Proceedings of the 1st ACM International Workshop on Quality of Service &Amp; Security in Wireless and Mobile Networks 2005
DOI: 10.1145/1089761.1089775
|View full text |Cite
|
Sign up to set email alerts
|

Balancing auditability and privacy in vehicular networks

Abstract: We investigate how to obtain a balance between privacy and audit requirements in vehicular networks. Challenging the current trend of relying on asymmetric primitives within VANETs, our investigation is a feasibility study of the use of symmetric primitives, resulting in some efficiency improvements of potential value. More specifically, we develop a realistic trust model, and an architecture that supports our solution. In order to ascertain that most users will not find it meaningful to disconnect or disable … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
42
0

Year Published

2008
2008
2018
2018

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 96 publications
(42 citation statements)
references
References 19 publications
(16 reference statements)
0
42
0
Order By: Relevance
“…At the heart of virtually all of these solutions lie encryption key agreements between various entities designed to bootstrap trust between communicating vehicles or between vehicles and the roadside infrastructure. Recently, a number of protocols have been developed for key agreement supporting confidentiality and authentication services in VANET [48,49,50,51,42]. There seems to be a consensus that while symmetric-key-based protocols tend to be simpler, some of these protocols are not sufficiently flexible for use in dynamically re-configurable networks, since they cannot efficiently handle unanticipated additions of vehicles to the network.…”
Section: Security and Privacy Issues In Vanetmentioning
confidence: 99%
“…At the heart of virtually all of these solutions lie encryption key agreements between various entities designed to bootstrap trust between communicating vehicles or between vehicles and the roadside infrastructure. Recently, a number of protocols have been developed for key agreement supporting confidentiality and authentication services in VANET [48,49,50,51,42]. There seems to be a consensus that while symmetric-key-based protocols tend to be simpler, some of these protocols are not sufficiently flexible for use in dynamically re-configurable networks, since they cannot efficiently handle unanticipated additions of vehicles to the network.…”
Section: Security and Privacy Issues In Vanetmentioning
confidence: 99%
“…Also to meet the overhead requirements in terms of either processing or bandwidth, Elliptic Curve Cryptography has been chosen for the IEEE 1609 trial standard. On the other hand, the authors in (Choi et al, 2005) suggest a system based exclusively on symmetric cryptography. The main problem of their proposal is that vehicles have to contact always the base station to decrypt and verify messages.…”
Section: Security Backgroundmentioning
confidence: 99%
“…However, most of these contributions [11][12][13][14][15][16][17][18][19][20] rely on a policy that grants trust to the RSU or the security center (also called authentication server) in the network not to trace the identity of a particular OBU (vehicle or driver) without a legal reason. Such policy threatens anonymity and may prevent drivers from joining the service.…”
Section: Previous and Related Workmentioning
confidence: 99%