Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

On the Security of a Privacy-Preserving Key Management Scheme for Location Based Services in VANETs

  • Conference paper
  • First Online:
Foundations and Practice of Security (FPS 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8352))

Included in the following conference series:

Abstract

Location based services (LBSs) are promising value-added services in vehicular ad hoc networks (VANETs), which can yield substantial economic profits. To extensively deploy LBSs in VANETs, it is essential to establish an efficient privacy-preserving key management scheme. In this paper, we point out a privacy weakness in a recent key management scheme based on group signatures for LBSs in VANETs; then we propose a secure and privacy-enhanced version. In our scheme, roadside units (RSUs) act as group managers. Vehicles are distributed into groups maintained by these RSUs. If a vehicle’s member key is compromised, one just needs to update the group public key corresponding to its group manager. With this method, the member revocation and privacy leakage problems in schemes based on group signatures are solved effectively. As a result, a vehicle may enjoy LBSs efficiently without surrendering its privacy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    The operation system is Ubuntu 12.04 and exploiting the Miracl library [1].

References

  1. Multiprecision integer and rational arithmetic C/C++ library (MIRACL). http://www.shamus.ie/

  2. Boneh, D., Shacham, H.: Group signatures with verifier-local revocation. In: 11th ACM Conference on Computer Communications Security-CCS 2004, pp. 168–177 (2004)

    Google Scholar 

  3. Cheon, J.H., Yi, J.H.: Fast batch verification of multiple signatures. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 442–457. Springer, Heidelberg (2007)

    Google Scholar 

  4. Chim, T.W., Yiu, S.M., Hui, L.C.K., Li, V.O.K.: Security and privacy issues for inter-vehicle communications in VANETs. In: Procedings of 6th Annual IEEE Communications Society Conference on SECON Workshops, pp. 1–3 (2009)

    Google Scholar 

  5. Delerablée, C., Pointcheval, D.: Dynamic threshold public-key encryption. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 317–334. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  6. Douceur, J.R.: The Sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)

    Google Scholar 

  7. Ferrara, A.L., Green, M., Hohenberger, S., Pedersen, M.Ø.: Practical short signature batch verification. In: Fischlin, M. (ed.) CT-RSA 2009. LNCS, vol. 5473, pp. 309–324. Springer, Heidelberg (2009)

    Google Scholar 

  8. Huang, J.-L., Yeh, L.-Y., Chien, H.-Y.: ABAKA: an anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks. IEEE Trans. Veh. Technol. 60(1), 248–262 (2011)

    Article  Google Scholar 

  9. Lu, R., Lin, X., Liang, X., Shen, X.: A dynamic privacy-preserving key management scheme for location based services in VANETs. IEEE Trans. Intell. Transp. Syst. 13(1), 127–139 (2012)

    Article  Google Scholar 

  10. Mahajan, S., Jindal, A.: Security and privacy in VANET to reduce authentication overhead for rapid roaming networks. Int. J. Comput. Appl. 1(20), 21–25 (2010)

    Google Scholar 

  11. Papadimitratos, P., Buttyan, L., Hubaux, J., Kargl, F., Kung, A., Raya, M.: Architecture for secure and private vehicular communications. In: 7th International Conference on Intelligent Transportation Systems-ITS 2007, pp. 1–6 (2007)

    Google Scholar 

  12. Raya, M., Aziz, A., Hubaux, J.: Efficient secure aggregation in VANETs. In: Proceedings of the 3rd International Workshop on Vehicular, Ad Hoc NetWorks 2006, pp. 67–75 (2006)

    Google Scholar 

  13. Raya, M., Hubaux, J.: The security of vehicular ad hoc networks. In: 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks-SASN 2005, pp. 11–21 (2005)

    Google Scholar 

  14. Wu, Q., Domingo-Ferrer, J., González-Nicolás, U.: Balanced trustworthiness, safety and privacy in vehicle-to-vehicle communications. IEEE Trans. Veh. Technol. 59(2), 559–573 (2010)

    Article  Google Scholar 

  15. Wu, Q., Qin, B., Zhang, L., Domingo-Ferrer, J., Farràs, O.: Bridging broadcast encryption and group key agreement. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 143–160. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  16. Zhang, C., Lu, R., Lin, X., Ho, P.-H., Shen, X.: An efficient identity-based batch verification scheme for vehicular sensor networks. In: 27th Conference on Computer Communications, pp. 246–250 (2008)

    Google Scholar 

  17. Zhang, L., Wu, Q., Qin, B., Domingo-Ferrer, J.: Practical privacy for value-added applications in vehicular Ad Hoc networks. In: Xiang, Y., Pathan, M., Tao, X., Wang, H. (eds.) IDCS 2012. LNCS, vol. 7646, pp. 43–56. Springer, Heidelberg (2012)

    Google Scholar 

  18. Zhang, L., Wu, Q., Qin, B., Domingo-Ferrer, J.: APPA: aggregate privacy-preserving authentication in vehicular Ad Hoc networks. In: Lai, X., Zhou, J., Li, H. (eds.) ISC 2011. LNCS, vol. 7001, pp. 293–308. Springer, Heidelberg (2011)

    Google Scholar 

  19. Zhang, L., Wu, Q., Solanas, A., Domingo-Ferrer, J.: A scalable robust authentication protocol for secure vehicular communications. IEEE Trans. Veh. Technol. 59(4), 1606–1617 (2010)

    Article  Google Scholar 

Download references

Acknowledgments and Disclaimer

Thanks goes to Chuanyan Hu and Ya Gao for the proofreading. This work was supported in part by the NSF of China under grants 61202465, 61021004, 11061130539, 91118008 and 61103222; EU FP7 under projects “DwB” and “Inter-Trust”; the Spanish Government under projects TIN2011-27076-C03-01 and CONSOLIDER INGENIO 2010 “ARES” CSD2007-0004; the Government of Catalonia under grant SGR2009-1135; the Shanghai NSF under grant no. 12ZR1443500; the Shanghai Chen Guang Program (12CG24); the Fundamental Research Funds for the Central Universities of China; the Open Project of Shanghai Key Laboratory of Trustworthy Computing (no. 07dz22304201101). J. Domingo-Ferrer was supported in part as an ICREA-Acadèmia researcher by the Government of Catalonia.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lei Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Liu, B., Zhang, L., Domingo-Ferrer, J. (2014). On the Security of a Privacy-Preserving Key Management Scheme for Location Based Services in VANETs. In: Danger, J., Debbabi, M., Marion, JY., Garcia-Alfaro, J., Zincir Heywood, N. (eds) Foundations and Practice of Security. FPS 2013. Lecture Notes in Computer Science(), vol 8352. Springer, Cham. https://doi.org/10.1007/978-3-319-05302-8_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-05302-8_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-05301-1

  • Online ISBN: 978-3-319-05302-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics