ebook img

Vehicular Ad Hoc Network Security and Privacy PDF

217 Pages·2015·10.473 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Vehicular Ad Hoc Network Security and Privacy

VEHICULAR AD HOC NETWORK SECURITY AND PRIVACY IEEEPress 445HoesLane Piscataway,NJ08854 IEEEPressEditorialBoard TariqSamad,EditorinChief GeorgeW.Arnold VladimirLumelsky LindaShafer DmitryGoldgof Pui-InMak ZidongWang EkramHossain JeffreyNanzer MengChuZhou MaryLanzerotti RayPerez GeorgeZobrist KennethMoore,DirectorofIEEEBookandInformationServices(BIS) TechnicalReviewer JelenaMisic,RyersonUniversity,Canada VEHICULAR AD HOC NETWORK SECURITY AND PRIVACY Xiaodong Lin Rongxing Lu Copyright©2015byTheInstituteofElectricalandElectronicsEngineers,Inc. PublishedbyJohnWiley&Sons,Inc.,Hoboken,NewJersey.Allrightsreserved. PublishedsimultaneouslyinCanada. Nopartofthispublicationmaybereproduced,storedinaretrievalsystem,ortransmittedinanyformorby anymeans,electronic,mechanical,photocopying,recording,scanning,orotherwise,exceptaspermitted underSection107or108ofthe1976UnitedStatesCopyrightAct,withouteitherthepriorwritten permissionofthePublisher,orauthorizationthroughpaymentoftheappropriateper-copyfeetothe CopyrightClearanceCenter,Inc.,222RosewoodDrive,Danvers,MA01923,(978)646-8400,fax(978) 750-4470,oronthewebatwww.copyright.com.RequeststothePublisherforpermissionshouldbe addressedtothePermissionsDepartment,JohnWiley&Sons,Inc.,111RiverStreet,Hoboken,NJ07030, (201)748-6011,fax(201)748-6008,oronlineathttp://www.wiley.com/go/permission. LimitofLiability/DisclaimerofWarranty:Whilethepublisherandauthorhaveusedtheirbesteffortsin preparingthisbook,theymakenorepresentationsorwarrantieswithrespecttotheaccuracyorcompleteness ofthecontentsofthisbookandspecificallydisclaimanyimpliedwarrantiesofmerchantabilityorfitnessfor aparticularpurpose.Nowarrantymaybecreatedorextendedbysalesrepresentativesorwrittensales materials.Theadviceandstrategiescontainedhereinmaynotbesuitableforyoursituation.Youshould consultwithaprofessionalwhereappropriate.Neitherthepublishernortheauthorshallbeliableforanyloss ofprofitoranyothercommercialdamages,includingbutnotlimitedtospecial,incidental,consequential,or otherdamages. Forgeneralinformationonourotherproductsandservicesorfortechnicalsupport,pleasecontactour CustomerCareDepartmentwithintheUnitedStatesat(800)762-2974,outsidetheUnitedStatesat (317)572-3993orfax(317)572-4002. Wileyalsopublishesitsbooksinavarietyofelectronicformats.Somecontentthatappearsinprintmaynot beavailableinelectronicformats.FormoreinformationaboutWileyproducts,visitourwebsiteat www.wiley.com. LibraryofCongressCataloging-in-PublicationDataisavailable. ISBN:978-1-118-91390-1 PrintedintheUnitedStatesofAmerica. 10 9 8 7 6 5 4 3 2 1 CONTENTS ListofFigures xi ListofTables xv Acronyms xvii Preface xix 1 INTRODUCTION 1 1.1 Background 1 1.2 DSRCANDVANET 2 1.2.1 DSRC 2 1.2.2 VANET 3 1.2.3 CharacteristicsofVANET 6 1.3 SecurityandPrivacyThreats 7 1.4 SecurityandPrivacyRequirements 8 1.5 ChallengesandProspects 9 1.5.1 ConditionalPrivacyPreservationinVANETs 9 1.5.2 AuthenticationwithEfficientRevocationinVANETs 10 1.6 StandardizationandRelatedActivities 11 1.7 SecurityPrimitives 13 1.8 OutlineoftheBook 17 References 17 2 GSIS: GROUP SIGNATURE AND ID-BASED SIGNATURE-BASED SECURE AND PRIVACY-PRESERVING PROTOCOL 21 2.1 Introduction 21 2.2 PreliminariesandBackground 23 2.2.1 GroupSignature 23 2.2.2 BilinearPairingandID-BasedCryptography 23 2.2.3 ThreatModel 23 2.2.4 DesiredRequirements 24 2.3 ProposedSecureandPrivacy-PreservingProtocol 25 2.3.1 ProblemFormulation 25 2.3.2 SystemSetup 27 v vi CONTENTS 2.3.3 SecurityProtocolbetweenOBUs 29 2.3.4 SecurityProtocolbetweenRSUsandOBUs 38 2.4 PerformanceEvaluation 41 2.4.1 ImpactofTrafficLoad 43 2.4.2 ImpactofCryptographicSignatureVerificationDelay 43 2.4.3 MembershipRevocationandTracingEfficiency 45 2.5 ConcludingRemarks 47 References 47 3 ECPP: EFFICIENT CONDITIONAL PRIVACY PRESERVATION PROTOCOL 51 3.1 Introduction 51 3.2 SystemModelandProblemFormulation 52 3.2.1 SystemModel 52 3.2.2 DesignObjectives 54 3.3 ProposedECPPProtocol 55 3.3.1 SystemInitialization 55 3.3.2 OBUShort-TimeAnonymousKeyGeneration 56 3.3.3 OBUSafetyMessageSending 62 3.3.4 OBUFastTrackingAlgorithm 63 3.4 AnalysisonConditionalPrivacyPreservation 64 3.5 PerformanceAnalysis 66 3.5.1 OBUStorageOverhead 66 3.5.2 OBUComputationOverheadonVerification 66 3.5.3 TAComputationComplexityonOBUTracking 68 3.6 ConcludingRemarks 69 References 69 4 PSEUDONYM-CHANGING STRATEGY FOR LOCATION PRIVACY 71 4.1 Introduction 71 4.2 ProblemDefinition 73 4.2.1 NetworkModel 73 4.2.2 ThreatModel 74 4.2.3 LocationPrivacyRequirements 75 4.3 ProposedPCSStrategyforLocationPrivacy 75 4.3.1 KPSDModelforPCSStrategy 75 CONTENTS vii 4.3.2 AnonymitySetAnalysisforAchievedLocationPrivacy 79 4.3.3 FeasibilityAnalysisofPCSStrategy 85 4.4 PerformanceEvaluation 86 4.5 ConcludingRemarks 89 References 89 5 RSU-AIDED MESSAGE AUTHENTICATION 91 5.1 Introduction 91 5.2 SystemModelandPreliminaries 93 5.2.1 SystemModel 93 5.2.2 Assumption 93 5.2.3 ProblemStatement 94 5.2.4 SecurityObjectives 95 5.3 ProposedRSU-AidedMessageAuthenticationScheme 96 5.3.1 Overview 96 5.3.2 MutualAuthenticationandKeyAgreementbetween RSUsandVehicles 96 5.3.3 HashAggregation 98 5.3.4 Verification 99 5.3.5 PrivacyEnhancement 100 5.4 PerformanceEvaluation 101 5.4.1 MessageLossRatio 102 5.4.2 MessageDelay 102 5.4.3 CommunicationOverhead 104 5.5 SecurityAnalysis 105 5.6 ConcludingRemarks 106 References 107 6 TESLA-BASED BROADCAST AUTHENTICATION 109 6.1 Introduction 109 6.2 TimedEfficientandSecureVehicularCommunicationScheme 110 6.2.1 Preliminaries 110 6.2.2 SystemFormulation 112 6.2.3 ProposedTSVCScheme 113 6.2.4 EnhancedTSVCwithNonrepudiation 118 6.2.5 Discussion 123 6.3 SecurityAnalysis 129 viii CONTENTS 6.4 PerformanceEvaluation 129 6.4.1 ImpactofVehicleMovingSpeed 131 6.4.2 ImpactofVehicleDensity 132 6.5 ConcludingRemarks 134 References 134 7 DISTRIBUTED COOPERATIVE MESSAGE AUTHENTICATION 137 7.1 Introduction 137 7.2 ProblemFormulation 138 7.2.1 NetworkModel 138 7.2.2 SecurityModel 139 7.3 BasicCooperativeAuthenticationScheme 140 7.4 SecureCooperativeAuthenticationScheme 141 7.4.1 EvidenceandTokenforFairness 142 7.4.2 AuthenticationProof 145 7.4.3 FlowsofProposedScheme 146 7.5 SecurityAnalysis 147 7.5.1 LinkabilityAttack 147 7.5.2 Free-RidingAttackwithoutAuthenticationEfforts 147 7.5.3 Free-RidingAttackwithFakeAuthenticationEfforts 148 7.6 PerformanceEvaluation 148 7.6.1 SimulationSettings 148 7.6.2 SimulationResults 149 7.7 ConcludingRemarks 150 References 151 8 CONTEXT-AWARE COOPERATIVE AUTHENTICATION 153 8.1 Introduction 153 8.2 MessageTrustworthinessinVANETs 156 8.3 SystemModelandDesignGoal 159 8.3.1 NetworkModel 159 8.3.2 AttackModel 159 8.3.3 DesignGoals 160 8.4 Preliminaries 160 8.4.1 PairingTechnique 160 8.4.2 AggregateSignatureandBatchVerification 160 8.5 ProposedAEMATScheme 161 8.5.1 SystemSetup 161

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.