Skip to main content

Improved Access Control Mechanism in Vehicular Ad Hoc Networks

  • Conference paper
Ad-hoc, Mobile, and Wireless Networks (ADHOC-NOW 2011)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 6811))

Included in the following conference series:

Abstract

Access control of message is required when certain selected vehicles are granted access to information, instead of all vehicles within communication range. In these situations an access policy (consisting of attributes as road situation and vehicle type) is built into the vehicle and messages are encrypted using these access policies. Only valid vehicles possessing these attributes are able to decrypt the message. Huang and Verma [16] had proposed such an access control framework. The scheme assumed that the road-side units (RSU) are not compromised and had a very restricted access structure. We propose a new access control structure which eliminates the drawbacks of their schemes, by providing access control in presence of compromised RSU. Our technique permits a more general boolean access structure. Communication is possible between two vehicles which are monitored by two RSU, which was not permitted in [16]. The costs are comparable to that of [16].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. http://crypto.stanford.edu/pbc/

  2. Beimel, A.: Secure Schemes for Secret Sharing and Key Distribution. Ph D Thesis. Technion, Haifa (1996)

    Google Scholar 

  3. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321–334. IEEE Computer Society, Los Alamitos (2007)

    Google Scholar 

  4. Biswas, S., Mahbubul Haque, M., Misic, J.V.: Privacy and anonymity in vanets: A contemporary study. Ad Hoc & Sensor Wireless Networks 10(2-3), 177–192 (2010)

    Google Scholar 

  5. Chase, M.: Multi-authority attribute based encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 515–534. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  6. Chase, M., Chow, S.S.M.: Improving privacy and security in multi-authority attribute-based encryption. In: ACM Conference on Computer and Communications Security, pp. 121–130 (2009)

    Google Scholar 

  7. Chaum, D., van Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257–265. Springer, Heidelberg (1991)

    Chapter  Google Scholar 

  8. Chen, N., Gerla, M., Hong, D.H.X.: Secure, selective group broadcast in vehicular networks using dynamic attribute based encryption. In: Ad Hoc Networking Workshop, Med-Hoc-Net, pp. 1–8 (2010)

    Google Scholar 

  9. Douceur, J.R.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  10. Freeman, D., Scott, M., Teske, E.: A taxonomy of pairing-friendly elliptic curves. J. Cryptology 23(2), 224–280 (2010)

    Article  MATH  Google Scholar 

  11. Freudiger, J., Manshaei, M.H., Boudec, J.-Y.L., Hubaux, J.-P.: On the age of pseudonyms in mobile ad hoc networks. In: INFOCOM, pp. 1577–1585. IEEE, Los Alamitos (2010)

    Google Scholar 

  12. Ghosh, M., Varghese, A., Gupta, A., Kherani, A.A., Muthaiah, S.N.: Detecting misbehaviors in vanet with integrated root-cause analysis. Ad Hoc Networks 8(7), 778–790 (2010)

    Article  Google Scholar 

  13. Golle, P., Greene, D.H., Staddon, J.: Detecting and correcting malicious data in vanets. In: Vehicular Ad Hoc Networks, pp. 29–37 (2004)

    Google Scholar 

  14. Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: ACM Conference on Computer and Communications Security, pp. 89–98 (2006)

    Google Scholar 

  15. Huang, D., Hong, X., Gerla, M.: Situation-aware trust architecture for vehicular networks. Topics In Automotive Networking 48(11), 128–135 (2010)

    Google Scholar 

  16. Huang, D., Verma, M.: ASPE: attribute-based secure policy enforcement in vehicular ad hoc networks. Ad Hoc Networks 7(8), 1526–1535 (2009)

    Article  Google Scholar 

  17. Kargl, F., Papadimitratos, P., Buttyan, L., Mter, M., Schoch, E., Wiedersheim, B., Thong, T.v., Cal, G., Held, A., Kung, A., Hubaux, J.p.: Secure vehicular communication systems: Implementation, performance, and research challenges. IEEE Wireless Communication Magazine, 110–118 (2008)

    Google Scholar 

  18. Lewko, A., Waters, B.: Decentralizing Attribute-Based Encryption. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 568–588. Springer, Heidelberg (2011), eprint.iacr.org/2010/351.pdf (last accessed February 22, 2011)

    Chapter  Google Scholar 

  19. Papadimitratos, P., Buttyan, L., Holczer, T., Schoch, E., Freudiger, J., Raya, M., Ma, Z., Kargl, F., Kung, A., Hubaux, J.p.: Secure vehicular communication systems: design and architecture. IEEE Wireless Communication Magazine, 100–109 (2008)

    Google Scholar 

  20. Park, S., Aslam, B., Turgut, D., Zou, C.C.: Defense against sybil attack in vehicular ad hoc network based on roadside unit support. In: MILCOM, pp. 1–7 (2009)

    Google Scholar 

  21. Parno, B., Perrig, A.: Challenges in security vehicular networks. In: HotNets-IV (2005)

    Google Scholar 

  22. Raya, M.: Data-Centric Trust in Ephemeral Networks. Ph D Thesis. EPFL, Lausanne (2009)

    Google Scholar 

  23. Raya, M., Papadimitratos, P., Gligor, V.D., Hubaux, J.-P.: On data-centric trust establishment in ephemeral ad hoc networks. In: INFOCOM, pp. 1238–1246. IEEE, Los Alamitos (2008)

    Google Scholar 

  24. Raya, M., Shokri, R., Hubaux, J.-P.: On the tradeoff between trust and privacy in wireless ad hoc networks. In: Wetzel, S., Nita-Rotaru, C., Stajano, F. (eds.) WISEC, pp. 75–80. ACM, New York (2010)

    Google Scholar 

  25. Ruj, S., Nayak, A., Stojmenovic, I.: Distributed fine-grained access control in wireless sensor networks. IEEE International Parallel & Distributed Processing Symposium (to appear, 2011)

    Google Scholar 

  26. Sahai, A., Waters, B.: Fuzzy Identity-Based Encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  27. Sampigethaya, K., Huang, L., Li, M., Poovendran, R., Matsuura, K., Sezaki, K.: Caravan: Providing location privacy for vanet. In: Proc. of the Workshop on Embedded Security in Cars, ESCAR (2005)

    Google Scholar 

  28. Sampigethaya, K., Li, M., Huang, L., Poovendran, R.: Amoeba: Robust location privacy scheme for vanet. IEEE Journal on Selected Areas in Communications 25(8), 1569–1589 (2007)

    Article  Google Scholar 

  29. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  30. Stinson, D.R.: Cryptography: Theory and Practice, 3rd edn. CRC Press Inc., Boca Raton (2006)

    MATH  Google Scholar 

  31. Sun, Y., Lu, R., Lin, X., Shen, X., Su, J.: An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. IEEE Trans. on Vehicular Technology 59(7), 3589–3603 (2010)

    Article  Google Scholar 

  32. Wasef, A., Jiang, Y., Shen, X.: Ecmv: Efficient certificate management scheme for vehicular networks. In: GLOBECOM, pp. 639–643. IEEE, Los Alamitos (2008)

    Google Scholar 

  33. Waters, B.: Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions, http://www.eprint.iacr.org/2009/385.pdf

  34. Yu, S., Ren, K., Lou, W.: FDAC: Toward fine-grained distributed data access control in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems 22(4), 673–686 (2011)

    Article  Google Scholar 

  35. Zhou, T., Choudhury, R.R., Ning, P., Chakrabarty, K.: Privacy-preserving detection of sybil attacks in vehicular ad hoc networks. In: MobiQuitous, pp. 1–8. IEEE, Los Alamitos (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ruj, S., Nayak, A., Stojmenovic, I. (2011). Improved Access Control Mechanism in Vehicular Ad Hoc Networks. In: Frey, H., Li, X., Ruehrup, S. (eds) Ad-hoc, Mobile, and Wireless Networks. ADHOC-NOW 2011. Lecture Notes in Computer Science, vol 6811. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22450-8_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22450-8_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22449-2

  • Online ISBN: 978-3-642-22450-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics