Non-interactive Secure and Privacy Preserving Protocol for Inter-vehicle Communication Networks

In this paper, we introduce a non-interactive secure protocol preserving privacy of the drivers for Inter-Vehicle Communication (IVC) networks. To protect the privacy among drivers, we propose to arrange vehicles into several groups. Vehicles in a group share the same public key, but each member can change his own set of public keys frequently, so the receiving vehicle cannot identify an individual driver in the group. In addition, each member has a private key provided by the Third Trusted Party (TTP) to enable the TTP, who is assumed to be fully trusted, to trace the driver who sends malicious information. Then, the TTP computes a fixed token of all members in the same group, but only participants in IVC networks can convince the receiving vehicle that the token is corresponding to their changed public keys set. So, we can achieve authentication.

[1]  Panagiotis Papadimitratos,et al.  Securing Vehicular Communications - Assumptions, Requirements, and Principles , 2006 .

[2]  A. Festag,et al.  Security Architecture for Vehicular Communication , 2007 .

[3]  Zulfikar Ramzan,et al.  Group Blind Digital Signatures: A Scalable Solution to Electronic Cash , 1998, Financial Cryptography.

[4]  Panagiotis Papadimitratos,et al.  Efficient and robust pseudonymous authentication in VANET , 2007, VANET '07.

[5]  Qi Shi,et al.  Anonymous Public-key Certificates for Anonymous and Fair Document Exchange , 2000 .

[6]  Maxim Raya,et al.  The security of vehicular ad hoc networks , 2005, SASN '05.

[7]  Nader M. Rabadi,et al.  Privacy Protection Among Drivers in Vehicle-to-Vehicle Communication Networks , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.

[8]  J.-P. Hubaux,et al.  Architecture for Secure and Private Vehicular Communications , 2007, 2007 7th International Conference on ITS Telecommunications.

[9]  L. Briesemeister,et al.  Disseminating messages among highly mobile hosts based on inter-vehicle communication , 2000, Proceedings of the IEEE Intelligent Vehicles Symposium 2000 (Cat. No.00TH8511).

[10]  Jianfeng Ma,et al.  A new authentication scheme with anonymity for wireless environments , 2004, IEEE Trans. Consumer Electron..

[11]  Azim Eskandarian,et al.  Challenges of intervehicle ad hoc networks , 2004, IEEE Transactions on Intelligent Transportation Systems.

[12]  Qi Shi,et al.  Achieving user privacy in mobile networks , 1997, Proceedings 13th Annual Computer Security Applications Conference.

[13]  Syed Masud Mahmud,et al.  Decentralized secure protocol for inter-vehicle communication networks , 2006 .

[14]  Frank Stajano,et al.  Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..

[15]  Marc Joye,et al.  A Practical and Provably Secure Coalition-Resistant Group Signature Scheme , 2000, CRYPTO.

[16]  David Chaum,et al.  Group Signatures , 1991, EUROCRYPT.

[17]  Fatty M. Salem,et al.  Non-interactive Authentication Scheme Providing Privacy among Drivers in Vehicle-to-Vehicle Networks , 2010, 2010 Sixth International Conference on Networking and Services.

[18]  Dawn Xiaodong Song,et al.  Practical forward secure group signature schemes , 2001, CCS '01.

[19]  Mihir Bellare,et al.  Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions , 2003, EUROCRYPT.