Muutke küpsiste eelistusi

Vehicular Ad Hoc Network Security and Privacy [Kõva köide]

This book is a complete, single information source of techniques for complex security and privacy issues in vehicular ad hoc networks

  • Take a cooperative approach towards addressing the technology’s challenges of security and privacy issues
  • Explores interdisciplinary methods by combining social science, cryptography, and privacy enhancing technique
  • Richly illustrated with detailed designs and results for all approaches used
  • Introduces standardization and industry activities, and government regulation in secure vehicular networking

List of Figures
xi
List of Tables
xv
Acronyms xvii
Preface xix
1 Introduction
1(20)
1.1 Background
1(1)
1.2 DSRC AND VANET
2(5)
1.2.1 DSRC
2(1)
1.2.2 VANET
3(3)
1.2.3 Characteristics of VANET
6(1)
1.3 Security and Privacy Threats
7(1)
1.4 Security and Privacy Requirements
8(1)
1.5 Challenges and Prospects
9(2)
1.5.1 Conditional Privacy Preservation in VANETs
9(1)
1.5.2 Authentication with Efficient Revocation in VANETs
10(1)
1.6 Standardization and Related Activities
11(2)
1.7 Security Primitives
13(4)
1.8 Outline of the Book
17(4)
References
17(4)
2 GSIS: Group Signature And Id-Based Signature-Based Secure And Privacy-Preserving Protocol
21(30)
2.1 Introduction
21(2)
2.2 Preliminaries and Background
23(2)
2.2.1 Group Signature
23(1)
2.2.2 Bilinear Pairing and ID-Based Cryptography
23(1)
2.2.3 Threat Model
23(1)
2.2.4 Desired Requirements
24(1)
2.3 Proposed Secure and Privacy-Preserving Protocol
25(16)
2.3.1 Problem Formulation
25(2)
2.3.2 System Setup
27(2)
2.3.3 Security Protocol between OBUs
29(9)
2.3.4 Security Protocol between RSUs and OBUs
38(3)
2.4 Performance Evaluation
41(6)
2.4.1 Impact of Traffic Load
43(1)
2.4.2 Impact of Cryptographic Signature Verification Delay
43(2)
2.4.3 Membership Revocation and Tracing Efficiency
45(2)
2.5 Concluding Remarks
47(4)
References
47(4)
3 ECPP: Efficient Conditional Privacy Preservation Protocol
51(20)
3.1 Introduction
51(1)
3.2 System Model and Problem Formulation
52(3)
3.2.1 System Model
52(2)
3.2.2 Design Objectives
54(1)
3.3 Proposed ECPP Protocol
55(9)
3.3.1 System Initialization
55(1)
3.3.2 OBU Short-Time Anonymous Key Generation
56(6)
3.3.3 OBU Safety Message Sending
62(1)
3.3.4 OBU Fast Tracking Algorithm
63(1)
3.4 Analysis on Conditional Privacy Preservation
64(2)
3.5 Performance Analysis
66(3)
3.5.1 OBU Storage Overhead
66(1)
3.5.2 OBU Computation Overhead on Verification
66(2)
3.5.3 TA Computation Complexity on OBU Tracking
68(1)
3.6 Concluding Remarks
69(2)
References
69(2)
4 Pseudonym-Changing Strategy For Location Privacy
71(20)
4.1 Introduction
71(2)
4.2 Problem Definition
73(2)
4.2.1 Network Model
73(1)
4.2.2 Threat Model
74(1)
4.2.3 Location Privacy Requirements
75(1)
4.3 Proposed PCS Strategy for Location Privacy
75(11)
4.3.1 KPSD Model for PCS Strategy
75(4)
4.3.2 Anonymity Set Analysis for Achieved Location Privacy
79(6)
4.3.3 Feasibility Analysis of PCS Strategy
85(1)
4.4 Performance Evaluation
86(3)
4.5 Concluding Remarks
89(2)
References
89(2)
5 RSU-Aided Message Authentication
91(18)
5.1 Introduction
91(2)
5.2 System Model and Preliminaries
93(3)
5.2.1 System Model
93(1)
5.2.2 Assumption
93(1)
5.2.3 Problem Statement
94(1)
5.2.4 Security Objectives
95(1)
5.3 Proposed RSU-Aided Message Authentication Scheme
96(5)
5.3.1 Overview
96(1)
5.3.2 Mutual Authentication and Key Agreement between RSUs and Vehicles
96(2)
5.3.3 Hash Aggregation
98(1)
5.3.4 Verification
99(1)
5.3.5 Privacy Enhancement
100(1)
5.4 Performance Evaluation
101(4)
5.4.1 Message Loss Ratio
102(1)
5.4.2 Message Delay
102(2)
5.4.3 Communication Overhead
104(1)
5.5 Security Analysis
105(1)
5.6 Concluding Remarks
106(3)
References
107(2)
6 Tesla-Based Broadcast Authentication
109(28)
6.1 Introduction
109(1)
6.2 Timed Efficient and Secure Vehicular Communication Scheme
110(19)
6.2.1 Preliminaries
110(2)
6.2.2 System Formulation
112(1)
6.2.3 Proposed TSVC Scheme
113(5)
6.2.4 Enhanced TSVC with Nonrepudiation
118(5)
6.2.5 Discussion
123(6)
6.3 Security Analysis
129(1)
6.4 Performance Evaluation
129(5)
6.4.1 Impact of Vehicle Moving Speed
131(1)
6.4.2 Impact of Vehicle Density
132(2)
6.5 Concluding Remarks
134(3)
References
134(3)
7 Distributed Cooperative Message Authentication
137(16)
7.1 Introduction
137(1)
7.2 Problem Formulation
138(2)
7.2.1 Network Model
138(1)
7.2.2 Security Model
139(1)
7.3 Basic Cooperative Authentication Scheme
140(1)
7.4 Secure Cooperative Authentication Scheme
141(6)
7.4.1 Evidence and Token for Fairness
142(3)
7.4.2 Authentication Proof
145(1)
7.4.3 Flows of Proposed Scheme
146(1)
7.5 Security Analysis
147(1)
7.5.1 Linkability Attack
147(1)
7.5.2 Free-Riding Attack without Authentication Efforts
147(1)
7.5.3 Free-Riding Attack with Fake Authentication Efforts
148(1)
7.6 Performance Evaluation
148(2)
7.6.1 Simulation Settings
148(1)
7.6.2 Simulation Results
149(1)
7.7 Concluding Remarks
150(3)
References
151(2)
8 Context-Aware Cooperative Authentication
153(20)
8.1 Introduction
153(3)
8.2 Message Trustworthiness in VANETs
156(3)
8.3 System Model and Design Goal
159(1)
8.3.1 Network Model
159(1)
8.3.2 Attack Model
159(1)
8.3.3 Design Goals
160(1)
8.4 Preliminaries
160(1)
8.4.1 Pairing Technique
160(1)
8.4.2 Aggregate Signature and Batch Verification
160(1)
8.5 Proposed AEMAT Scheme
161(7)
8.5.1 System Setup
161(1)
8.5.2 Registration
162(1)
8.5.3 SER Generation and Broadcasting
162(1)
8.5.4 SER Opportunistic Forwarding
162(1)
8.5.5 SER Aggregated Authentication
163(2)
8.5.6 SER Aggregated Trustworthiness
165(3)
8.6 Security Discussion
168(1)
8.6.1 Collusion Attacks
168(1)
8.6.2 Privacy Protection of Witnesses
168(1)
8.7 Performance Evaluation
169(1)
8.7.1 Transmission Cost
169(1)
8.7.2 Computational Cost
169(1)
8.8 Concluding Remarks
170(3)
References
170(3)
9 Fast Handover Authentication Based On Mobility Prediction
173(14)
9.1 Introduction
173(2)
9.2 Vehicular Network Architecture
175(1)
9.3 Proposed Fast Handover Authentication Scheme Based on Mobility Prediction
176(7)
9.3.1 Multilayer Perceptron Classifier
176(2)
9.3.2 Proposed Authentication Scheme
178(5)
9.4 Security Analysis
183(1)
9.4.1 Replay Attack
183(1)
9.4.2 Forward Secrecy
183(1)
9.5 Performance Evaluation
184(1)
9.6 Concluding Remarks
185(2)
References
186(1)
Index 187
Xiaodong Lin is an Associate Professor at the University of Ontario Institute of Technology in the Department of Business and Information Technology, Canada. He received his PhD in electrical and computer engineering at the University of Waterloo, Canada, and was awarded Outstanding Achievement in Graduate Studies at the PhD level. His research interests include wireless communications and network security, computer forensics, software security, and applied cryptography.

Rongxing Lu is an Assistant Professor at Nanyyang Technological University in the School of Electrical and Electronics Engineering, and an IEEE and IEEE ComSoc member. He received his PhD in Electrical and Computer Engineering at the University of Waterloo. His research interests include wireless network security, applied cryptography, and system security and data forensics.