Unified pseudonym distribution in VANETs

VANETs continue to mature and their installation is becoming a reality. Many ideas have been exchanged on how best to balance privacy and security. The use of pseudonyms has been almost universally accepted as a critical part of this equation. Simulated results, using ns-3, demonstrate the need for more than a single road side unit (RSU) contact for pseudonym refill due to the limited number of certificates that can be issued in that transit. This paper provides a universal protocol using multiple RSUs and multiple service channels for the distribution of pseudonyms for refill, intra-regional, and inter-regional purposes.

[1]  Elaine Shi,et al.  TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[2]  Brijesh Kumar Chaurasia,et al.  Pseudonym Based Mechanism for Sustaining Privacy in VANETs , 2009, 2009 First International Conference on Computational Intelligence, Communication Systems and Networks.

[3]  Chris Lai,et al.  A secure anonymous key mechanism for privacy protection in VANET , 2009, 2009 9th International Conference on Intelligent Transport Systems Telecommunications, (ITST).

[4]  Henry L. Owen,et al.  Framework to Support Per Second Shifts of Pseudonyms in Regional VANETs , 2010, 2010 IEEE 72nd Vehicular Technology Conference - Fall.

[5]  Henry L. Owen,et al.  The effects of limited lifetime pseudonyms on certificate revocation list size in VANETS , 2010, Proceedings of the IEEE SoutheastCon 2010 (SoutheastCon).

[6]  George F. Riley,et al.  The ns-3 Network Simulator , 2010, Modeling and Tools for Network Simulation.

[7]  S. Verma,et al.  Maximizing anonymity of a vehicle , 2008, 2008 Fourth International Conference on Wireless Communication and Sensor Networks.

[8]  Panagiotis Papadimitratos,et al.  SECURING VEHICULAR COMMUNICATIONS , 2006, IEEE Wireless Communications.

[9]  Panagiotis Papadimitratos,et al.  Secure vehicular communication systems: design and architecture , 2008, IEEE Communications Magazine.

[10]  Michael Weber,et al.  Pseudonym-On-Demand: A New Pseudonym Refill Strategy for Vehicular Communications , 2008, 2008 IEEE 68th Vehicular Technology Conference.

[11]  Maxim Raya,et al.  The security of vehicular ad hoc networks , 2005, SASN '05.

[12]  Dijiang Huang Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks , 2007, Int. J. Secur. Networks.