Privacy-Preserving Cooperative Downloading for Value-Added Services in VANETs

Value-added services have been promising applications in Vehicular Ad Hoc Networks (VANETs) in recent years. In VANETs, Road Side Units (RSUs) cannot cover all areas, causing intermittent connectivity. As a result, how to snsure security and privacy for downloading data continuously in such a highly dynamic environment is still a problem. In this paper, we present a cooperative downloading scheme for value-added services in VANETs, which can realize continuous services enjoying even out of the communication range of RSUs. Moreover, in order to realize security and privacy of data enjoying, we employ Cipher text Policy Attribute Based Encryption with Constant Length (CP-ABE-CL) according to users' charge levels, ensuring the anonymity of receivers.

[1]  Ivan Stojmenovic,et al.  Improved Access Control Mechanism in Vehicular Ad Hoc Networks , 2011, ADHOC-NOW.

[2]  Pin-Han Ho,et al.  An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[3]  Yu Cheng,et al.  Secure Data Downloading with Privacy Preservation in Vehicular Ad Hoc Networks , 2010, 2010 IEEE International Conference on Communications.

[4]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[5]  Ratna Dutta,et al.  Computationally Efficient Secure Access Control for Vehicular Ad Hoc Networks , 2012, ICISS.

[6]  Qian Zhang,et al.  VC-MAC: A Cooperative MAC Protocol in Vehicular Networks , 2009, IEEE Trans. Veh. Technol..

[7]  Dijiang Huang,et al.  ASPE: attribute-based secure policy enforcement in vehicular ad hoc networks , 2009, Ad Hoc Networks.

[8]  Xuemin Shen,et al.  MAC in Motion: Impact of Mobility on the MAC of Drive-Thru Internet , 2012, IEEE Transactions on Mobile Computing.

[9]  Giovanni Pau,et al.  Co-operative downloading in vehicular ad-hoc wireless networks , 2005, Second Annual Conference on Wireless On-demand Network Systems and Services.

[10]  Allison Bishop,et al.  Decentralizing Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..

[11]  Nishant Doshi,et al.  Hidden Access Structure Ciphertext Policy Attribute Based Encryption with Constant Length Ciphertext , 2011, ADCONS.