An Attribute-Based Framework for Secure Communications in Vehicular Ad Hoc Networks

In this paper, we introduce an attribute-based framework to achieve secure communications in vehicular ad hoc networks (VANETs), which enjoys several advantageous features. The proposed framework employs attribute-based signature (ABS) to achieve message authentication and integrity and protect vehicle privacy, which greatly mitigates the overhead caused by pseudonym/private key change or update in the existing solutions for VANETs based on symmetric key, asymmetric key, and identity-based cryptography and group signature. In addition, we extend a standard ABS scheme with traceability and revocation mechanisms and seamlessly integrate them into the proposed framework to support vehicle traceability and revocation by a trusted authority, and thus, the resulting scheme for vehicular communications does not suffer from the anonymity misuse issue, which has been a challenge for anonymous credential-based vehicular protocols. Finally, we implement the proposed ABS scheme using a rapid prototyping tool called Charm to evaluate its performance.

[1]  Wenfen Liu,et al.  Revocable Threshold Attribute-Based Signature against Signing Key Exposure , 2015, ISPEC.

[2]  Jianhong Zhang,et al.  Breaking and Repairing of an Anonymous and Traceable Communication Protocol for Vehicular Ad Hoc Networks , 2012, 2012 IEEE 12th International Conference on Computer and Information Technology.

[3]  Dijiang Huang,et al.  ASPE: attribute-based secure policy enforcement in vehicular ad hoc networks , 2009, Ad Hoc Networks.

[4]  Brent Waters,et al.  Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys , 2005, CRYPTO.

[5]  Srdjan Capkun,et al.  The security and privacy of smart vehicles , 2004, IEEE Security & Privacy Magazine.

[6]  Hong Wen,et al.  A Novel Framework for Message Authentication in Vehicular Communication Networks , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[7]  Siaw-Lynn Ng,et al.  Threshold Anonymous Announcement in VANETs , 2011, IEEE Journal on Selected Areas in Communications.

[8]  Ian Miers,et al.  Charm: a framework for rapidly prototyping cryptosystems , 2013, Journal of Cryptographic Engineering.

[9]  Pin-Han Ho,et al.  GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.

[10]  Robert H. Deng,et al.  Server-Aided Attribute-Based Signature With Revocation for Resource-Constrained Industrial-Internet-of-Things Devices , 2018, IEEE Transactions on Industrial Informatics.

[11]  Manoj Prabhakaran,et al.  Attribute-Based Signatures , 2011, CT-RSA.

[12]  Moni Naor,et al.  Revocation and Tracing Schemes for Stateless Receivers , 2001, CRYPTO.

[13]  Frank Kargl,et al.  PUCA: A pseudonym scheme with user-controlled anonymity for vehicular ad-hoc networks (VANET) , 2014, 2014 IEEE Vehicular Networking Conference (VNC).

[14]  Javier Herranz,et al.  Short Attribute-Based Signatures for Threshold Predicates , 2012, CT-RSA.

[15]  Pin-Han Ho,et al.  RAISE: An Efficient RSU-Aided Message Authentication Scheme in Vehicular Communication Networks , 2008, 2008 IEEE International Conference on Communications.

[16]  Ke Zeng,et al.  Pseudonymous PKI for Ubiquitous Computing , 2006, EuroPKI.

[17]  Panagiotis Papadimitratos,et al.  Eviction of Misbehaving and Faulty Nodes in Vehicular Networks , 2007, IEEE Journal on Selected Areas in Communications.

[18]  Jan Camenisch,et al.  Efficient Group Signature Schemes for Large Groups (Extended Abstract) , 1997, CRYPTO.

[19]  Elaine Shi,et al.  TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[20]  Amos Fiat,et al.  How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.

[21]  Chun-Ta Li,et al.  A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks , 2008, Comput. Commun..

[22]  Silvio Micali,et al.  The knowledge complexity of interactive proof-systems , 1985, STOC '85.

[23]  Ankit Singh,et al.  Restricted usage of anonymous credentials in vehicular ad hoc networks for misbehavior detection , 2017, International Journal of Information Security.

[24]  Kenneth G. Paterson,et al.  A comparison between traditional public key infrastructures and identity-based cryptography , 2003, Inf. Secur. Tech. Rep..

[25]  Josep Domingo-Ferrer,et al.  Preserving Security and Privacy in Large-Scale VANETs , 2011, ICICS.

[26]  Xuemin Shen,et al.  MAAC: Message Authentication Acceleration Protocol for Vehicular Ad Hoc Networks , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[27]  Hui Xiong,et al.  Achieving Guaranteed Anonymity in GPS Traces via Uncertainty-Aware Path Cloaking , 2010, IEEE Transactions on Mobile Computing.

[28]  Arati Baliga,et al.  An identity-based security framework For VANETs , 2006, VANET '06.

[29]  Vipul Goyal,et al.  Identity-based encryption with efficient revocation , 2008, IACR Cryptol. ePrint Arch..

[30]  Panagiotis Papadimitratos,et al.  Efficient and robust pseudonymous authentication in VANET , 2007, VANET '07.

[31]  Josep Domingo-Ferrer,et al.  A Scalable Robust Authentication Protocol for Secure Vehicular Communications , 2010, IEEE Transactions on Vehicular Technology.

[32]  Ratna Dutta,et al.  Efficient Attribute Based Access Control Mechanism for Vehicular Ad Hoc Network , 2013, NSS.

[33]  Markus Jakobsson,et al.  Balancing auditability and privacy in vehicular networks , 2005, Q2SWinet '05.

[34]  Yang Li,et al.  Efficient authentication and access control of message dissemination over vehicular ad hoc network , 2016, Neurocomputing.

[35]  Tao Zhang,et al.  Enforcing Privacy Using Symmetric Random Key-Set in Vehicular Networks , 2007, Eighth International Symposium on Autonomous Decentralized Systems (ISADS'07).

[36]  Josep Domingo-Ferrer,et al.  Balanced Trustworthiness, Safety, and Privacy in Vehicle-to-Vehicle Communications , 2010, IEEE Transactions on Vehicular Technology.

[37]  Frank Kargl,et al.  Pseudonym Schemes in Vehicular Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[38]  Maxim Raya,et al.  Securing vehicular ad hoc networks , 2007, J. Comput. Secur..

[39]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.