This book is a complete, single information source of techniques for complex security and privacy issues in vehicular ad hoc networks

* Take a cooperative approach towards addressing the technology's challenges of security and privacy issues

* Explores interdisciplinary methods by combining social science, cryptography, and privacy enhancing technique

* Richly illustrated with detailed designs and results for all approaches used

* Introduces standardization and industry activities, and government regulation in secure vehicular networking



Autorentext

Xiaodong Lin is an Associate Professor at the University of Ontario Institute of Technology in the Department of Business and Information Technology, Canada. He received his PhD in electrical and computer engineering at the University of Waterloo, Canada, and was awarded Outstanding Achievement in Graduate Studies at the PhD level. His research interests include wireless communications and network security, computer forensics, software security, and applied cryptography.
Rongxing Lu is an Assistant Professor at Nanyyang Technological University in the School of Electrical and Electronics Engineering, and an IEEE and IEEE ComSoc member. He received his PhD in Electrical and Computer Engineering at the University of Waterloo. His research interests include wireless network security, applied cryptography, and system security and data forensics.



Inhalt

List of Figures xi

List of Tables xv

Acronyms xvii

Preface xix

1 INTRODUCTION 1

1.1 Background 1

1.2 DSRC AND VANET 2

1.2.1 DSRC 2

1.2.2 VANET 3

1.2.3 Characteristics of VANET 6

1.3 Security and Privacy Threats 7

1.4 Security and Privacy Requirements 8

1.5 Challenges and Prospects 9

1.5.1 Conditional Privacy Preservation in VANETs 9

1.5.2 Authentication with Efficient Revocation in VANETs 10

1.6 Standardization and Related Activities 11

1.7 Security Primitives 13

1.8 Outline of the Book 17

References 17

2 GSIS: GROUP SIGNATURE AND ID-BASED SIGNATURE-BASED SECURE AND PRIVACY-PRESERVING PROTOCOL 21

2.1 Introduction 21

2.2 Preliminaries and Background 23

2.2.1 Group Signature 23

2.2.2 Bilinear Pairing and ID-Based Cryptography 23

2.2.3 Threat Model 23

2.2.4 Desired Requirements 24

2.3 Proposed Secure and Privacy-Preserving Protocol 25

2.3.1 Problem Formulation 25

2.3.2 System Setup 27

2.3.3 Security Protocol between OBUs 29

2.3.4 Security Protocol between RSUs and OBUs 38

2.4 Performance Evaluation 41

2.4.1 Impact of Traffic Load 43

2.4.2 Impact of Cryptographic Signature Verification Delay 43

2.4.3 Membership Revocation and Tracing Efficiency 45

2.5 Concluding Remarks 47

References 47

3 ECPP: EFFICIENT CONDITIONAL PRIVACY PRESERVATION PROTOCOL 51

3.1 Introduction 51

3.2 System Model and Problem Formulation 52

3.2.1 System Model 52

3.2.2 Design Objectives 54

3.3 Proposed ECPP Protocol 55

3.3.1 System Initialization 55

3.3.2 OBU Short-Time Anonymous Key Generation 56

3.3.3 OBU Safety Message Sending 62

3.3.4 OBU Fast Tracking Algorithm 63

3.4 Analysis on Conditional Privacy Preservation 64

3.5 Performance Analysis 66

3.5.1 OBU Storage Overhead 66

3.5.2 OBU Computation Overhead on Verification 66

3.5.3 TA Computation Complexity on OBU Tracking 68

3.6 Concluding Remarks 69

References 69

4 PSEUDONYM-CHANGING STRATEGY FOR LOCATION PRIVACY 71

4.1 Introduction 71

4.2 Problem Definition 73

4.2.1 Network Model 73

4.2.2 Threat Model 74

4.2.3 Location Privacy Requirements 75

4.3 Proposed PCS Strategy for Location Privacy 75

4.3.1 KPSD Model for PCS Strategy 75

4.3.2 Anonymity Set Analysis for Achieved Location Privacy 79

4.3.3 Feasibility Analysis of PCS Strategy 85

4.4 Performance Evaluation 86

4.5 Concluding Remarks 89

References 89

5 RSU-AIDED MESSAGE AUTHENTICATION 91

5.1 Introduction 91

5.2 System Model and Preliminaries 93

5.2.1 System Model 93

5.2.2 Assumption 93

5.2.3 Problem Statement 94

5.2.4 Security Objectives 95

5.3 Proposed RSU-Aided Message Authentication Scheme 96

5.3.1 Overview 96

5.3.2 Mutual Authentication and Key Agreement between RSUs and Vehicles 96

5.3.3 Hash Aggregation 98

5.3.4 Verification 99

5.3.5 Privacy Enhancement 100

5.4 Performance Evaluation 101

5.4.1 Message Loss Ratio 102

5.4.2 Message Delay 102

5.4.3 Communication Overhead 104

5.5 Security Analysis 105

5.6 Concluding Remarks 106

References 107

6 TESLA-BASED BROADCAST AUTHENTICATION 109

6.1 Introduction 109

6.2 Timed Efficient and Secure Vehicular Communication Scheme 110

6.2.1 Preliminaries 110

6.2.2 System Formulation 112

6.2.3 Proposed TSVC Scheme 113

6.2.4 Enhanced TSVC with N...

Titel
Vehicular Ad Hoc Network Security and Privacy
EAN
9781119082156
ISBN
978-1-119-08215-6
Format
E-Book (pdf)
Herausgeber
Veröffentlichung
02.06.2015
Digitaler Kopierschutz
Adobe-DRM
Dateigrösse
10.47 MB
Anzahl Seiten
216
Jahr
2015
Untertitel
Englisch