scholarly journals An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks

2010 ◽  
Vol 21 (9) ◽  
pp. 1227-1239 ◽  
Author(s):  
Jinyuan Sun ◽  
Chi Zhang ◽  
Yanchao Zhang ◽  
Yuguang Fang
2018 ◽  
Vol 14 (9) ◽  
pp. 155014771880329 ◽  
Author(s):  
Jin Wang ◽  
Youyuan Wang ◽  
Xiang Gu ◽  
Liang Chen ◽  
Jie Wan

In vehicular participatory sensing, vehicles may provide false data or low-quality data. Building trust in vehicular ad hoc networks is an efficient way to deal with this issue. On one hand, vehicles need to disclose necessary information to demonstrate their trustworthiness. On the other hand, vehicles tend to hide their sensitive information to preserve user privacy. Therefore, privacy and trust are conflict in vehicular ad hoc networks. A cluster-based reputation framework named ClusterRep is proposed to balance privacy and trust in vehicular ad hoc networks. In this framework, the cluster head collaborates with cluster members to change pseudonyms and reputation values. The experiments show the scalability and the effectiveness of the ClusterRep compared with Beta strategy and IncogniSense-floor strategy.


2018 ◽  
Vol 14 (4) ◽  
pp. 155014771877254 ◽  
Author(s):  
Lanjun Dang ◽  
Jie Xu ◽  
Xuefei Cao ◽  
Hui Li ◽  
Jie Chen ◽  
...  

In vehicular ad hoc networks, establishing a secure channel between any two vehicles is fundamental. Authenticated key agreement is a useful mechanism, which can be used to negotiate a shared key for secure data transmission between authentic vehicles in vehicular ad hoc networks. Among the existing identity-based two-party authenticated key agreement protocols without pairings, there are only a few protocols that provide provable security in strong security models such as the extended Canetti–Krawczyk model. This article presents an efficient pairing-free identity-based one-round two-party authenticated key agreement protocol with provable security, which is more suitable for real-time application environments with highly dynamic topology such as vehicular ad hoc networks than the existing identity-based two-party authenticated key agreement protocols. The proposed protocol is proven secure under the passive and active adversaries in the extended Canetti–Krawczyk model based on the Gap Diffie–Hellman assumption. The proposed protocol can capture all essential security attributes including known-session key security, perfect forward secrecy, basic impersonation resistance, key compromise impersonation resistance, unknown key share resistance, no key control, and ephemeral secrets reveal resistance. Compared with the existing identity-based two-party authenticated key agreement protocols, the proposed protocol is superior in terms of computational cost and running time while providing higher security.


Vehicular Ad Hoc Networks (VANETs) are the newest for of Ad Hoc Networks in which moving vehicles act as routers and nodes to form a network. VANETs use many cryptographic approaches like symmetric key approaches, public key approaches, certificate revocation, pseudonym based approaches, identity-based cryptography, identity-based signature, Elliptical Curve Cryptography (ECC) etc. for secure communication. These techniques use public and private keys for enhancing the security of messages and all these keys are stored on hardware devices like TPDs (Temper Proof Devices) in VANETs. TPDs are protected by the cryptographic algorithms. In this present era of technology these algorithms and their online simulators are freely available on internet and can be easily intruded. There is a potential need to enhance the security of these keys. In this paper we worked on enhancing the security of ECC keys stored in TPDs of VANETs using a specific network of Artificial Neural Networks.


IEEE Access ◽  
2021 ◽  
pp. 1-1
Author(s):  
Mahmood A. Al-shareeda ◽  
Mohammed Anbar ◽  
Selvakumar Manickam ◽  
Iznan H. Hasbullah

2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Chenkai Tan ◽  
Shaoyi Bei ◽  
Zhengjun Jing ◽  
Neal Xiong

The blockchain-based management system has been regarded as a novel way to improve the efficiency and safety of Vehicular Ad Hoc Networks (VANETs). A blockchain-based scheme’s performance depends on blockchain nodes’ computing power composed from the road-side unit (RSU). However, the throughput of blockchain-based application in VANETs is limited by the network bandwidth. A single blockchain cannot record large-scale VANETs’ data. In this paper, we design an atomic cross-chain swap-based management system (ACSMS) to boost the scalability of blockchain-based application in VANETs. The blockchain-based public-key encryption with keyword search is further introduced to protect user privacy. The analysis shows that ACSMS achieves cross-chain swap without loss of CAV security privacy. The simulation results show that our method can realize multiple blockchain-based applications in VANETs.


Sign in / Sign up

Export Citation Format

Share Document