Abstract:We propose in this paper a security protocol based on periodic change of pseudonyms. The idea is to avoid illegal traceability of vehicles during their communications and preserve their privacy and confidential information. Two different approaches are proposed. In the first approach, each vehicle asks the central authority a new communication pseudonym after a time t. While in the second approach, each vehicle generates itself after a time t, a new communication pseudonym. Our objective is to permit at least … Show more
“…The results obtained by our simulation show the efficiency of our solution. Comparing them to the works of Adigun et al and Aoudjit and Bensaber, our results are better. In the aforementioned works, authors used 100 and 200 vehicles.…”
Section: Performance and Analysissupporting
confidence: 51%
“…Adigun et al proposed a model of pseudonyms that change periodically, using two approaches. In the first approach, each time the vehicle requests new pseudonym from a trusted authority.…”
Section: State Of the Artmentioning
confidence: 99%
“…These works are based on four categories: 1/ digital signature, 3 2/ cryptography, 4,5 3/ change of pseudonyms, 6-8 and 4/ mathematical models. 9,10 All these works propose solutions to protect privacy in VANET.…”
Section: State Of the Artmentioning
confidence: 99%
“…Authors in other works [6][7][8][9][10][13][14][15][16]19 propose no-complete solution of pseudonyms change. In the work of Calandriello et al, 6 the change of pseudonym periodically causes a low security.…”
Section: State Of the Artmentioning
confidence: 99%
“…Comparing them to the works of Adigun et al 9 and Aoudjit and Bensaber, 10 our results are better. In the aforementioned works, 9,10 authors used 100 and 200 vehicles. Here, we used between 1000 and 5000 vehicles.…”
Summary
We propose in this paper a security protocol based on a dynamic change of pseudonym for privacy and anonymity in Vehicular Ad hoc NETworks (VANET). Our proposal ensures privacy for the driver and his vehicle whether he is the transmitter or receiver of the message. By handling all possible cases of changes in vehicles behavior during traffic, we ensure a safe and secure traffic management. We built the architecture of our solution on three essential entities designed for VANET: a trusted authority, a Road Side Unit, and vehicles. Our pseudonym change system ensures anonymity at any time, anywhere, with any speed of a vehicle, in all directions of a vehicle, in any environment (highway or urban), with any traffic density, independently of neighboring vehicles, and changes in vehicles behavior. In three steps, anonymity, integrity, and confidentiality are guaranteed by our RIN (Real Initial New) protocol. Our protocol blocks attacks as DOS and Sybil. Results obtained by the simulations show the efficiency of our solution. Compared with other relevant approaches from the literature, the results confirm the credibility of our protocol regarding to the privacy assurance in VANET.
“…The results obtained by our simulation show the efficiency of our solution. Comparing them to the works of Adigun et al and Aoudjit and Bensaber, our results are better. In the aforementioned works, authors used 100 and 200 vehicles.…”
Section: Performance and Analysissupporting
confidence: 51%
“…Adigun et al proposed a model of pseudonyms that change periodically, using two approaches. In the first approach, each time the vehicle requests new pseudonym from a trusted authority.…”
Section: State Of the Artmentioning
confidence: 99%
“…These works are based on four categories: 1/ digital signature, 3 2/ cryptography, 4,5 3/ change of pseudonyms, 6-8 and 4/ mathematical models. 9,10 All these works propose solutions to protect privacy in VANET.…”
Section: State Of the Artmentioning
confidence: 99%
“…Authors in other works [6][7][8][9][10][13][14][15][16]19 propose no-complete solution of pseudonyms change. In the work of Calandriello et al, 6 the change of pseudonym periodically causes a low security.…”
Section: State Of the Artmentioning
confidence: 99%
“…Comparing them to the works of Adigun et al 9 and Aoudjit and Bensaber, 10 our results are better. In the aforementioned works, 9,10 authors used 100 and 200 vehicles. Here, we used between 1000 and 5000 vehicles.…”
Summary
We propose in this paper a security protocol based on a dynamic change of pseudonym for privacy and anonymity in Vehicular Ad hoc NETworks (VANET). Our proposal ensures privacy for the driver and his vehicle whether he is the transmitter or receiver of the message. By handling all possible cases of changes in vehicles behavior during traffic, we ensure a safe and secure traffic management. We built the architecture of our solution on three essential entities designed for VANET: a trusted authority, a Road Side Unit, and vehicles. Our pseudonym change system ensures anonymity at any time, anywhere, with any speed of a vehicle, in all directions of a vehicle, in any environment (highway or urban), with any traffic density, independently of neighboring vehicles, and changes in vehicles behavior. In three steps, anonymity, integrity, and confidentiality are guaranteed by our RIN (Real Initial New) protocol. Our protocol blocks attacks as DOS and Sybil. Results obtained by the simulations show the efficiency of our solution. Compared with other relevant approaches from the literature, the results confirm the credibility of our protocol regarding to the privacy assurance in VANET.
In this paper, we introduce an efficient and dynamic elliptic curve qu-vanstone implicit certificates distribution scheme for vehicular cloud networks. We are concerned about how to achieve efficiently and dynamically certificates distribution with a reduced cost. We design an efficient mechanism that reduces the communication cost and the computational overhead for more safety and robustness of intelligent transportation systems. Our proposal enables vehicles to request and obtain implicit certificates upon a secure request, which can be used for further signing exchanged messages. Due to the restricted nature of these certificates, a simple and efficient revocation method has been presented. It is literally based on selective revocation message delivery technique that reduces the number of messages needed for revocation phase and solves a bunch of drawbacks of existing solutions. An extensive analysis is performed to demonstrate how the proposed scheme can dynamically carry out an effective certificates distribution. We further discuss and evaluate simulation results to demonstrate the merits gained by the proposed protocol.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.