Abstract
Inspiring from MANET (Mobile Ad hoc NETworks), VANET (Vehicular Ad hoc NETworks) employing vehicles as nodes, provide a wide range of applications in transportation system. The security of VANET has been a hot topic among the research community. VANETs must meet the basic security requirements such as authentication, integrity, confidentiality and privacy. In VANET, vehicles send beacon messages periodically every 100-300ms which carry speed and position information used for safe driving. The privacy of user is abused by profile generation where the adversary makes movement profiles against the vehicle using the identity information in the beacon. We outline the strategies using pseudonyms to provide privacy of user. After finding out deficiencies in pseudonym-based schemes, we propose a pseudonymless strategy to avoid profilation. In our scheme, we assume that each car is equipped with TRH (Tamper-Resistant Hardware) carrying out secure operations. Our proposed scheme assures the avoidance of profile generation without using mix zones and silent periods. We show that our proposed scheme is computationally efficient and less bandwidth consuming than other systems.
This research was supported by the Korea Research Foundation Grant funded by the Korean Government (KRF-2008-313-D01024).The research was also supported by Ministry of Knowledge Economy, Korea, under the HNRC (Home Network Research Center)- ITRC (Information Technology Research Center) support program supervised by the Institute of Information Technology Assessment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Li, C.-T., Hwang, M.-S., Chu, Y.-P.: A Secure and Efficient Communication Scheme with Authenticated Key Establishment and Privacy Preserving for Vehicular Ad Hoc Networks. Computer Communications 31, 2803–2814 (2008)
Raya, M., Hubaux, J.-P.: Securing Vehicular Ad Hoc Networks. J. Computer Security 15, 39–68 (2007)
Leinmuller, T., Schoch, E., Maihofer, C.: Security Requirements and Solution Concepts in Vehicular Ad Hoc Networks. In: Fourth Annual Conference on Wireless on Demand Network Systems and Services (WONS 2007), pp. 84–91 (2007)
Papadimitratos, P., Buttyan, L., Holczer, T., Schoch, E., Freudiger, J., Raya, M., Ma, Z., Kargl, F., Kung, A., Hubaux, J.-P.: Secure Vehicular Communication Systems: Design and Architecture. IEEE Communication Magazine 46, 110–118 (2008)
NOW: Network on Wheels Project, http://www.network-on-wheels.de/
EPFL Vehicular Networks Security Project, http://ivc.epfl.ch/
CALIFORNIA PATH (Partners for Advanced Transit and Highways), http://www.path.berkeley.edu/
SeVeCom (Secure Vehicle Communication) Project, http://www.sevecom.org/
Rass, S., Fuchs, S., Schaffer, M., Myamakya, K.: How to Protect Privacy in Floating Car Data Systems. In: Fifth ACM international workshop on Vehicular Inter NETworking, pp. 17–22 (2008)
Dotzer, F.: Privacy Issues in Vehicular Ad Hoc Networks. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol. 3856, pp. 197–209. Springer, Heidelberg (2006)
Buttyan, L., Holczer, T., Vajda, I.: On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol. 4572, pp. 129–141. Springer, Heidelberg (2007)
Beresford, A.R., Stajano, F.: Mix Zones: User Privacy in Location-aware Services. In: Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, pp. 127–131 (2004)
Lo, N.-W., Tsai, H.-C.: Illusion Attack on VANET Applications - A Message Plausibility Problem. In: IEEE Globecom Workshops, pp. 1–8 (2007)
Burmester, M., Magkos, E., Chrissikopoulos, V.: Strengthening Privacy Protection in VANETs. In: IEEE International Conference on Wireless and Mobile Computing, pp. 508–513 (2008)
Schmidt, R.K., Leinmuller, T., Schoch, E., Held, A., Schafer, G.: Vehicle Behavior Analysis to Enhance Security in VANETs. In: Fourth Workshop on Vehicle to Vehicle Communications (V2VCOM 2008), (2008)
Chaurasia, B.K., Verma, S., Bhasker, S.M.: Maximizing Anonymity of a Vehicle. In: Fourth International Conference on Wireless Communication and Sensor Networks, pp. 95–98 (2008)
Chaurasia, B.K., Verma, S., Bhasker, S.M.: Message broadcast in VANETs using Group Signature. In: Fourth International Conference on Wireless Communication and Sensor Networks, pp. 131–136 (2008)
Schoch, E., et al.: Impact of Pseudonym Changes on Geographic Routing in VANETs. In: Buttyán, L., Gligor, V.D., Westhoff, D. (eds.) ESAS 2006. LNCS, vol. 4357, pp. 43–57. Springer, Heidelberg (2006)
Liu, B., Zhong, Y., Zhang, S.: Probabilistic Isolation of Malicious Vehicles in Pseudonym Changing VANETs. In: 7th IEEE International Conference on Computer and Information Technology, pp. 967–972 (2007)
Gerlach, M., Guttler, F.: Privacy in VANETs using Changing Pseudonyms - Ideal and Real. In: IEEE 65th Vehicular Technology Conference, pp. 2521–2525 (2007)
Scheuer, F., Plobi, K., Federrath, H.: Preventing Profile Generation in Vehicular Networks. In: IEEE International Conference on Wireless and Mobile Computing, pp. 520–525 (2008)
Fonseca, E., Festag, A., Baldessari, R., Aguiar, R.L.: Support of Anonymity in VANETs - Putting Pseudonymity into Practice. In: IEEE Wireless Communications and Networking Conference (WCNC 2007), pp. 3400–3405 (2007)
Calandriello, G., Papadimitratos, P., Hubaux, J.-P., Lioy, A.: Efficient and Robust Pseudonymous Authentication in VANET. In: Fourth ACM International Workshop on Vehicular ad Hoc Networks, pp. 19–28 (2007)
Ma, Z., Kargl, F., Weber, M.: Pseudonym-on-demand: A New Pseudonym Refill Strategy for Vehicular Communications. In: IEEE 68th Vehicular Technology Conference (VTC 2008), pp. 1–5 (2008)
Chaurasia, B.K., Verma, S.: Optimizing Pseudonym Updation for Anonymity in VANETS. In: IEEE Asia-Pacific Services Computing Conference, pp. 1633–1637 (2008)
Eichler, S.: Strategies for Pseudonym Changes in Vehicular Ad Hoc Networks depending on Node Mobility. In: IEEE Intelligent Vehicles Symposium, pp. 541–546 (2007)
Plobi, K., Federrath, H.: A Privacy Aware and Efficient Security Infrastructure for Vehicular Ad Hoc Networks. Computer Standards and Interfaces 30, 390–397 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hussain, R., Kim, S., Oh, H. (2009). Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in VANET. In: Youm, H.Y., Yung, M. (eds) Information Security Applications. WISA 2009. Lecture Notes in Computer Science, vol 5932. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10838-9_20
Download citation
DOI: https://doi.org/10.1007/978-3-642-10838-9_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-10837-2
Online ISBN: 978-3-642-10838-9
eBook Packages: Computer ScienceComputer Science (R0)