PACP: An Efficient Pseudonymous Authentication-Based Conditional Privacy Protocol for VANETs
- 12 August 2011
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Intelligent Transportation Systems
- Vol. 12 (3), 736-746
- https://doi.org/10.1109/tits.2011.2156790
Abstract
In this paper, we propose a new privacy preservation scheme, named pseudonymous authentication-based conditional privacy (PACP), which allows vehicles in a vehicular ad hoc network (VANET) to use pseudonyms instead of their true identity to obtain provably good privacy. In our scheme, vehicles interact with roadside units to help them generate pseudonyms for anonymous communication. In our setup, the pseudonyms are only known to the vehicles but have no other entities in the network. In addition, our scheme provides an efficient revocation mechanism that allows vehicles to be identified and revoked from the network if needed. Thus, we provide conditional privacy to the vehicles in the system, that is, the vehicles will be anonymous in the network until they are revoked, at which point, they cease to be anonymous.Keywords
This publication has 18 references indexed in Scilit:
- Flexible, extensible, and efficient VANET authenticationJournal of Communications and Networks, 2009
- Privacy-Aware Traffic MonitoringIEEE Transactions on Intelligent Transportation Systems, 2009
- AEMA: An Aggregated Emergency Message Authentication Scheme for Enhancing the Security of Vehicular Ad Hoc NetworksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- PPGCV: Privacy Preserving Group Communications Protocol for Vehicular Ad Hoc NetworksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- GSIS: A Secure and Privacy-Preserving Protocol for Vehicular CommunicationsIEEE Transactions on Vehicular Technology, 2007
- SECURING VEHICULAR COMMUNICATIONSIEEE Wireless Communications, 2006
- Refinements of Miller's algorithm for computing the Weil/Tate pairingJournal of Algorithms, 2006
- The security of vehicular ad hoc networksPublished by Association for Computing Machinery (ACM) ,2005
- Architecture of the dedicated short-range communications (DSRC) protocolPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Reducing elliptic curve logarithms to logarithms in a finite fieldPublished by Association for Computing Machinery (ACM) ,1991