The impact of key assignment on VANET privacy

نویسندگان

  • Jason J. Haas
  • Yih-Chun Hu
  • Kenneth P. Laberteaux
چکیده

There are two underlying principles that guide how a vehicular ad hoc network (VANET) is built: there will be misbehavior and the extent to which vehicles can misbehave should be bounded. Additionally, the main use for VANETs currently is to enable safety applications where vehicles’ position, velocity, and acceleration are broadcast to other vehicles in the VANET. Combining these guiding principles with this application results in the privacy of vehicles and users being an important concern for VANET design. Safety application messages are signed using keys and therefore linked to vehicles. In this work, we investigate how to assign keys to vehicles in order to preserve privacy and maintain our guiding VANET design principles. Specifically, we investigate the design space where individual keys may be given to multiple vehicles and vehicles may have multiple keys. Through a simple security analysis, we eliminate the case where all keys are common. Throughmathematical and logical analysis, we conclude that keys should not be owned by multiple vehicles, that is, keys should be unique to vehicles and vehicles should be given multiple keys. Specifically, we show that it is impossible to provide good privacy and fast revocation when keys are shared among vehicles. Copyright © 2009 John Wiley & Sons, Ltd.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs (CMU-CyLab-08-011)

Vehicular Ad Hoc Networks (VANETs) require some mechanism to help authenticate messages, identify valid vehicles, and remove malevolent vehicles. A Public Key Infrastructure (PKI) can provide this functionality using certificates and fixed public keys. However, fixed keys allow an eavesdropper to associate a key with a vehicle and a location, violating drivers’ privacy. In this work we examine ...

متن کامل

An Improved Privacy-Preserving Navigation Protocol in {VANET}s

Recent advance of vehicular technology offers opportunities for developing new navigation systems to overcome the problems of popular global positioning system (GPS) based navigation systems. In order to integrate vehicular technology into conventional GPS-based navigation systems securely, a secure and privacy-preserving navigation protocol that utilizes the real-time road information collecte...

متن کامل

STRONG VANET SECURITY ON A BUDGET Yih

This article proposes a security authentication process that is well-suited for Vehicular Ad-hoc Networks (VANET). As compared to current Public Key Infrastructure (PKI) proposals for VANET authentication, the scheme is significantly more efficient with regard to bandwidth and computation. The scheme uses time as the creator of asymmetric knowledge. A sender creates a long chain of keys. Each k...

متن کامل

CARAVAN: Providing Location Privacy for VANET

In vehicular ad hoc networks (VANET), it is possible to locate and track a vehicle based on its transmissions, during communication with other vehicles or the road-side infrastructure. This type of tracking leads to threats on the location privacy of the vehicle’s user. In this paper, we study the problem of providing location privacy in VANET by allowing vehicles to prevent tracking of their b...

متن کامل

A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks

Privacy and security should be paid much more attention in secure vehicular ad hoc networks (VANETs). However, as far as we know, few researches on secure VANET protocols have addressed both the privacy issues and authenticated key establishment. Therefore, in this work, a lightweight authenticated key establishment scheme with privacy preservation to secure the communications between mobile ve...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Security and Communication Networks

دوره 3  شماره 

صفحات  -

تاریخ انتشار 2010