Framework to Support Per Second Shifts of Pseudonyms in Regional VANETs

Vehicular ad hoc networks (VANETs) provide the means to add convenience, services, and safety to the road. This paper introduces a means to adapt the concepts of Public Key Infrastructure for a VANET environment under the worst case scenario of a pseudonym shift every second. Regions are used to scale down the size of certificate revocation lists (CRLs), administrative overhead, and the search space to link a message to its originator. Regions also provide a means for expansion of the geographical area covered and provides the ability to balance geographic mobility with privacy. The framework outlined below can then be modified to the decided pseudonym shift frequency and/or extended for other purposes.

[1]  Maxim Raya,et al.  Securing vehicular ad hoc networks , 2007, J. Comput. Secur..

[2]  Yih-Chun Hu,et al.  The impact of key assignment on VANET privacy , 2010, Secur. Commun. Networks.

[3]  William E. Burr,et al.  Recommendation for Key Management, Part 1: General (Revision 3) , 2006 .

[4]  S. Verma,et al.  Message broadcast in VANETs using group signature , 2008, 2008 Fourth International Conference on Wireless Communication and Sensor Networks.

[5]  J.-P. Hubaux,et al.  Architecture for Secure and Private Vehicular Communications , 2007, 2007 7th International Conference on ITS Telecommunications.

[6]  Michael Weber,et al.  Pseudonym-On-Demand: A New Pseudonym Refill Strategy for Vehicular Communications , 2008, 2008 IEEE 68th Vehicular Technology Conference.

[7]  Maxim Raya,et al.  Revocation games in ephemeral networks , 2008, CCS.

[8]  Yih-Chun Hu,et al.  Design and analysis of a lightweight certificate revocation mechanism for VANET , 2009, VANET '09.

[9]  Panagiotis Papadimitratos,et al.  Efficient and robust pseudonymous authentication in VANET , 2007, VANET '07.

[10]  Josep Domingo-Ferrer,et al.  A Scalable Robust Authentication Protocol for Secure Vehicular Communications , 2010, IEEE Transactions on Vehicular Technology.

[11]  Bhargav Bellur,et al.  Certificate Assignment Strategies for a PKI-Based Security Architecture in a Vehicular Network , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[12]  Elaine Shi,et al.  TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[13]  Christos Douligeris,et al.  TwoHop: Metric-Based Trust Evaluation for Peer-to-Peer Collaboration Environments , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[14]  Panagiotis Papadimitratos,et al.  Fast Exclusion of Errant Devices from Vehicular Networks , 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[15]  Jianqing Li,et al.  Effectively Changing Pseudonyms for Privacy Protection in VANETs , 2009, 2009 10th International Symposium on Pervasive Systems, Algorithms, and Networks.

[16]  Charles Doyle,et al.  Statutes of Limitation in Federal Criminal Cases: An Overview , 2012 .

[17]  Arati Baliga,et al.  Secure, pseudonymous, and auditable communication in vehicular ad hoc networks , 2008, Secur. Commun. Networks.

[18]  Henry L. Owen,et al.  The effects of limited lifetime pseudonyms on certificate revocation list size in VANETS , 2010, Proceedings of the IEEE SoutheastCon 2010 (SoutheastCon).

[19]  Maxim Raya,et al.  The security of vehicular ad hoc networks , 2005, SASN '05.

[20]  Shiyong Zhang,et al.  Probabilistic Isolation of Malicious Vehicles in Pseudonym Changing VANETs , 2007, 7th IEEE International Conference on Computer and Information Technology (CIT 2007).

[21]  Jessica Staddon,et al.  Detecting and correcting malicious data in VANETs , 2004, VANET '04.