Open Access Open Access  Restricted Access Subscription or Fee Access

Fine Grained Distributed Data Access Control with Portable Billing Scheme for Service Oriented Vehicular Network

M. Balashankar, K. Sowmya

Abstract


Vehicular ad hoc network (VANET) is used to improve road safety. Service oriented vehicular networks support infrastructure based services like video streaming, content distribution, real time traffic concerns and internet access. Fine grained distributed data access network is used to meet the different requirements of users. This paper achieves security, privacy and billing in service oriented vehicular network. A portable electronic currency reduces the long authentication delay of the centralized AAA architecture. This paper also achieves the security properties of entity authentication, privacy, fraud electronic currency prevention, session key agreement, double-spending prevention, and non repudiated billing are achieved.


Keywords


VANET, Portable Billing Machine, Tamper-Proof Device, Key Policy Attribute-Based Encryption (KP-ABE), Fine-Grained Distributed Data Access Control.

Full Text:

PDF

References


A. Wasef and X. Shen, “EMAP: Expedite message authentication protocol for vehicular ad hoc networks,” IEEE Trans. Mobile Comput., vol. 12, no. 1, pp. 78–89, Jan. 2013.

C.-W. Wang, Y.-M. Huang, and W.-M. Chen, “A novel secure communication scheme in vehicular ad hoc networks,” Comput. Commun., vol. 31, no. 12, pp. 2827–283, 2008.

C.-T. Li, M.-S. Hwang, and Y.-P. Chu, “A secure and efficient communication scheme with authenticated key establishment and privacy perserving for vehicular ad hoc networks,” Comput. Commun., vol. 31, no. 12, pp. 2803–2814, 2008.

C. Zhang, R. Lu, X. Lin, P. H. Ho, and X. Shen, “An efficient ID -based batch verification scheme for vehicular sensor networks,” in Proc. IEEE INFOCOM, Phoenix, AZ, USA, 2008, pp. 816–824.

C. Zhang, X. Lin, R. Lu, P. H. Ho, and X. Shen, “An efficient message authentication scheme for vehicular communications,” IEEE Trans. Veh. Technol., vol. 57, no. 6, pp. 3357–3368, Nov. 2008.

E. Coronado and S. Cherkaoui, “Provisioning of on-demand services in vehicular networks,” in Proc. IEEE GLOBECOM, Honolulu, HI, USA, 2009.

H. Zhu, X. Lin, M. Shi, P.-H. Ho, and X. Shen, “PPAB: A privacy preserving authentication and billing architecture for metropolitan area sharing networks,” IEEE Trans. Veh. Technol., vol. 58, no. 5, pp. 2529–2543, Jun. 2009.

H.-S. Lee and Y.-B. Lin, “Credit pre-reservation mechanism for UMTS prepaid service,” IEEE Trans. Wireless Commun., vol. 9, no. 6, pp. 1867–1873, Jun. 2010.

H. Zhu, R. Lu, X. Shen, and X. Lin, “Security in service-oriented vehicular networks,” IEEE Wireless Commun., vol. 16, no. 4, pp. 16–22, Aug. 2009.

H. Zhu, X. Lin, R. Lu, P.-H. Ho, and X. Shen, “SLAB: A secure localized authentication and billing scheme for wireless mesh networks,” IEEE Trans. Wireless Commun., vol. 7, no. 10, pp. 3858–3868, Oct. 2008.

J. P. Hubaux, S. Capkun, and J. Luo, “The security and privacy of smart vehicles,” IEEE Security Privacy, vol. 2, no. 3, pp. 49–55, May/Jun. 2004.

L. Zhang, Q. Wu, A. Solanas, and J. Domingo-Ferrer, “A scalable robust authentication protocol for secure vehicular communications,” IEEE Trans. Veh. Technol., vol. 59, no. 4, pp. 1606–1617, May 2010.

L. Dang et al., “Efficient ID-based registration protocol featured with user anonymity in mobile IP networks,” IEEE Trans. Wireless Commun., vol. 9, no. 2, pp. 594–604, Feb. 2010.

L. Zhang, H. Miyajima, and H. Hayashi, “prediction authentication based on heuristic movement prediction for seamless handover in wireless access environment,” in Proc. IEEE WCNC, Hong Kong,China, 2007.

M. Raya and J.-P. Hubaux, “Securing vehicular ad hoc networks,” J. Comput. Secur., vol. 15, no. 1, pp. 39–68, 2007.

R. Lu, X. Lin, H. Zhu, P.-H. Ho, and X. Shen, “ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications,” in Proc. IEEE INFOCOM, Phoenix, AZ, USA, 2008, pp. 1229–1237.

S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud computing,” in Proc.IEEE INFOCOM, Piscataway, NJ, USA, 2010.

V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proc. CCS, New York, NY, USA, 2006.

X. Lin et al., “TSVC: Timed efficient and secure vehicular communications with privacy preserving,” IEEE Trans. Wireless Commun., vol. 7, no. 12, pp. 4987–4998, Dec. 2008.

Y. Qian, K. Lu, and N. Moayeri, “A secure VANET MAC protocol for DSRC applications,” in Proc. IEEE GLOBECOM, NewOrleans,LO, USA, 2008.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.