© The Institution of Engineering and Technology
In this study, the authors introduce a highly dynamic and manageable average speed monitoring system. They define a privacy preserving security protocol in which vehicles hold a pseudonymous non-traceable private digital identity. Vehicle's identity is kept undisclosed for as long as the average speed over a designated road section does not exceed the specified limit. During the protocol execution, non-refutable evidences are built for vehicles and authorities, for future disputes. Finally, the security properties of the protocol are formally proven using BAN logic and, a metric is defined to measure the reliability and feasibility of the author's proposal.
References
-
-
1)
-
10. Raya, M., Hubaux, J.-P.: ‘The security of vehicular ad hoc networks’. Proc. Third ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN'05, 2005, pp. 11–21.
-
2)
-
3)
-
2. Rivas, D.A., Barcel-Ordinas, J.M., Zapata, M.G., Morillo-Pozo, J.D.: ‘Security on vanets: privacy, misbehaving nodes, false information and secure data aggregation’, J. Netw. Comput. Appl., 2011, 34, (6), pp. 1942–1955 (doi: 10.1016/j.jnca.2011.07.006).
-
4)
-
18. Guo, J., Baugh, J., Wang, S.: ‘A group signature based secure and privacy preserving vehicular communication framework’. Proc. Mobile Networking for Vehicular Environments, 2007, pp. 103–108.
-
5)
-
11. Calandriello, G., Papadimitratos, P., Hubaux, J.-P., Lioy, A.: ‘Efficient and robust pseudonymous authentication in vanet’. Proc. Fourth ACM Int. Workshop on Vehicular Ad Hoc Networks, 2007, pp. 19–28.
-
6)
-
17. Zhang, C., Lin, X., Lu, R., Ho, P.-H., Shen, X.: ‘An efficient message authentication scheme for vehicular communications’, IEEE Trans. Veh. Technol., 2008, 57, (6), pp. 3357–3368 (doi: 10.1109/TVT.2008.928581).
-
7)
-
12. Sun, J., Zhang, C., Fang, Y.: ‘An id-based framework achieving privacy and non-repudiation in vehicular ad hoc networks’. IEEE Military Communications Conf., 2007, MILCOM 2007, 2007, pp. 1–7.
-
8)
-
21. Jiang, D., Delgrossi, L.: ‘Ieee 802.11p: Towards an international standard for wireless access in vehicular environments’. IEEE In Vehicular Technology Conf., 2008, pp. 2036–2040.
-
9)
-
3. Gehlot, N.: ‘System and method for speed limit enforcement’. , December 2000.
-
10)
-
27. Buttyán, L., Holczer, T., Vajda, I.: ‘On the effectiveness of changing pseudonyms to provide location privacy in vanets’. Proc. Fourth European Conf. on Security and Privacy in Ad-Hoc and Sensor Networks, ESAS'07, 2007, pp. 129–141.
-
11)
-
16. de Fuentes, J., González-Manzano, L., González-Tablas, A., Blasco, J.: ‘Wevan a mechanism for evidence creation and verification in vanets’, J. Syst. Archit., 2013, 59, (10), pp. 985–995 (doi: 10.1016/j.sysarc.2013.07.009).
-
12)
-
M. Burrows ,
M. Abadi ,
R. Needham
.
A logic of authentication.
ACM Trans. Comput. Syst.
,
18 -
36
-
13)
-
D. Dolev ,
A.C. Yao
.
On the security of public key protocols.
IEEE Trans. Inf. Theory
,
2 ,
198 -
207
-
14)
-
1. Nissenbaum, H.: ‘Privacy in context: technology, policy, and the integrity of social life’ (Stanford University Press, 2009).
-
15)
-
29. Bai, F., Krishnan, H.: ‘Reliability analysis of DSRC wireless communication for vehicle safety applications’. Proc. Nineth Int. IEEE Conf. on Intelligent Transportation Systems (ITSC), 2006, pp. 355–362.
-
16)
-
5. de Fuentes, J., González-Tablas, A., Hernández-Ardieta, J., Ribagorda, A.: ‘Towards an automatic enforcement for speeding: enhanced model and intelligent transportation systems realisation’, IET Intell. Transp. Syst., 2012, 6, (3), pp. 270–281 (doi: 10.1049/iet-its.2011.0160).
-
17)
-
O.M.J. Carsten ,
F.N. Tate
.
Intelligent speed adaptation: accident savings and cost-benefit analysis.
Acc. Anal. Prev.
,
3 ,
407 -
416
-
18)
-
4. Qadri, M., Asif, M.: ‘Automatic number plate recognition system for vehicle identification using optical character recognition’. Proc. Int. Conf. on Education Technology and Computer, 2009, pp. 335–338.
-
19)
-
30. Du, Y., Zhang, L., Feng, Y., Ren, Z., Wang, Z.: ‘Performance analysis and enhancement of IEEE 802.11p/1609 protocol family in vehicular environments’. Proc. 13th Int. IEEE Conf. on Intelligent Transportation Systems (ITSC), 2010, pp. 1085–1090.
-
20)
-
19. Wolf, M., Weimerskirch, A., Paar, C.: ‘Security in automotive bus systems’. Proc. Workshop on Embedded IT-Security in Cars (escar), 2004, pp. 1–13.
-
21)
-
6. Raya, M., Papadimitratos, P., Aad, I., Jungels, D., Hubaux, J.-P.: ‘Eviction of misbehaving and faulty nodes in vehicular networks’, IEEE J. Sel. Areas Commun., 2007, 25, (8), pp. 1557–1568 (doi: 10.1109/JSAC.2007.071006).
-
22)
-
23)
-
24. Kenney, J.B.: ‘Dedicated short-range communications (dsrc) standards in the united states’. Proc. IEEE, 2011, vol. 99, pp. 1162–1182.
-
24)
-
25)
-
15. Sun, J., Zhang, C., Zhang, Y., Fang, Y.: ‘An identity-based security system for user privacy in vehicular ad hoc networks’, IEEE Trans. Parallel Distrib. Syst., 2010, 21, (9), pp. 1227–1239 (doi: 10.1109/TPDS.2010.14).
-
26)
-
14. Schaub, F., Kargl, F., Ma, Z., Weber, M.: ‘V-tokens for conditional pseudonymity in vanets’. IEEE Wireless Communications and Networking Conf. (WCNC), 2010, pp. 1–6.
-
27)
-
8. Mäkinen, T., Zaidel, D.M., Andersson, G., et al: ‘Traffic enforcement in Europe: effects, measures, needs and future’. , Enhanced Safety Coming from Appropriate Police Enforcement, 22 February 2010, .
-
28)
-
29)
-
13. Kamat, P., Baliga, A., Trappe, W.: ‘An identity-based security framework for vanets’. Proc. Third Int. Workshop on Vehicular Ad Hoc Networks, VANET'06, 2006, pp. 94–95.
-
30)
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-its.2013.0202
Related content
content/journals/10.1049/iet-its.2013.0202
pub_keyword,iet_inspecKeyword,pub_concept
6
6