Vehicular Ad Hoc Network Security and Privacy
Inbunden, Engelska, 2015
1 849 kr
Produktinformation
- Utgivningsdatum2015-06-22
- Mått165 x 244 x 21 mm
- Vikt513 g
- FormatInbunden
- SpråkEngelska
- SerieIEEE Press Series on Information and Communication Networks Security
- Antal sidor216
- FörlagJohn Wiley & Sons Inc
- ISBN9781118913901
Tillhör följande kategorier
Xiaodong Lin is an Associate Professor at the University of Ontario Institute of Technology in the Department of Business and Information Technology, Canada. He received his PhD in electrical and computer engineering at the University of Waterloo, Canada, and was awarded Outstanding Achievement in Graduate Studies at the PhD level. His research interests include wireless communications and network security, computer forensics, software security, and applied cryptography.Rongxing Lu is an Assistant Professor at Nanyyang Technological University in the School of Electrical and Electronics Engineering, and an IEEE and IEEE ComSoc member. He received his PhD in Electrical and Computer Engineering at the University of Waterloo. His research interests include wireless network security, applied cryptography, and system security and data forensics.
- List of Figures xiList of Tables xvAcronyms xviiPreface xix1 INTRODUCTION 11.1 Background 11.2 DSRC AND VANET 21.2.1 DSRC 21.2.2 VANET 31.2.3 Characteristics of VANET 61.3 Security and Privacy Threats 71.4 Security and Privacy Requirements 81.5 Challenges and Prospects 91.5.1 Conditional Privacy Preservation in VANETs 91.5.2 Authentication with Efficient Revocation in VANETs 101.6 Standardization and Related Activities 111.7 Security Primitives 131.8 Outline of the Book 17References 172 GSIS: GROUP SIGNATURE AND ID-BASED SIGNATURE-BASED SECURE AND PRIVACY-PRESERVING PROTOCOL 212.1 Introduction 212.2 Preliminaries and Background 232.2.1 Group Signature 232.2.2 Bilinear Pairing and ID-Based Cryptography 232.2.3 Threat Model 232.2.4 Desired Requirements 242.3 Proposed Secure and Privacy-Preserving Protocol 252.3.1 Problem Formulation 252.3.2 System Setup 272.3.3 Security Protocol between OBUs 292.3.4 Security Protocol between RSUs and OBUs 382.4 Performance Evaluation 412.4.1 Impact of Traffic Load 432.4.2 Impact of Cryptographic Signature Verification Delay 432.4.3 Membership Revocation and Tracing Efficiency 452.5 Concluding Remarks 47References 473 ECPP: EFFICIENT CONDITIONAL PRIVACY PRESERVATION PROTOCOL 513.1 Introduction 513.2 System Model and Problem Formulation 523.2.1 System Model 523.2.2 Design Objectives 543.3 Proposed ECPP Protocol 553.3.1 System Initialization 553.3.2 OBU Short-Time Anonymous Key Generation 563.3.3 OBU Safety Message Sending 623.3.4 OBU Fast Tracking Algorithm 633.4 Analysis on Conditional Privacy Preservation 643.5 Performance Analysis 663.5.1 OBU Storage Overhead 663.5.2 OBU Computation Overhead on Verification 663.5.3 TA Computation Complexity on OBU Tracking 683.6 Concluding Remarks 69References 694 PSEUDONYM-CHANGING STRATEGY FOR LOCATION PRIVACY 714.1 Introduction 714.2 Problem Definition 734.2.1 Network Model 734.2.2 Threat Model 744.2.3 Location Privacy Requirements 754.3 Proposed PCS Strategy for Location Privacy 754.3.1 KPSD Model for PCS Strategy 754.3.2 Anonymity Set Analysis for Achieved Location Privacy 794.3.3 Feasibility Analysis of PCS Strategy 854.4 Performance Evaluation 864.5 Concluding Remarks 89References 895 RSU-AIDED MESSAGE AUTHENTICATION 915.1 Introduction 915.2 System Model and Preliminaries 935.2.1 System Model 935.2.2 Assumption 935.2.3 Problem Statement 945.2.4 Security Objectives 955.3 Proposed RSU-Aided Message Authentication Scheme 965.3.1 Overview 965.3.2 Mutual Authentication and Key Agreement between RSUs and Vehicles 965.3.3 Hash Aggregation 985.3.4 Verification 995.3.5 Privacy Enhancement 1005.4 Performance Evaluation 1015.4.1 Message Loss Ratio 1025.4.2 Message Delay 1025.4.3 Communication Overhead 1045.5 Security Analysis 1055.6 Concluding Remarks 106References 1076 TESLA-BASED BROADCAST AUTHENTICATION 1096.1 Introduction 1096.2 Timed Efficient and Secure Vehicular Communication Scheme 1106.2.1 Preliminaries 1106.2.2 System Formulation 1126.2.3 Proposed TSVC Scheme 1136.2.4 Enhanced TSVC with Nonrepudiation 1186.2.5 Discussion 1236.3 Security Analysis 1296.4 Performance Evaluation 1296.4.1 Impact of Vehicle Moving Speed 1316.4.2 Impact of Vehicle Density 1326.5 Concluding Remarks 134References 1347 DISTRIBUTED COOPERATIVE MESSAGE AUTHENTICATION 1377.1 Introduction 1377.2 Problem Formulation 1387.2.1 Network Model 1387.2.2 Security Model 1397.3 Basic Cooperative Authentication Scheme 1407.4 Secure Cooperative Authentication Scheme 1417.4.1 Evidence and Token for Fairness 1427.4.2 Authentication Proof 1457.4.3 Flows of Proposed Scheme 1467.5 Security Analysis 1477.5.1 Linkability Attack 1477.5.2 Free-Riding Attack without Authentication Efforts 1477.5.3 Free-Riding Attack with Fake Authentication Efforts 1487.6 Performance Evaluation 1487.6.1 Simulation Settings 1487.6.2 Simulation Results 1497.7 Concluding Remarks 150References 1518 CONTEXT-AWARE COOPERATIVE AUTHENTICATION 1538.1 Introduction 1538.2 Message Trustworthiness in VANETs 1568.3 System Model and Design Goal 1598.3.1 Network Model 1598.3.2 Attack Model 1598.3.3 Design Goals 1608.4 Preliminaries 1608.4.1 Pairing Technique 1608.4.2 Aggregate Signature and Batch Verification 1608.5 Proposed AEMAT Scheme 1618.5.1 System Setup 1618.5.2 Registration 1628.5.3 SER Generation and Broadcasting 1628.5.4 SER Opportunistic Forwarding 1628.5.5 SER Aggregated Authentication 1638.5.6 SER Aggregated Trustworthiness 1658.6 Security Discussion 1688.6.1 Collusion Attacks 1688.6.2 Privacy Protection of Witnesses 1688.7 Performance Evaluation 1698.7.1 Transmission Cost 1698.7.2 Computational Cost 1698.8 Concluding Remarks 170References 1709 FAST HANDOVER AUTHENTICATION BASED ON MOBILITY PREDICTION 1739.1 Introduction 1739.2 Vehicular Network Architecture 1759.3 Proposed Fast Handover Authentication Scheme Based on Mobility Prediction 1769.3.1 Multilayer Perceptron Classifier 1769.3.2 Proposed Authentication Scheme 1789.4 Security Analysis 1839.4.1 Replay Attack 1839.4.2 Forward Secrecy 1839.5 Performance Evaluation 1849.6 Concluding Remarks 185References 186Index 187