Abstract
Vehicular ad-hoc network (VANET) is an emerging technology which can offer a wide variety of promising applications, such as safety-related and infotainment applications. However, VANET also raises important security and privacy concerns that must be properly addressed for widespread deployment. In this paper, we first proposed a provable secure pseudonym-based cryptosystem with a trusted authority, including a pseudonym-based encryption scheme, a pseudonym-based multi-receiver encryption scheme, a pseudonym-based signature scheme, and a pseudonym-based one-pass key establishment protocol. We then presented a secure and efficient data access scheme for VANET based on cooperative caching technology and the proposed pseudonym-based cryptosystem. The efficiency of data access was greatly improved by allowing the sharing and coordination of cached data among multiple vehicles, and the anonymity of vehicles, data confidentiality, integrity and non-repudiation were guaranteed by employing the proposed pseudonym-based cryptosystem. Simulation results have shown that the proposed data access scheme is suitable to the VANET environment.
Similar content being viewed by others
References
Abbani N, Artail H (2015) Protecting data flow anonymity in mobile ad hoc networks that employ cooperative caching. Ad Hoc Netw 26(0):69–87. ISSN 1570–8705. doi:10.1016/j.adhoc.2014.10.018. http://www.sciencedirect.com/science/article/pii/S1570870514002340
Akinyele JA, Garman C, Miers I, Pagano MW, Rushanan M, Green M, Rubin AD (2013) Charm: a framework for rapidly prototyping cryptosystems. J Cryptogr Eng 3(2):111–128. ISSN 2190–8508. doi:10.1007/s13389-013-0057-3
Baek J, Newmarch J, Safavi-naini R, Susilo W (2004) A survey of identity-based cryptography. In: Proceedings of Australian unix users group annual conference, pp 95–102
Biswas S, Misic J (2013) A cross-layer approach to privacy-preserving authentication in wave-enabled vanets. IEEE Trans Veh Technol 62(5):2182–2192. ISSN 0018–9545. doi:10.1109/TVT.2013.2238566
Boneh D, Franklin M (2001) Identity-based encryption from the weil pairing. In: Kilian J (ed) Advances in cryptology CRYPTO 2001, volume 2139 of lecture notes in computer science. Springer, Berlin, pp 213–229. ISBN 978-3-540-42456-7. doi:10.1007/3-540-44647-8_13
Burmester M, Magkos E, Chrissikopoulos V (2008) Strengthening privacy protection in vanets. In: Networking and communications, 2008. WIMOB’08. IEEE international conference on wireless and mobile computing, pp 508–513, Oct 2008. doi:10.1109/WiMob.2008.32
Choon J, Hee Cheon J (2002) An identity-based signature from gap Diffie–Hellman groups. In: Desmedt YVOG (ed) Public key cryptography—PKC 2003, volume 2567 of lecture notes in computer science. Springer, Berlin, pp 18–30. ISBN 978-3-540-00324-3. doi:10.1007/3-540-36288-6_2
Dahiya A, Chauhan D (2010) A comparative study of manet and vanet environment. J Comput 2(7):87–92
Fujisaki E, Okamoto T (1999) Secure integration of asymmetric and symmetric encryption schemes. In: Proceedings of the 19th annual international cryptology conference on advances in cryptology, CRYPTO ’99, London, UK. Springer, pp 537–554. ISBN 3-540-66347-9. http://dl.acm.org/citation.cfm?id=646764.706343
Fujisaki E, Okamoto T (2013) Secure integration of asymmetric and symmetric encryption schemes. J Cryptol 26(1):80–101. ISSN 0933–2790. doi:10.1007/s00145-011-9114-1
Gorantla MC, Boyd C, Nieto JMG (2008) Id-based one-pass authenticated key establishment. In: Proceedings of the sixth Australasian conference on information security—volume 81, AISC ’08, Darlinghurst, Australia, Australia. Australian Computer Society, Inc., pp 39–46. ISBN 978-1-920682-62-0. http://dl.acm.org/citation.cfm?id=1385109.1385118
Li C-T, Hwang M-S, Chu Y-P (2008) A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Comput Commun 31(12):2803–2814. ISSN 0140–3664. doi:10.1016/j.comcom.2007.12.005. http://www.sciencedirect.com/science/article/pii/S0140366407005154. Mobility Protocols for ITS/VANET
Li F, Wang Y (2007) Routing in vehicular ad hoc networks: a survey. Veh Technol Mag IEEE 2(2):12–22. ISSN 1556–6072. doi:10.1109/MVT.2007.912927
Lynn B (2014) The pairing-based cryptography library. http://crypto.stanford.edu/pbc/. Accessed 18 July 2014
Razzaque MA, Ahmad Salehi S, Cheraghi SM (2013) Security and privacy in vehicular ad-hoc networks: survey and the road ahead. In: Khan S, Khan Pathan A-S (eds) Wireless networks and security. Signals and communication technology. Springer, Berlin, Heidelberg, pp 107–132
Sailhan F, Issarny V (2003) Cooperative caching in ad hoc networks. In: Chen M-S, Chrysanthis PK, Sloman M, Zaslavsky A (eds) Mobile data management, volume 2574 of lecture notes in computer science. Springer, Berlin, pp 13–28. ISBN 978-3-540-00393-9. doi:10.1007/3-540-36389-0_2
Shamir A (1985) Identity-based cryptosystems and signature schemes. In: Blakley GR, Chaum D (eds) Advances in cryptology, volume 196 of lecture notes in computer science. Springer, Berlin, pp 47–53. ISBN 978-3-540-15658-1. doi:10.1007/3-540-39568-7_5
Sun J, Zhang C, Fang Y (2007) An id-based framework achieving privacy and non-repudiation in vehicular ad hoc networks. In: Military communications conference, 2007. MILCOM 2007. IEEE, pp 1–7. doi:10.1109/MILCOM.2007.4454834
Ting I-W, Chang Y-K (2013) Improved group-based cooperative caching scheme for mobile ad hoc networks. J Parallel Distrib Comput 73(5):595–607. ISSN 0743–7315. doi:10.1016/j.jpdc.2012.12.013. http://www.sciencedirect.com/science/article/pii/S0743731512002948
Tseng Y-M, Huang Y-H, Chang H-J (2012) Cca-secure anonymous multi-receiver id-based encryption. In: 26th international conference on advanced information networking and applications workshops (WAINA), pp 177–182, March 2012. doi:10.1109/WAINA.2012.50
Yin L, Cao G (2006) Supporting cooperative caching in ad hoc networks. IEEE Trans Mobile Comput 5(1):77–89. ISSN 1536–1233. doi:10.1109/TMC.2006.15
Zhao J, Zhang P, Cao G, Das CR (2010) Cooperative caching in wireless p2p networks: design, implementation, and evaluation. IEEE Trans Parallel Distrib Syst 21(2):229–241. ISSN 1045–9219. doi:10.1109/TPDS.2009.50
Acknowledgments
This paper is jointly supported by the National Natural Science Foundation of China (Grant No. 61173189), the Foundation for Innovative Research Team of Yunnan University, Guangdong Province Information Security Key Laboratory Project, Yunnan Province Software Engineering Key Laboratory Project (Grant No. 2015SE203).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wang, C., Shi, D., Xu, X. et al. An anonymous data access scheme for VANET using pseudonym-based cryptography. J Ambient Intell Human Comput 7, 63–71 (2016). https://doi.org/10.1007/s12652-015-0301-z
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-015-0301-z