): : 577 - 601
  • [49] A Survey on Post-Quantum Public-Key Signature Schemes for Secure Vehicular Communications
    Shim, Kyung-Ah
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (09) : 14025 - 14042
  • [50] Secure Public Key Regime (SPKR) in Vehicular Networks
    Chuan, Tan Heng
    Zhang, Jun
    Maode, Ma
    Chong, Peter Han Joo
    Labiod, Houda
    [J]. 2015 INTERNATIONAL CONFERENCE ON CYBER SECURITY OF SMART CITIES, INDUSTRIAL CONTROL AND COMMUNICATIONS (SSIC), 2015,