Skip to main content

A Source Hiding Protocol for Cooperative Intelligent Transportation Systems (C-ITS)

  • Conference paper
  • First Online:
Information Security Practice and Experience (ISPEC 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14341))

  • 279 Accesses

Abstract

In multi-user scenarios where requirements of privacy are high, we propose a modular, anonymous and source hiding protocol for sending signed messages (\(\textsf{SHP}\)). By combining existing cryptographic building blocks, encryption and ring signature schemes, we are able to mitigate traceability and routing attacks on otherwise anonymous participants. Moreover, our protocol is secure without any trusted third party. Our construction is provably secure in our security model, where the adversary controls the communication channels. We illustrate our construction via a Vehicle Ad-Hoc Network (VANET) use-case, where the \(\textsf{SHP}\) provide source anonymity to cluster of vehicles exchanging signed safety and security messages to road-side units within Cooperative Intelligent Transportation Systems (C-ITS).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bouakkaz, S., Semchedine, F.: A certificateless ring signature scheme with batch verification for applications in VANET. J. Inf. Secur. Appl. 55, 102669 (2020). https://doi.org/10.1016/j.jisa.2020.102669. https://www.sciencedirect.com/science/article/pii/S2214212620308218

  2. Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–90 (1981). https://doi.org/10.1145/358549.358563

    Article  Google Scholar 

  3. European Telecommunications Standards Institute: ETSI TR 103 415 V1.1.1: Intelligent Transport Systems (ITS); Security; Pre-standardization study on pseudonym change management (2018). https://www.etsi.org/standards. Accessed 12 May 2022

  4. European Telecommunications Standards Institute: ETSI EN 302 636-6-1 V1.2.0: Intelligent Transport Systems (ITS), Vehicular Communications; GeoNetworking; Part 6: Internet Integration, Sub-part 1: Transmission of IPv6 Packets over GeoNetworking Protocol (2022)

    Google Scholar 

  5. Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Hiding routing information. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 137–150. Springer, Heidelberg (1996). https://doi.org/10.1007/3-540-61996-8_37

    Chapter  Google Scholar 

  6. Katz, J., Lindell, Y.: Introduction to Modern Cryptography, 2nd edn. Chapman Hall/CRC, Boca Raton (2014)

    Book  MATH  Google Scholar 

  7. Khan, S., Sharma, I., Aslam, M., Khan, M.Z., Khan, S.: Security challenges of location privacy in VANETs and state-of-the-art solutions: a survey. Future Internet 13(4), 96 (2021). https://doi.org/10.3390/fi13040096. https://www.mdpi.com/1999-5903/13/4/96

  8. Liu, F., Wang, Q.: IBRS: an efficient identity-based batch verification scheme for VANETs based on ring signature. In: 2019 IEEE Vehicular Networking Conference (VNC), pp. 1–8 (2019). https://doi.org/10.1109/VNC48660.2019.9062800

  9. Liu, L., Wang, Y., Zhang, J., Yang, Q.: Efficient proxy ring signature for VANET. J. Eng. 2019(9), 5449–5454 (2019)

    Article  Google Scholar 

  10. Mundhe, P., Yadav, V.K., Singh, A., Verma, S., Venkatesan, S.: Ring signature-based conditional privacy-preserving authentication in VANETs. Wireless Pers. Commun. 114(1), 853–881 (2020). https://doi.org/10.1007/s11277-020-07396-x

    Article  Google Scholar 

  11. Rivest, R.L., Shamir, A., Tauman, Y.: How to leak a secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 552–565. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45682-1_32

    Chapter  Google Scholar 

Download references

Acknowledgment

This work was supported by the internal funds of the Department of Fundamentals of Computer Science of the Wrocław University of Science and Technology for the conducted research.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hannes Salin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Salin, H., Krzywiecki, Ł. (2023). A Source Hiding Protocol for Cooperative Intelligent Transportation Systems (C-ITS). In: Meng, W., Yan, Z., Piuri, V. (eds) Information Security Practice and Experience. ISPEC 2023. Lecture Notes in Computer Science, vol 14341. Springer, Singapore. https://doi.org/10.1007/978-981-99-7032-2_22

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-7032-2_22

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-7031-5

  • Online ISBN: 978-981-99-7032-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics