Abstract
In multi-user scenarios where requirements of privacy are high, we propose a modular, anonymous and source hiding protocol for sending signed messages (\(\textsf{SHP}\)). By combining existing cryptographic building blocks, encryption and ring signature schemes, we are able to mitigate traceability and routing attacks on otherwise anonymous participants. Moreover, our protocol is secure without any trusted third party. Our construction is provably secure in our security model, where the adversary controls the communication channels. We illustrate our construction via a Vehicle Ad-Hoc Network (VANET) use-case, where the \(\textsf{SHP}\) provide source anonymity to cluster of vehicles exchanging signed safety and security messages to road-side units within Cooperative Intelligent Transportation Systems (C-ITS).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bouakkaz, S., Semchedine, F.: A certificateless ring signature scheme with batch verification for applications in VANET. J. Inf. Secur. Appl. 55, 102669 (2020). https://doi.org/10.1016/j.jisa.2020.102669. https://www.sciencedirect.com/science/article/pii/S2214212620308218
Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–90 (1981). https://doi.org/10.1145/358549.358563
European Telecommunications Standards Institute: ETSI TR 103 415 V1.1.1: Intelligent Transport Systems (ITS); Security; Pre-standardization study on pseudonym change management (2018). https://www.etsi.org/standards. Accessed 12 May 2022
European Telecommunications Standards Institute: ETSI EN 302 636-6-1 V1.2.0: Intelligent Transport Systems (ITS), Vehicular Communications; GeoNetworking; Part 6: Internet Integration, Sub-part 1: Transmission of IPv6 Packets over GeoNetworking Protocol (2022)
Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Hiding routing information. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 137–150. Springer, Heidelberg (1996). https://doi.org/10.1007/3-540-61996-8_37
Katz, J., Lindell, Y.: Introduction to Modern Cryptography, 2nd edn. Chapman Hall/CRC, Boca Raton (2014)
Khan, S., Sharma, I., Aslam, M., Khan, M.Z., Khan, S.: Security challenges of location privacy in VANETs and state-of-the-art solutions: a survey. Future Internet 13(4), 96 (2021). https://doi.org/10.3390/fi13040096. https://www.mdpi.com/1999-5903/13/4/96
Liu, F., Wang, Q.: IBRS: an efficient identity-based batch verification scheme for VANETs based on ring signature. In: 2019 IEEE Vehicular Networking Conference (VNC), pp. 1–8 (2019). https://doi.org/10.1109/VNC48660.2019.9062800
Liu, L., Wang, Y., Zhang, J., Yang, Q.: Efficient proxy ring signature for VANET. J. Eng. 2019(9), 5449–5454 (2019)
Mundhe, P., Yadav, V.K., Singh, A., Verma, S., Venkatesan, S.: Ring signature-based conditional privacy-preserving authentication in VANETs. Wireless Pers. Commun. 114(1), 853–881 (2020). https://doi.org/10.1007/s11277-020-07396-x
Rivest, R.L., Shamir, A., Tauman, Y.: How to leak a secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 552–565. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45682-1_32
Acknowledgment
This work was supported by the internal funds of the Department of Fundamentals of Computer Science of the Wrocław University of Science and Technology for the conducted research.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Salin, H., Krzywiecki, Ł. (2023). A Source Hiding Protocol for Cooperative Intelligent Transportation Systems (C-ITS). In: Meng, W., Yan, Z., Piuri, V. (eds) Information Security Practice and Experience. ISPEC 2023. Lecture Notes in Computer Science, vol 14341. Springer, Singapore. https://doi.org/10.1007/978-981-99-7032-2_22
Download citation
DOI: https://doi.org/10.1007/978-981-99-7032-2_22
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-7031-5
Online ISBN: 978-981-99-7032-2
eBook Packages: Computer ScienceComputer Science (R0)