A two level privacy preserving pseudonymous authentication protocol for VANET

Ubaidullah Rajput, Fizza Abbas, Hasoo Eun, Rasheed Hussain, Heekuck Oh

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

20 Citations (Scopus)

Abstract

Vehicular ad hoc network (VANET) is gaining significant popularity due to their role in improving traffic efficiency and safety. However, communication in VANET needs to be secure as well as authenticated. The vehicles in the VANET not only broadcast traffic messages known as beacons but also broadcast safety critical messages such as electronic emergency brake light (EEBL). Due to the openness of the network, a malicious vehicles can join the network and broadcast bogus messages that could result in accident. On one hand, a vehicle needs to be authenticated while on the other hand, its private data such as location and identity information must be prevented from misuse. In this paper, we propose an efficient pseudonymous authentication protocol with conditional privacy preservation to enhance the security of VANET. Most of the current protocols either utilize pseudonym based approaches with certificate revocation list (CRL) that causes significant communicational and storage overhead or group signature based approaches that are computationally expensive. Another inherent disadvantage is to have full trust on certification authorities, as these entities have complete user profiles. We present a new protocol that only requires honest-but-curious behavior from certification authority. We utilize a mechanism for providing a user with two levels of pseudonyms named as base pseudonym and short time pseudonyms to achieve conditional privacy. However, in case of revocation, there is no need to maintain the revocation list of pseudonyms. The inherent mechanism assures the receiver of the message about the authenticity of the pseudonym. In the end of the paper, we analyze our protocol by giving the communication cost as well as various attack scenarios to show that our approach is efficient and robust.

Original languageEnglish
Title of host publication2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2015
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages643-650
Number of pages8
ISBN (Electronic)9781467377010
DOIs
Publication statusPublished - 4 Dec 2015
Event11th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2015 - Abu Dhabi, United Arab Emirates
Duration: 19 Oct 201521 Oct 2015

Publication series

Name2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2015

Conference

Conference11th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2015
Country/TerritoryUnited Arab Emirates
CityAbu Dhabi
Period19/10/1521/10/15

Bibliographical note

Funding Information:
This research was supported in part by the MSIP (Ministry of Science, ICT and Future Planning), Korea, under the ITRC (Information Technology Research Center) support program (IITP-2015-H8501-15-1007) supervised by the IITP (Institute for Information and communications Technology Promotion). This research was also supported in part by the MSIP (Ministry of Science, ICT and Future Planning), Korea, under the ITRC (Information Technology Research Center) support program (IITP-2015-H8501-15-1018) supervised by the IITP (Institute for Information and communications Technology Promotion). This work was also supported in part by the NRF (National Research Foundation of Korea) grant funded by the Korea government MEST (Ministry of Education, Science and Technology) (No. NRF-2012R1A2A2A01046986)

Publisher Copyright:
© 2015 IEEE.

Keywords

  • authentication
  • conditional privacy
  • pseudonyms
  • Vehicular ad hoc networks (VANET)

Fingerprint

Dive into the research topics of 'A two level privacy preserving pseudonymous authentication protocol for VANET'. Together they form a unique fingerprint.

Cite this