Open Access Open Access  Restricted Access Subscription or Fee Access

Enhancing Privacy and Reducing Traffic Levels in Vehicular Ad-Hoc Networks

P. Rajeshwari, S. Padmavathi, A. Naveenkumar

Abstract


Vehicular Ad Hoc Networks is a kind of special wireless ad hoc network, which has the characteristics of high node mobility and fast topology changes. The Vehicular Networks can provide wide variety of services, ranges from safety and crash avoidance to internet access and multimedia applications. Attacking and misusing such network could cause destructive consequences. It is therefore necessary to integrate security requirements into the design of VANETs and defend VANET systems against misbehaviour, in order to ensure correct and smooth operations of the network. In this paper, we propose a security system for VANETs to achieve privacy desired by vehicles and traceability required by law enforcement authorities, in addition to satisfying fundamental security requirements including authentication, nonrepudiation, message integrity, and confidentiality. Moreover, we propose a privacy-preserving defense technique for network authorities to handle misbehaviour in VANET access, considering the challenge that privacy provides avenue for misbehaviour. The proposed system employs an identity based cryptosystem where certificates are not needed for authentication. We show the fulfilment and feasibility of our system with respect to the security goals and efficiency.

Keywords


VANET,roadside units (RSUs),CRL.

Full Text:

PDF

References


M. Raya and J-P. Hubaux, “Securing Vehicular Ad Hoc Networks,” J. Computer Security, special issue on security of ad hoc and sensor networks, vol. 15, no. 1, pp. 39-68, 2007.

J.Y. Choi, M. Jakobsson, and S. Wetzel, “Balancing Auditability and Privacy in Vehicular Networks,” Proc. First ACM Int’l WorkshopQoS and Security for Wireless and Mobile Networks (Q2SWinet ’05), pp. 79-87, Oct. 2005.

J. Sun, C. Zhang, and Y. Fang, “An Id-Based Framework Achieving Privacy and Non-Repudiation in Vehicular Ad Hoc Networks,” Proc. IEEE Military Comm. Conf., pp. 1-7, Oct. 2007.

X. Lin, X. Sun, P.-H. Ho, and X. Shen, “GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications, ”IEEE Trans. Vehicular Technology, vol. 56, no. 6, pp. 3442-3456, Nov. 2007.

M. Raya, P. apadimitratos, I. Aad, D. Jungels, and J.-P. Hubaux,“Eviction of Misbehaving and Faulty Nodes in Vehicular Networks,” IEEE J. Selected Areas Comm., vol. 25, no. 8, pp. 1557- 1568,Oct. 2007.

C. Gamage, B. Gras, B. Crispo, and A.S. Tanenbaum, “An Identity Based Ring Signature Scheme with Enhanced Privacy,” Proc.Second Int’l Conf. Security and Privacy in Comm. Networks (SecureComm ’06), Aug. 2006.

P. Tsang, M.H. Au, A. Kapadia, and S.W. Smith, “Blacklistable Anonymous Credentials: Blocking Misbehaving Users without TTPs,” Proc. ACM Conf. Computer and Comm. Security (CCS),pp. 72-81, 2007.

J. Sun and Y. Fang, “A Defense Technique against Misbehavior in VANETs Based on Threshold Authentication,” Proc. IEEE Military Comm. Conf., Nov. 2008.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.