Abstract
Secure communications for vehicular ad hoc networks (VANETs) have become an important research issue these years. Many protocols for secure vehicle-to-vehicle communications and vehicle-to-infrastructure communications have been proposed, yet fewer protocols are concerned with secure group communications for VANETs. Of those existing protocols for group communications, some of them form a group of vehicles based on geographical regions and provide broadcasting to the group members with or without message confidentiality. The others allow secure vehicle-to-vehicle communications within a group with session keys, but they do not preserve user privacy for communicating parties within the group. In this paper, we propose a novel group communication scheme for vehicular networks, in which a group is formed by a set of related vehicles of the same purpose, such as a platoon of recreational vehicles targeted for the same tourist spot. The scheme not only offers efficient and secure group communications but also provides privacy preservation for vehicle-to-vehicle communications within a group. Security analysis is given to demonstrate the robustness of the proposed scheme.
Article PDF
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Avoid common mistakes on your manuscript.
References
Choi, J. Y., Jakobsson, M., & Wetzel, S. (2005). Balancing auditability and privacy in vehicular networks. In Proceedings of the 1st ACM international workshop on quality of service and security in wireless and mobile networks (pp. 79–87). Montreal, Quebec, Canada, October 2005.
Choi, J., & Jung, S. (2009). A security framework with strong non-repudiation and privacy in VANETs. In Proceedings of the 6th IEEE conference on consumer communications and networking (pp. 835–839). Las Vegas, Nevada, USA, January 2009.
Dötzer, F., Kohlmayer, F., Kosch, T., & Strassberger, M. (2005). Secure communication for intersection assistance. In Proceedings of the 2nd international workshop on intelligent transportation. Hamburg, Germany, March 2005.
Dötzer, F. (2006). Privacy issues in vehicular ad hoc networks. In Lecture notes in computer science (Vol. 3856, pp. 197–209).
Hubaux, J. P., Capkun, S., & Luo, J. (2004). The security and privacy of smart vehicles. IEEE Security and Privacy Magazine, 2(3), 49–55.
Jiang, Y., Lin, C., Shi, M., & Shen, X. (2006). Multiple key sharing and distribution scheme with (n,t) threshold mechanism for NEMO group communications. IEEE Journal on Selected Areas in Communications, 24(9), 1738–1747.
Kim, S. H., Kim, B. H., Kim, Y. K., & Lee, D. H. (2008). Auditable and privacy-preserving authentication in vehicular networks. In Proceedings of the 2nd international conference on mobile ubiquitous computing, systems, services and technologies (pp. 19–24). Valencia, Spain, September 2008.
Lee, J. S., & Chang, C. C. (2007). Secure communications for cluster-based ad hoc networks using node identities. Journal of Network and Computer Applications, 30(4), 1377–1396.
Leinmuller, T., Schoch, E., & Kargl, F. (2006). Position verification approaches for vehicular ad hoc networks. IEEE Wireless Communications, 13(5), 16–21.
Leinmuller, T., Schoch, E., & Maihofer, C. (2007). Security requirements and solution concepts in vehicular ad hoc networks. In Proceedings of the 4th IEEE annual conference on wireless on demand network systems and services (pp. 84–91). Obergurgl, Austria, January 2007.
Li, C. T., Hwang, M. S., & Chu, Y. P. (2008). A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Computer Communications, 31(12), 2803–2814.
Lin, X., Sun, X., Ho, P. H., & Shen, X. (2007). GSIS: a secure and privacy preserving protocol for vehicular communications. IEEE Transactions on Vehicular Technology, 56(6), 3442–3456.
Lu, R., Lin, X., Zhu, H., Ho, P. H., & Shen, X. (2008). ECPP: efficient conditional privacy preservation protocol for secure vehicular communications. In Proceedings of the 27th IEEE conference on computer communications (pp. 1229–1237). Phoenix, Arizona, USA, April 2008.
Maurer, U. M., & Yacobi, Y. (1996). A non-interactive public-key distribution system. Designs, Codes and Cryptography, 9(3), 305–316.
Moustafa, H., Bourdon, G., & Gourhant, Y. (2005). AAA in vehicular communication on highways with ad hoc networking support: a proposed architecture. In Proceedings of the 2nd ACM international workshop on vehicular ad hoc networks (pp. 79–80). Cologne, Germany, September 2005.
Papadimitratos, P., Kung, A., Hubaux, J. P., & Kargl, F. (2006). Privacy and identity management for vehicular communication systems: a position paper. In Proceedings of the workshop on standards for privacy in user-centric identity management. Zurich, Switzerland, July 2006.
Papadimitratos, P., Gligor, V., & Hubaux, J. P. (2006). Securing vehicular communications—assumptions, requirements, and principles. In Proceedings of the workshop on embedded security in cars (pp. 5–14). Berlin, Germany, November 2006.
Parno, B., & Perrig, A. (2005). Challenges in securing vehicular networks. In Proceedings of the 4th workshop on hot topics in networks (pp. 2803–2814). Maryland, USA, November 2005.
Plößl, K., Nowey, T., & Mletzko, C. (2006). Towards a security architecture for vehicular ad hoc networks. In Proceedings of the 1st international conference on availability, reliability and security (pp. 374–381). Vienna, Austria, April 2006.
Plößl, K., & Federrath, H. (2008). A privacy aware and efficient security infrastructure for vehicular ad hoc networks. Computer Standards & Interfaces, 30(6), 390–397.
Raya, M., & Hubaux, J. P. (2005). Security aspects of inter-vehicular communications. In Proceedings of the 5th Swiss transport research conference. Monte Verità, Ascona, Switzerland, March 2005.
Raya, M., & Hubaux, J. P. (2005). The security of vehicular ad hoc networks. In Proceedings of the 3rd ACM workshop on security of ad hoc and sensor networks (pp. 11–21). Alexandria, Virginia, USA, November 2005.
Raya, M., Aziz, A., & Hubaux, J. P. (2006). Efficient secure aggregation in VANETs. In Proceedings of the 3rd international workshop on vehicular ad hoc networks (pp. 67–75). Los Angeles, California, USA, September 2006.
Raya, M., Jungels, D., Papadimitratos, P., Aad, I., & Hubaux, J. P. (2006). Certificate revocation in vehicular ad hoc networks (LCA-Report-2006-006). School of Computer and Communication Sciences, EPFL, Switzerland, 2006.
Raya, M., & Hubaux, J. P. (2007). Securing vehicular ad hoc networks. Journal of Computer Security, 15(1), 39–68.
Teo, J. C. M., Ngoh, L. H., & Guo, H. (2009). An anonymous DoS-resistant password-based authentication, key exchange and pseudonym delivery protocol for vehicular networks. In Proceedings of the IEEE 23rd international conference on advanced information networking and applications (pp. 675–682). Bradford, United Kingdom, May 2009.
Wang, N. W., Huang, Y. M., & Chen, W. M. (2008). A novel secure communication scheme in vehicular ad hoc networks. Computer Communications, 31(12), 2827–2837.
Wasef, A., & Shen, X. (2008). PPGCV: privacy preserving group communications protocol for vehicular ad hoc networks. In Proceedings of 2008 IEEE international conference on communications (pp. 1458–1463). Beijing, China, May 2008.
Xu, Q., Mak, T., Ko, J., & Sengupta, R. (2004). Vehicle-to-vehicle safety messaging in DSRC. In Proceedings of the 1st ACM international workshop on vehicular ad hoc networks (pp. 19–28). Philadelphia, Pennsylvania, USA, October 2004.
Yang, X., Liu, J., Zhao, F., & Vaidya, N. H. (2004). A vehicle-to-vehicle communication protocol for cooperative collision warning. In Proceedings of the 1st annual international conference on mobile and ubiquitous systems: networking and services (pp. 114–123). Boston, Massachusetts, USA, August 2004.
Zarki, M. E., Mehrotra, S., Tsudik, G., & Venkatasubramanian, N. (2002). Security issues in a future vehicular network. In Proceedings of European wireless (pp. 270–274). Florence, Italy, February 2002.
Zeadally, S., Hunt, R., Chen, Y. S., Irwin, A., & Hassan, A. (2010). Vehicular ad hoc networks (VANETs): status, results, and challenges. Telecommunication Systems. doi:10.1007/s11235-010-9400-5.
Zhang, C., Lin, X., Lu, R., & Ho, P. H. (2008). RAISE: an efficient RSU-aided message authentication scheme in vehicular communication networks. In Proceedings of the 2008 IEEE international conference on communications (pp. 1415–1457). Beijing, China, May 2008.
Zhang, C., Liu, R., Ho, P. H., & Chen, A. (2008). A location privacy preserving authentication scheme in vehicular networks. In Proceedings of IEEE wireless communications and networking conference (pp. 2543–2548). Las Vegas, Nevada, USA, March 2008.
Zhu, S., Xu, S., Setia, S., & Jajodia, S. (2003). Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach. In Proceedings of the 11th IEEE international conference on network protocols (pp. 326–335). Atlanta, Georgia, USA, November 2003.
Zhu, S., Setia, S., Xu, S., & Jajodia, S. (2006). GKMPAN: An efficient group rekeying scheme for secure multicast in ad-hoc networks. Journal of Computer Security, 14(4), 301–325.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Horng, WB., Lee, CP. & Peng, JW. Privacy preservation in secure group communications for vehicular ad hoc networks. Telecommun Syst 50, 355–365 (2012). https://doi.org/10.1007/s11235-010-9409-9
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11235-010-9409-9