Skip to main content

A Privacy-Preserving Approach to Vehicle Renting and Driver Accountability in VANETs

  • Conference paper
  • First Online:
Privacy and Identity Management. Sharing in a Digital World (Privacy and Identity 2023)

Part of the book series: IFIP Advances in Information and Communication Technology ((IFIPAICT,volume 695))

Included in the following conference series:

  • 59 Accesses

Abstract

Vehicular Ad Hoc Networks (VANETs) play a crucial role in the evolution of Intelligent Transportation Systems. The problems of renting and drivers’ accountability still need to be answered in VANETs. Existing proposals do not consider renting vehicles, and there is no distinction between renters and owners. This paper proposes privacy-preserving rental and accountability protocols to address these problems. The proposed rental protocol outputs an agreement between an owner and a renter, which allows the renter to unlock and drive the vehicle. The privacy-preserving accountability protocol offers a robust solution for detecting and mitigating malicious behavior in VANETs. It provides a platform for holding entities accountable for their actions without violating their privacy. The paper demonstrates that our solution successfully meets the pre-set security and privacy requirements in VANETs. These findings suggest promising potential for improving future vehicular networks’ safety, efficiency, and performance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 99.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    ICAO issues standards and manages a global key directory for electronic passports.

References

  1. Akil, M., Islami, L., Fischer-Hübner, S., Martucci, L.A., Zuccato, A.: Privacy-preserving identifiers for IoT: a systematic literature review. IEEE Access 8, 168470–168485 (2020)

    Article  Google Scholar 

  2. Akil, M., Martucci, L., Hoepman, J.H.: Non-interactive privacy-preserving sybil-free authentication scheme in vanets. In: NDSS (2023)

    Google Scholar 

  3. Al-Shareeda, M.A., Anbar, M., Manickam, S., Hasbullah, I.H.: A secure pseudonym-based conditional privacy-preservation authentication scheme in vehicular ad hoc networks. Sensors 22(5), 1696 (2022)

    Article  Google Scholar 

  4. Andersson, C., Kohlweiss, M., Martucci, L.A., Panchenko, A.: A self-certified and sybil-free framework for secure digital identity domain buildup. In: Onieva, J.A., Sauveron, D., Chaumette, S., Gollmann, D., Markantonakis, K. (eds.) Information Security Theory and Practices. LNCS, vol. 5019, pp. 64–77. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-79966-5_5

    Chapter  Google Scholar 

  5. Arif, M., Wang, G., Bhuiyan, M.Z.A., Wang, T., Chen, J.: A survey on security attacks in vanets. Veh. Commun. 19, 100179 (2019)

    Google Scholar 

  6. Camenisch, J., Dubovitskaya, M., Lehmann, A., Neven, G., Paquin, C., Preiss, F.S.: Concepts and languages for privacy-preserving attribute-based authentication. In: Fischer-Hübner, S., de Leeuw, E., Mitchell, C. (eds.) IDMAN 2013. IFIP Advances in Information and Communication Technology, vol. 396, pp. 34–52. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-37282-7_4

    Chapter  Google Scholar 

  7. Camenisch, J., Lysyanskaya, A.: A signature scheme with efficient protocols. In: Cimato, S., Persiano, G., Galdi, C. (eds.) SCN 2002. LNCS, vol. 2576, pp. 268–289. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-36413-7_20

    Chapter  Google Scholar 

  8. Camenisch, J., Stadler, M.: Efficient group signature schemes for large groups. In: Kaliski, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 410–424. Springer, Heidelberg (1997). https://doi.org/10.1007/BFb0052252

    Chapter  Google Scholar 

  9. Camenisch, J., Van Herreweghen, E.: Design and implementation of the idemix anonymous credential system. In: 9th ACM CCS (2002)

    Google Scholar 

  10. Camenisch, J., et al.: Specification of the identity mixer cryptographic library, version 2.3.1 (2010)

    Google Scholar 

  11. Chaum, D.: Security without identification: transaction systems to make big brother obsolete. Commun. ACM 28(10), 1030–1044 (1985)

    Article  Google Scholar 

  12. Engoulou, R.G., Bellaïche, M., Pierre, S., Quintero, A.: Vanet security surveys. Comput. Commun. 44, 1–13 (2014)

    Article  Google Scholar 

  13. Feige, U., Fiat, A., Shamir, A.: Zero-knowledge proofs of identity. J. Cryptol. 1(2) (1988)

    Google Scholar 

  14. Feng, X., Shi, Q., Xie, Q., Wang, L.: P2BA: a privacy-preserving protocol with batch authentication against semi-trusted RSUs in vehicular ad hoc networks. IEEE Trans. Inf. Forensics Secur. 16, 3888–3899 (2021)

    Article  Google Scholar 

  15. Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186–194. Springer, Heidelberg (1986). https://doi.org/10.1007/3-540-47721-7_12

    Chapter  Google Scholar 

  16. Ilie, M., Ilie, S., Razafindrazanakolona, A.D.: A truthful mechanism for rentals of privately owned electrical vehicles. In: International Conference on Applied and Theoretical Electricity (ICATE). IEEE (2021)

    Google Scholar 

  17. Inedjaren, Y., Maachaoui, M., Zeddini, B., Barbot, J.P.: Blockchain-based distributed management system for trust in vanet. Veh. Commun. 30, 100350 (2021)

    Google Scholar 

  18. Johnson, D., Menezes, A., Vanstone, S.: The elliptic curve digital signature algorithm (ECDSA). Int. J. Inf. Secur. 1, 36–63 (2001)

    Article  Google Scholar 

  19. Lee, M., Atkison, T.: Vanet applications: past, present, and future. Veh. Commun. 28, 100310 (2021)

    Google Scholar 

  20. Martucci, L.A., Kohlweiss, M., Andersson, C., Panchenko, A.: Self-certified sybil-free pseudonyms. In: Proceedings of the First ACM Conference on Wireless Network Security, WiSec 2008. ACM (2008)

    Google Scholar 

  21. Sikarwar, H., Das, D.: Towards lightweight authentication and batch verification scheme in IoV. IEEE Trans. Dependable Secure Comput. 19(5), 3244–3256 (2022)

    Article  Google Scholar 

  22. Sikarwar, H., Nahar, A., Das, D.: LAAS: lightweight anonymous authentication scheme for universal internet of vehicles (UIOV). In: 2022 International Wireless Communications and Mobile Computing (IWCMC). IEEE (2022)

    Google Scholar 

  23. Tareq, M.M.K., Semiari, O., Salehi, M.A., Saad, W.: Ultra reliable, low latency vehicle-to-infrastructure wireless communication with edge computing. In: IEEE GLOBECOM (2018)

    Google Scholar 

  24. Wang, P., Liu, Y.: SEMA: secure and efficient message authentication protocol for vanets. IEEE Syst. J. 15(1), 846–855 (2021)

    Article  Google Scholar 

  25. Wei, L., Cui, J., Zhong, H., Bolodurina, I., Liu, L.: A lightweight and conditional privacy-preserving authenticated key agreement scheme with multi-ta model for fog-based vanets. IEEE Trans. Dependable Secure Comput. 20(1), 422–436 (2023)

    Article  Google Scholar 

  26. Zhang, L., Chen, T., Yu, B., Wang, C.: Suburban demand responsive transit service with rental vehicles. IEEE Trans. Intell. Transp. Syst. 22(4), 2391–2403 (2021)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mahdi Akil .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Akil, M., Naskar, S., Martucci, L.A., Hoepman, JH. (2024). A Privacy-Preserving Approach to Vehicle Renting and Driver Accountability in VANETs. In: Bieker, F., de Conca, S., Gruschka, N., Jensen, M., Schiering, I. (eds) Privacy and Identity Management. Sharing in a Digital World. Privacy and Identity 2023. IFIP Advances in Information and Communication Technology, vol 695. Springer, Cham. https://doi.org/10.1007/978-3-031-57978-3_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-57978-3_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-57977-6

  • Online ISBN: 978-3-031-57978-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics