|
|
xi | |
|
|
xv | |
Acronyms |
|
xvii | |
Preface |
|
xix | |
|
|
1 | (20) |
|
|
1 | (1) |
|
|
2 | (5) |
|
|
2 | (1) |
|
|
3 | (3) |
|
1.2.3 Characteristics of VANET |
|
|
6 | (1) |
|
1.3 Security and Privacy Threats |
|
|
7 | (1) |
|
1.4 Security and Privacy Requirements |
|
|
8 | (1) |
|
1.5 Challenges and Prospects |
|
|
9 | (2) |
|
1.5.1 Conditional Privacy Preservation in VANETs |
|
|
9 | (1) |
|
1.5.2 Authentication with Efficient Revocation in VANETs |
|
|
10 | (1) |
|
1.6 Standardization and Related Activities |
|
|
11 | (2) |
|
|
13 | (4) |
|
|
17 | (4) |
|
|
17 | (4) |
|
2 GSIS: Group Signature And Id-Based Signature-Based Secure And Privacy-Preserving Protocol |
|
|
21 | (30) |
|
|
21 | (2) |
|
2.2 Preliminaries and Background |
|
|
23 | (2) |
|
|
23 | (1) |
|
2.2.2 Bilinear Pairing and ID-Based Cryptography |
|
|
23 | (1) |
|
|
23 | (1) |
|
2.2.4 Desired Requirements |
|
|
24 | (1) |
|
2.3 Proposed Secure and Privacy-Preserving Protocol |
|
|
25 | (16) |
|
2.3.1 Problem Formulation |
|
|
25 | (2) |
|
|
27 | (2) |
|
2.3.3 Security Protocol between OBUs |
|
|
29 | (9) |
|
2.3.4 Security Protocol between RSUs and OBUs |
|
|
38 | (3) |
|
2.4 Performance Evaluation |
|
|
41 | (6) |
|
2.4.1 Impact of Traffic Load |
|
|
43 | (1) |
|
2.4.2 Impact of Cryptographic Signature Verification Delay |
|
|
43 | (2) |
|
2.4.3 Membership Revocation and Tracing Efficiency |
|
|
45 | (2) |
|
|
47 | (4) |
|
|
47 | (4) |
|
3 ECPP: Efficient Conditional Privacy Preservation Protocol |
|
|
51 | (20) |
|
|
51 | (1) |
|
3.2 System Model and Problem Formulation |
|
|
52 | (3) |
|
|
52 | (2) |
|
|
54 | (1) |
|
3.3 Proposed ECPP Protocol |
|
|
55 | (9) |
|
3.3.1 System Initialization |
|
|
55 | (1) |
|
3.3.2 OBU Short-Time Anonymous Key Generation |
|
|
56 | (6) |
|
3.3.3 OBU Safety Message Sending |
|
|
62 | (1) |
|
3.3.4 OBU Fast Tracking Algorithm |
|
|
63 | (1) |
|
3.4 Analysis on Conditional Privacy Preservation |
|
|
64 | (2) |
|
|
66 | (3) |
|
3.5.1 OBU Storage Overhead |
|
|
66 | (1) |
|
3.5.2 OBU Computation Overhead on Verification |
|
|
66 | (2) |
|
3.5.3 TA Computation Complexity on OBU Tracking |
|
|
68 | (1) |
|
|
69 | (2) |
|
|
69 | (2) |
|
4 Pseudonym-Changing Strategy For Location Privacy |
|
|
71 | (20) |
|
|
71 | (2) |
|
|
73 | (2) |
|
|
73 | (1) |
|
|
74 | (1) |
|
4.2.3 Location Privacy Requirements |
|
|
75 | (1) |
|
4.3 Proposed PCS Strategy for Location Privacy |
|
|
75 | (11) |
|
4.3.1 KPSD Model for PCS Strategy |
|
|
75 | (4) |
|
4.3.2 Anonymity Set Analysis for Achieved Location Privacy |
|
|
79 | (6) |
|
4.3.3 Feasibility Analysis of PCS Strategy |
|
|
85 | (1) |
|
4.4 Performance Evaluation |
|
|
86 | (3) |
|
|
89 | (2) |
|
|
89 | (2) |
|
5 RSU-Aided Message Authentication |
|
|
91 | (18) |
|
|
91 | (2) |
|
5.2 System Model and Preliminaries |
|
|
93 | (3) |
|
|
93 | (1) |
|
|
93 | (1) |
|
|
94 | (1) |
|
5.2.4 Security Objectives |
|
|
95 | (1) |
|
5.3 Proposed RSU-Aided Message Authentication Scheme |
|
|
96 | (5) |
|
|
96 | (1) |
|
5.3.2 Mutual Authentication and Key Agreement between RSUs and Vehicles |
|
|
96 | (2) |
|
|
98 | (1) |
|
|
99 | (1) |
|
5.3.5 Privacy Enhancement |
|
|
100 | (1) |
|
5.4 Performance Evaluation |
|
|
101 | (4) |
|
|
102 | (1) |
|
|
102 | (2) |
|
5.4.3 Communication Overhead |
|
|
104 | (1) |
|
|
105 | (1) |
|
|
106 | (3) |
|
|
107 | (2) |
|
6 Tesla-Based Broadcast Authentication |
|
|
109 | (28) |
|
|
109 | (1) |
|
6.2 Timed Efficient and Secure Vehicular Communication Scheme |
|
|
110 | (19) |
|
|
110 | (2) |
|
|
112 | (1) |
|
6.2.3 Proposed TSVC Scheme |
|
|
113 | (5) |
|
6.2.4 Enhanced TSVC with Nonrepudiation |
|
|
118 | (5) |
|
|
123 | (6) |
|
|
129 | (1) |
|
6.4 Performance Evaluation |
|
|
129 | (5) |
|
6.4.1 Impact of Vehicle Moving Speed |
|
|
131 | (1) |
|
6.4.2 Impact of Vehicle Density |
|
|
132 | (2) |
|
|
134 | (3) |
|
|
134 | (3) |
|
7 Distributed Cooperative Message Authentication |
|
|
137 | (16) |
|
|
137 | (1) |
|
|
138 | (2) |
|
|
138 | (1) |
|
|
139 | (1) |
|
7.3 Basic Cooperative Authentication Scheme |
|
|
140 | (1) |
|
7.4 Secure Cooperative Authentication Scheme |
|
|
141 | (6) |
|
7.4.1 Evidence and Token for Fairness |
|
|
142 | (3) |
|
7.4.2 Authentication Proof |
|
|
145 | (1) |
|
7.4.3 Flows of Proposed Scheme |
|
|
146 | (1) |
|
|
147 | (1) |
|
|
147 | (1) |
|
7.5.2 Free-Riding Attack without Authentication Efforts |
|
|
147 | (1) |
|
7.5.3 Free-Riding Attack with Fake Authentication Efforts |
|
|
148 | (1) |
|
7.6 Performance Evaluation |
|
|
148 | (2) |
|
7.6.1 Simulation Settings |
|
|
148 | (1) |
|
|
149 | (1) |
|
|
150 | (3) |
|
|
151 | (2) |
|
8 Context-Aware Cooperative Authentication |
|
|
153 | (20) |
|
|
153 | (3) |
|
8.2 Message Trustworthiness in VANETs |
|
|
156 | (3) |
|
8.3 System Model and Design Goal |
|
|
159 | (1) |
|
|
159 | (1) |
|
|
159 | (1) |
|
|
160 | (1) |
|
|
160 | (1) |
|
|
160 | (1) |
|
8.4.2 Aggregate Signature and Batch Verification |
|
|
160 | (1) |
|
8.5 Proposed AEMAT Scheme |
|
|
161 | (7) |
|
|
161 | (1) |
|
|
162 | (1) |
|
8.5.3 SER Generation and Broadcasting |
|
|
162 | (1) |
|
8.5.4 SER Opportunistic Forwarding |
|
|
162 | (1) |
|
8.5.5 SER Aggregated Authentication |
|
|
163 | (2) |
|
8.5.6 SER Aggregated Trustworthiness |
|
|
165 | (3) |
|
|
168 | (1) |
|
|
168 | (1) |
|
8.6.2 Privacy Protection of Witnesses |
|
|
168 | (1) |
|
8.7 Performance Evaluation |
|
|
169 | (1) |
|
|
169 | (1) |
|
|
169 | (1) |
|
|
170 | (3) |
|
|
170 | (3) |
|
9 Fast Handover Authentication Based On Mobility Prediction |
|
|
173 | (14) |
|
|
173 | (2) |
|
9.2 Vehicular Network Architecture |
|
|
175 | (1) |
|
9.3 Proposed Fast Handover Authentication Scheme Based on Mobility Prediction |
|
|
176 | (7) |
|
9.3.1 Multilayer Perceptron Classifier |
|
|
176 | (2) |
|
9.3.2 Proposed Authentication Scheme |
|
|
178 | (5) |
|
|
183 | (1) |
|
|
183 | (1) |
|
|
183 | (1) |
|
9.5 Performance Evaluation |
|
|
184 | (1) |
|
|
185 | (2) |
|
|
186 | (1) |
Index |
|
187 | |