Privacy – aware average speed monitoring system for vehicular ad-hoc networks
- Author(s): Almudena Alcaide 1 ; Esther Palomar 2 ; José M. Fuentes 3 ; Lorena González-Manzano 3
-
-
View affiliations
-
Affiliations:
1:
Cyber Academy, IT-ERS at Deloitte, Spain;
2: School of Computing, Engineering and the Built Environment, Birmingham City University, UK;
3: Department of Computer Science and Engineering, University Carlos III of Madrid, Spain
-
Affiliations:
1:
Cyber Academy, IT-ERS at Deloitte, Spain;
- Source:
Volume 9, Issue 3,
April 2015,
p.
293 – 305
DOI: 10.1049/iet-its.2013.0202 , Print ISSN 1751-956X, Online ISSN 1751-9578
In this study, the authors introduce a highly dynamic and manageable average speed monitoring system. They define a privacy preserving security protocol in which vehicles hold a pseudonymous non-traceable private digital identity. Vehicle's identity is kept undisclosed for as long as the average speed over a designated road section does not exceed the specified limit. During the protocol execution, non-refutable evidences are built for vehicles and authorities, for future disputes. Finally, the security properties of the protocol are formally proven using BAN logic and, a metric is defined to measure the reliability and feasibility of the author's proposal.
Inspec keywords: telecommunication security; velocity measurement; vehicular ad hoc networks; data privacy; cryptographic protocols
Other keywords: vehicle identity; road section; BAN logic; privacy preserving security protocol; nonrefutable evidences; pseudonymous nontraceable private digital identity; privacy-aware average speed monitoring system; protocol execution; vehicular ad-hoc networks; reliability
Subjects: Mobile radio systems; Velocity, acceleration and rotation measurement; Protocols; Cryptography
References
-
-
1)
-
10. Raya, M., Hubaux, J.-P.: ‘The security of vehicular ad hoc networks’. Proc. Third ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN'05, 2005, pp. 11–21.
-
-
2)
-
28. I. SAE, Draft SAE J2735. Dedicated Short Range Communications (DSRC) Message Set Dictionary rev 29, 2009.
-
-
3)
-
2. Rivas, D.A., Barcel-Ordinas, J.M., Zapata, M.G., Morillo-Pozo, J.D.: ‘Security on vanets: privacy, misbehaving nodes, false information and secure data aggregation’, J. Netw. Comput. Appl., 2011, 34, (6), pp. 1942–1955 (doi: 10.1016/j.jnca.2011.07.006).
-
-
4)
-
18. Guo, J., Baugh, J., Wang, S.: ‘A group signature based secure and privacy preserving vehicular communication framework’. Proc. Mobile Networking for Vehicular Environments, 2007, pp. 103–108.
-
-
5)
-
11. Calandriello, G., Papadimitratos, P., Hubaux, J.-P., Lioy, A.: ‘Efficient and robust pseudonymous authentication in vanet’. Proc. Fourth ACM Int. Workshop on Vehicular Ad Hoc Networks, 2007, pp. 19–28.
-
-
6)
-
17. Zhang, C., Lin, X., Lu, R., Ho, P.-H., Shen, X.: ‘An efficient message authentication scheme for vehicular communications’, IEEE Trans. Veh. Technol., 2008, 57, (6), pp. 3357–3368 (doi: 10.1109/TVT.2008.928581).
-
-
7)
-
12. Sun, J., Zhang, C., Fang, Y.: ‘An id-based framework achieving privacy and non-repudiation in vehicular ad hoc networks’. IEEE Military Communications Conf., 2007, MILCOM 2007, 2007, pp. 1–7.
-
-
8)
-
21. Jiang, D., Delgrossi, L.: ‘Ieee 802.11p: Towards an international standard for wireless access in vehicular environments’. IEEE In Vehicular Technology Conf., 2008, pp. 2036–2040.
-
-
9)
-
3. Gehlot, N.: ‘System and method for speed limit enforcement’. US Patent 6,163,277, December 2000.
-
-
10)
-
27. Buttyán, L., Holczer, T., Vajda, I.: ‘On the effectiveness of changing pseudonyms to provide location privacy in vanets’. Proc. Fourth European Conf. on Security and Privacy in Ad-Hoc and Sensor Networks, ESAS'07, 2007, pp. 129–141.
-
-
11)
-
16. de Fuentes, J., González-Manzano, L., González-Tablas, A., Blasco, J.: ‘Wevan a mechanism for evidence creation and verification in vanets’, J. Syst. Archit., 2013, 59, (10), pp. 985–995 (doi: 10.1016/j.sysarc.2013.07.009).
-
-
12)
- M. Burrows , M. Abadi , R. Needham . A logic of authentication. ACM Trans. Comput. Syst. , 18 - 36
-
13)
- D. Dolev , A.C. Yao . On the security of public key protocols. IEEE Trans. Inf. Theory , 2 , 198 - 207
-
14)
-
1. Nissenbaum, H.: ‘Privacy in context: technology, policy, and the integrity of social life’ (Stanford University Press, 2009).
-
-
15)
-
29. Bai, F., Krishnan, H.: ‘Reliability analysis of DSRC wireless communication for vehicle safety applications’. Proc. Nineth Int. IEEE Conf. on Intelligent Transportation Systems (ITSC), 2006, pp. 355–362.
-
-
16)
-
5. de Fuentes, J., González-Tablas, A., Hernández-Ardieta, J., Ribagorda, A.: ‘Towards an automatic enforcement for speeding: enhanced model and intelligent transportation systems realisation’, IET Intell. Transp. Syst., 2012, 6, (3), pp. 270–281 (doi: 10.1049/iet-its.2011.0160).
-
-
17)
- O.M.J. Carsten , F.N. Tate . Intelligent speed adaptation: accident savings and cost-benefit analysis. Acc. Anal. Prev. , 3 , 407 - 416
-
18)
-
4. Qadri, M., Asif, M.: ‘Automatic number plate recognition system for vehicle identification using optical character recognition’. Proc. Int. Conf. on Education Technology and Computer, 2009, pp. 335–338.
-
-
19)
-
30. Du, Y., Zhang, L., Feng, Y., Ren, Z., Wang, Z.: ‘Performance analysis and enhancement of IEEE 802.11p/1609 protocol family in vehicular environments’. Proc. 13th Int. IEEE Conf. on Intelligent Transportation Systems (ITSC), 2010, pp. 1085–1090.
-
-
20)
-
19. Wolf, M., Weimerskirch, A., Paar, C.: ‘Security in automotive bus systems’. Proc. Workshop on Embedded IT-Security in Cars (escar), 2004, pp. 1–13.
-
-
21)
-
6. Raya, M., Papadimitratos, P., Aad, I., Jungels, D., Hubaux, J.-P.: ‘Eviction of misbehaving and faulty nodes in vehicular networks’, IEEE J. Sel. Areas Commun., 2007, 25, (8), pp. 1557–1568 (doi: 10.1109/JSAC.2007.071006).
-
-
22)
-
25. S. of Automotive Engineers, Dsrc implementation guide, 2010.
-
-
23)
-
24. Kenney, J.B.: ‘Dedicated short-range communications (dsrc) standards in the united states’. Proc. IEEE, 2011, vol. 99, pp. 1162–1182.
-
-
24)
-
20. E.E. Security: Cycurv2x technical details, https://www.escrypt.com/?id=51.
-
-
25)
-
15. Sun, J., Zhang, C., Zhang, Y., Fang, Y.: ‘An identity-based security system for user privacy in vehicular ad hoc networks’, IEEE Trans. Parallel Distrib. Syst., 2010, 21, (9), pp. 1227–1239 (doi: 10.1109/TPDS.2010.14).
-
-
26)
-
14. Schaub, F., Kargl, F., Ma, Z., Weber, M.: ‘V-tokens for conditional pseudonymity in vanets’. IEEE Wireless Communications and Networking Conf. (WCNC), 2010, pp. 1–6.
-
-
27)
-
8. Mäkinen, T., Zaidel, D.M., Andersson, G., et al: ‘Traffic enforcement in Europe: effects, measures, needs and future’. Final report of the ESCAPE, Enhanced Safety Coming from Appropriate Police Enforcement, 22 February 2010, consortium. Available at virtual.vtt. fi/escape (retrieved).
-
-
28)
-
9. IEEE, IEEE std 802.11tm-2007 (revision of ieee std 802.11tm-1999), June 2007.
-
-
29)
-
13. Kamat, P., Baliga, A., Trappe, W.: ‘An identity-based security framework for vanets’. Proc. Third Int. Workshop on Vehicular Ad Hoc Networks, VANET'06, 2006, pp. 94–95.
-
-
30)
-
23. IEEE, Standard for wireless access in vehicular environments (wave)–multi-channel operation (ieee 1609.4), 2010.
-
-
1)