Abstract
VANET is a communication network for exchanging information between vehicles where accidents and traffic information can be delivered between vehicles or receive services through an infrastructure. Although efficiency of traffic system and convenience of drivers are provided through VAN communication, malicious information can lead to traffic disturbance or risk to drivers. Therefore, a way to prevent an intermediate attack should be considered. For considerations there are mobility of vehicles and the fact that it is multiple objects and the existence of RSU. In this paper, it ensures the integrity and a cross-certification is conducted through Distance-bounding and Zero-Knowledge. The corresponding protocol has verified the safety through a security analysis on the security vulnerabilities in VANET environment. As a result of this study, integrity in VANET environment can be secured with reliability through illegal RSU detection.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Maurya, A.K., et al.: Modeling and verification of fiat-shamir zero knowledge authentication protocol. In: Advances in Computer Science and Information Technology. Computer Science and Engineering, pp. 61–70. Springer Berlin, Heidelberg (2012)
Sou, S.-I., Tonguz, O.K.: Enhancing VANET connectivity through roadside units on highways. IEEE Transactions on Vehicular Technology 60(8), 3586–3602 (2011)
Paul, B., et al.: Vanet routing protocols: Pros and cons. arXiv preprint (2012) arXiv:1204.1201
Feiri, M., et al.: The impact of security on cooperative awareness in VANET. In: 2013 IEEE Vehicular Networking Conference (VNC). IEEE (2013)
Goldreich, O., Micali, S., Wigderson, A.: Proofs that yield nothing but their validity or all language in np have zero-knowledge proof systems. J. Assoc. Comput. Mach. 38, 691–729 (1991)
Lu, L., Han, J., Liu, Y., Hu, L., Huai, J., Ni, L.M., Ma, J.: Pseudo trust: Zero-knowledge authentication in anonymous P2Ps. IEEE Trans. Parallel Distrib. Syst. 19, 1325–1337 (2008)
Cremers, C., et al. Distance hijacking attacks on distance bounding protocols. In: 2012 IEEE Symposium on Security and Privacy (SP). IEEE (2012)
Avoine, G., Kim, C.H.: Mutual Distance Bounding Protocols. IEEE Transactions on Mobile Computing 12 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer Science+Business Media Singapore
About this paper
Cite this paper
Kim, M., Choi, KC., You, H., Jun, Ms. (2015). Design of Authentication Protocol Based on Distance-Bounding and Zero-Knowledge for Anonymity in VANET. In: Park, DS., Chao, HC., Jeong, YS., Park, J. (eds) Advances in Computer Science and Ubiquitous Computing. Lecture Notes in Electrical Engineering, vol 373. Springer, Singapore. https://doi.org/10.1007/978-981-10-0281-6_39
Download citation
DOI: https://doi.org/10.1007/978-981-10-0281-6_39
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-0280-9
Online ISBN: 978-981-10-0281-6
eBook Packages: Computer ScienceComputer Science (R0)