Efficient group signatures for privacy-preserving vehicular networks
详细信息    查看全文
  • 作者:Lukas Malina ; Arnau Vives-Guasch ; Jordi Castellà-Roca…
  • 关键词:Authenticity ; Cryptography ; Group signatures ; Privacy ; Security ; Vehicular networks
  • 刊名:Telecommunication Systems
  • 出版年:2015
  • 出版时间:April 2015
  • 年:2015
  • 卷:58
  • 期:4
  • 页码:293-311
  • 全文大小:1,183 KB
  • 参考文献:1. Acquisti, A. (2010). The economics of personal data and the economics of privacy. In / texte de la conférence donnée en décembre.
    2. Bellare, M., Garay, J., & Rabin, T. (1998). Fast batch verification for modular exponentiation and digital signatures. / Advances in Cryptology EUROCRYPT-8 (pp. 236-50).
    3. Boneh, D., Boyen, X., & Shacham, H. (2004). Short group signatures. In / Proceedings of Advances in Cryptology-Crypto 04, Ser. LNCS 3152 (pp. 41-5). Berlin: Springer.
    4. Chen, YM, Wei, YC (2012) Safeanon: A safe location privacy scheme for vehicular networks. Telecommunication Systems 50: pp. 339-354 CrossRef
    5. Chim, TW, Yiu, SM, Hui, LCK, Li, VOK (2011) Specs: Secure and privacy enhancing communications schemes for vanets. Ad Hoc Networks 9: pp. 189-203 CrossRef
    6. Ferrara, A. L., Green, M., Hohenberger, S., & Pedersen, M. ?. (2009). Practical short signature batch verification. In / Topics in Cryptology: The Cryptographers-Track at the RSA Conference (Vol. 5473, pp. 309-24). Berlin: Springer.
    7. Fonseca, E., Festag, A., Baldessari, R., & Aguiar, R. (2007). Support of anonymity in vanets: Putting pseudonymity into practice. In / Proceedings of IEEE Wireless Communications and Networking Conference (WCNC), Hong Kong.
    8. Gerlach, M., Festag, A., Leinmuller, T., Goldacker, G., & Harsch, C. (2007). Security architecture for vehicular communication. In / The 5th International Workshop on Intelligent Transportation.
    9. Horng, WB, Lee, CP, Peng, JW (2012) Privacy preservation in secure group communications for vehicular ad hoc networks. Telecommunication Systems 50: pp. 355-365 CrossRef
    10. Hu, Y., & Laberteaux, K. (2006). Strong vanet security on a budget. In / Proceedings of Workshop on Embedded Security in Cars (ESCAR).
    11. Hussain, R., Kim, S., & Oh, H. (2009). Towards privacy aware pseudonymless strategy for avoiding profile generation in vanet. In H. Youm, & M. Yung (eds.) / Information Security Applications. Lecture Notes in Computer Science (Vol. 5932, pp. 268-80).
    12. Johnson, D, Menezes, A, Vanstone, S (2001) The elliptic curve digital signature algorithm (ecdsa). International Journal of Information Security 1: pp. 36-63 CrossRef
    13. Lin, X, Sun, X, han Ho, P, Shen, X (2007) A secure and privacy preserving protocol for vehicular communications. IEEE Transactions on Vehicular Technology 56: pp. 3442-3456 CrossRef
    14. Malina, L., & Hajny, J. (2011). Accelerated modular arithmetic for low-performance devices. In / The 34th International Conference on Telecommunications and Signal Processing (TSP) (pp. 131-35).
    15. Malina, L., Castellà-Roca, J., Vives-Guasch, A., & Hajny, J. (2013). Short-term linkable group signatures with categorized batch verification. In / Foundations and Practice of Security (pp. 244-60). Berlin: Springer.
    16. Petit, J, Mammeri, Z (2011) Authentication and consensus overhead in vehicular ad hoc networks. Telecommunication Systems 52: pp. 2699-2712 CrossRef
    17. Qin, B., Wu, Q., Domingo-Ferrer, J., & Zhang, L. (2011). Preserving security and privacy in large-scale vanets. In / Proceedings of the 13th international conference on Information and communications security, ICICS-1 (pp. 121-35). Berlin: Springer.
    18. Raya, M, Papadimitratos, P, Hubaux, JP (2006) Securing vehicular communications. IEEE Wireless Communications 13: pp. 8-15 CrossRef
    19. Raya, M, Hubaux, JP (2007) Securing vehicular ad hoc networks. Journal of Computer Security 15: pp. 39-68
    20. Studer, A., Shi, E., Bai, F., & Perrig, A. (2009). Tacking together efficient authentication, revocation, and privacy in vanets. In / SECON, pp. 1-. Rome: IEEE.
    21. Tsai, HW (2012) Aggregating data dissemination and discovery in vehicular ad hoc networks. Telecommunication Systems 50: pp. 285-295 CrossRef
    22. Tsiounis, Y, Yung, M (1998) On the security of elgamal based encryption. Public Key Cryptography. Springer, New York
    23. Wasef, A., & Shen, X. S. (2010). Eff
  • 刊物类别:Business and Economics
  • 刊物主题:Economics
    Business Information Systems
    Computer Communication Networks
    Artificial Intelligence and Robotics
    Probability Theory and Stochastic Processes
  • 出版者:Springer Netherlands
  • ISSN:1572-9451
文摘
In this paper, we deal with efficient group signatures employed in secure and privacy-preserving vehicular networks. Our solution aims to minimize the impact of several common attacks like denial of services or replay attacks on the efficiency of privacy-preserving security solutions in vehicular networks. Due to advanced properties like a short-term linkability and a categorized batch verification, our solution based on group signatures ensures privacy, security and the efficiency of vehicular networks which can be attacked by malicious parties. We outline the proposed communication pattern of vehicular networks, our security solution in detail, a formal security analysis and the experimental implementation of our solution. In addition, we evaluate and compare our solution with related works. Our group signature scheme is more efficient and secure in the signing phase and in the verification phase than related schemes.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700