Abstract
Location based services (LBSs) are promising value-added services in vehicular ad hoc networks (VANETs), which can yield substantial economic profits. To extensively deploy LBSs in VANETs, it is essential to establish an efficient privacy-preserving key management scheme. In this paper, we point out a privacy weakness in a recent key management scheme based on group signatures for LBSs in VANETs; then we propose a secure and privacy-enhanced version. In our scheme, roadside units (RSUs) act as group managers. Vehicles are distributed into groups maintained by these RSUs. If a vehicle’s member key is compromised, one just needs to update the group public key corresponding to its group manager. With this method, the member revocation and privacy leakage problems in schemes based on group signatures are solved effectively. As a result, a vehicle may enjoy LBSs efficiently without surrendering its privacy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
The operation system is Ubuntu 12.04 and exploiting the Miracl library [1].
References
Multiprecision integer and rational arithmetic C/C++ library (MIRACL). http://www.shamus.ie/
Boneh, D., Shacham, H.: Group signatures with verifier-local revocation. In: 11th ACM Conference on Computer Communications Security-CCS 2004, pp. 168–177 (2004)
Cheon, J.H., Yi, J.H.: Fast batch verification of multiple signatures. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 442–457. Springer, Heidelberg (2007)
Chim, T.W., Yiu, S.M., Hui, L.C.K., Li, V.O.K.: Security and privacy issues for inter-vehicle communications in VANETs. In: Procedings of 6th Annual IEEE Communications Society Conference on SECON Workshops, pp. 1–3 (2009)
Delerablée, C., Pointcheval, D.: Dynamic threshold public-key encryption. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 317–334. Springer, Heidelberg (2008)
Douceur, J.R.: The Sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)
Ferrara, A.L., Green, M., Hohenberger, S., Pedersen, M.Ø.: Practical short signature batch verification. In: Fischlin, M. (ed.) CT-RSA 2009. LNCS, vol. 5473, pp. 309–324. Springer, Heidelberg (2009)
Huang, J.-L., Yeh, L.-Y., Chien, H.-Y.: ABAKA: an anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks. IEEE Trans. Veh. Technol. 60(1), 248–262 (2011)
Lu, R., Lin, X., Liang, X., Shen, X.: A dynamic privacy-preserving key management scheme for location based services in VANETs. IEEE Trans. Intell. Transp. Syst. 13(1), 127–139 (2012)
Mahajan, S., Jindal, A.: Security and privacy in VANET to reduce authentication overhead for rapid roaming networks. Int. J. Comput. Appl. 1(20), 21–25 (2010)
Papadimitratos, P., Buttyan, L., Hubaux, J., Kargl, F., Kung, A., Raya, M.: Architecture for secure and private vehicular communications. In: 7th International Conference on Intelligent Transportation Systems-ITS 2007, pp. 1–6 (2007)
Raya, M., Aziz, A., Hubaux, J.: Efficient secure aggregation in VANETs. In: Proceedings of the 3rd International Workshop on Vehicular, Ad Hoc NetWorks 2006, pp. 67–75 (2006)
Raya, M., Hubaux, J.: The security of vehicular ad hoc networks. In: 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks-SASN 2005, pp. 11–21 (2005)
Wu, Q., Domingo-Ferrer, J., González-Nicolás, U.: Balanced trustworthiness, safety and privacy in vehicle-to-vehicle communications. IEEE Trans. Veh. Technol. 59(2), 559–573 (2010)
Wu, Q., Qin, B., Zhang, L., Domingo-Ferrer, J., Farràs, O.: Bridging broadcast encryption and group key agreement. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 143–160. Springer, Heidelberg (2011)
Zhang, C., Lu, R., Lin, X., Ho, P.-H., Shen, X.: An efficient identity-based batch verification scheme for vehicular sensor networks. In: 27th Conference on Computer Communications, pp. 246–250 (2008)
Zhang, L., Wu, Q., Qin, B., Domingo-Ferrer, J.: Practical privacy for value-added applications in vehicular Ad Hoc networks. In: Xiang, Y., Pathan, M., Tao, X., Wang, H. (eds.) IDCS 2012. LNCS, vol. 7646, pp. 43–56. Springer, Heidelberg (2012)
Zhang, L., Wu, Q., Qin, B., Domingo-Ferrer, J.: APPA: aggregate privacy-preserving authentication in vehicular Ad Hoc networks. In: Lai, X., Zhou, J., Li, H. (eds.) ISC 2011. LNCS, vol. 7001, pp. 293–308. Springer, Heidelberg (2011)
Zhang, L., Wu, Q., Solanas, A., Domingo-Ferrer, J.: A scalable robust authentication protocol for secure vehicular communications. IEEE Trans. Veh. Technol. 59(4), 1606–1617 (2010)
Acknowledgments and Disclaimer
Thanks goes to Chuanyan Hu and Ya Gao for the proofreading. This work was supported in part by the NSF of China under grants 61202465, 61021004, 11061130539, 91118008 and 61103222; EU FP7 under projects “DwB” and “Inter-Trust”; the Spanish Government under projects TIN2011-27076-C03-01 and CONSOLIDER INGENIO 2010 “ARES” CSD2007-0004; the Government of Catalonia under grant SGR2009-1135; the Shanghai NSF under grant no. 12ZR1443500; the Shanghai Chen Guang Program (12CG24); the Fundamental Research Funds for the Central Universities of China; the Open Project of Shanghai Key Laboratory of Trustworthy Computing (no. 07dz22304201101). J. Domingo-Ferrer was supported in part as an ICREA-Acadèmia researcher by the Government of Catalonia.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Liu, B., Zhang, L., Domingo-Ferrer, J. (2014). On the Security of a Privacy-Preserving Key Management Scheme for Location Based Services in VANETs. In: Danger, J., Debbabi, M., Marion, JY., Garcia-Alfaro, J., Zincir Heywood, N. (eds) Foundations and Practice of Security. FPS 2013. Lecture Notes in Computer Science(), vol 8352. Springer, Cham. https://doi.org/10.1007/978-3-319-05302-8_20
Download citation
DOI: https://doi.org/10.1007/978-3-319-05302-8_20
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-05301-1
Online ISBN: 978-3-319-05302-8
eBook Packages: Computer ScienceComputer Science (R0)