Skip to main content
Log in

Privacy preservation in secure group communications for vehicular ad hoc networks

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

Secure communications for vehicular ad hoc networks (VANETs) have become an important research issue these years. Many protocols for secure vehicle-to-vehicle communications and vehicle-to-infrastructure communications have been proposed, yet fewer protocols are concerned with secure group communications for VANETs. Of those existing protocols for group communications, some of them form a group of vehicles based on geographical regions and provide broadcasting to the group members with or without message confidentiality. The others allow secure vehicle-to-vehicle communications within a group with session keys, but they do not preserve user privacy for communicating parties within the group. In this paper, we propose a novel group communication scheme for vehicular networks, in which a group is formed by a set of related vehicles of the same purpose, such as a platoon of recreational vehicles targeted for the same tourist spot. The scheme not only offers efficient and secure group communications but also provides privacy preservation for vehicle-to-vehicle communications within a group. Security analysis is given to demonstrate the robustness of the proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Choi, J. Y., Jakobsson, M., & Wetzel, S. (2005). Balancing auditability and privacy in vehicular networks. In Proceedings of the 1st ACM international workshop on quality of service and security in wireless and mobile networks (pp. 79–87). Montreal, Quebec, Canada, October 2005.

    Google Scholar 

  2. Choi, J., & Jung, S. (2009). A security framework with strong non-repudiation and privacy in VANETs. In Proceedings of the 6th IEEE conference on consumer communications and networking (pp. 835–839). Las Vegas, Nevada, USA, January 2009.

    Google Scholar 

  3. Dötzer, F., Kohlmayer, F., Kosch, T., & Strassberger, M. (2005). Secure communication for intersection assistance. In Proceedings of the 2nd international workshop on intelligent transportation. Hamburg, Germany, March 2005.

    Google Scholar 

  4. Dötzer, F. (2006). Privacy issues in vehicular ad hoc networks. In Lecture notes in computer science (Vol. 3856, pp. 197–209).

    Google Scholar 

  5. Hubaux, J. P., Capkun, S., & Luo, J. (2004). The security and privacy of smart vehicles. IEEE Security and Privacy Magazine, 2(3), 49–55.

    Article  Google Scholar 

  6. Jiang, Y., Lin, C., Shi, M., & Shen, X. (2006). Multiple key sharing and distribution scheme with (n,t) threshold mechanism for NEMO group communications. IEEE Journal on Selected Areas in Communications, 24(9), 1738–1747.

    Article  Google Scholar 

  7. Kim, S. H., Kim, B. H., Kim, Y. K., & Lee, D. H. (2008). Auditable and privacy-preserving authentication in vehicular networks. In Proceedings of the 2nd international conference on mobile ubiquitous computing, systems, services and technologies (pp. 19–24). Valencia, Spain, September 2008.

    Chapter  Google Scholar 

  8. Lee, J. S., & Chang, C. C. (2007). Secure communications for cluster-based ad hoc networks using node identities. Journal of Network and Computer Applications, 30(4), 1377–1396.

    Article  Google Scholar 

  9. Leinmuller, T., Schoch, E., & Kargl, F. (2006). Position verification approaches for vehicular ad hoc networks. IEEE Wireless Communications, 13(5), 16–21.

    Article  Google Scholar 

  10. Leinmuller, T., Schoch, E., & Maihofer, C. (2007). Security requirements and solution concepts in vehicular ad hoc networks. In Proceedings of the 4th IEEE annual conference on wireless on demand network systems and services (pp. 84–91). Obergurgl, Austria, January 2007.

    Chapter  Google Scholar 

  11. Li, C. T., Hwang, M. S., & Chu, Y. P. (2008). A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Computer Communications, 31(12), 2803–2814.

    Article  Google Scholar 

  12. Lin, X., Sun, X., Ho, P. H., & Shen, X. (2007). GSIS: a secure and privacy preserving protocol for vehicular communications. IEEE Transactions on Vehicular Technology, 56(6), 3442–3456.

    Article  Google Scholar 

  13. Lu, R., Lin, X., Zhu, H., Ho, P. H., & Shen, X. (2008). ECPP: efficient conditional privacy preservation protocol for secure vehicular communications. In Proceedings of the 27th IEEE conference on computer communications (pp. 1229–1237). Phoenix, Arizona, USA, April 2008.

    Chapter  Google Scholar 

  14. Maurer, U. M., & Yacobi, Y. (1996). A non-interactive public-key distribution system. Designs, Codes and Cryptography, 9(3), 305–316.

    Google Scholar 

  15. Moustafa, H., Bourdon, G., & Gourhant, Y. (2005). AAA in vehicular communication on highways with ad hoc networking support: a proposed architecture. In Proceedings of the 2nd ACM international workshop on vehicular ad hoc networks (pp. 79–80). Cologne, Germany, September 2005.

    Chapter  Google Scholar 

  16. Papadimitratos, P., Kung, A., Hubaux, J. P., & Kargl, F. (2006). Privacy and identity management for vehicular communication systems: a position paper. In Proceedings of the workshop on standards for privacy in user-centric identity management. Zurich, Switzerland, July 2006.

    Google Scholar 

  17. Papadimitratos, P., Gligor, V., & Hubaux, J. P. (2006). Securing vehicular communications—assumptions, requirements, and principles. In Proceedings of the workshop on embedded security in cars (pp. 5–14). Berlin, Germany, November 2006.

    Google Scholar 

  18. Parno, B., & Perrig, A. (2005). Challenges in securing vehicular networks. In Proceedings of the 4th workshop on hot topics in networks (pp. 2803–2814). Maryland, USA, November 2005.

    Google Scholar 

  19. Plößl, K., Nowey, T., & Mletzko, C. (2006). Towards a security architecture for vehicular ad hoc networks. In Proceedings of the 1st international conference on availability, reliability and security (pp. 374–381). Vienna, Austria, April 2006.

    Google Scholar 

  20. Plößl, K., & Federrath, H. (2008). A privacy aware and efficient security infrastructure for vehicular ad hoc networks. Computer Standards & Interfaces, 30(6), 390–397.

    Article  Google Scholar 

  21. Raya, M., & Hubaux, J. P. (2005). Security aspects of inter-vehicular communications. In Proceedings of the 5th Swiss transport research conference. Monte Verità, Ascona, Switzerland, March 2005.

    Google Scholar 

  22. Raya, M., & Hubaux, J. P. (2005). The security of vehicular ad hoc networks. In Proceedings of the 3rd ACM workshop on security of ad hoc and sensor networks (pp. 11–21). Alexandria, Virginia, USA, November 2005.

    Chapter  Google Scholar 

  23. Raya, M., Aziz, A., & Hubaux, J. P. (2006). Efficient secure aggregation in VANETs. In Proceedings of the 3rd international workshop on vehicular ad hoc networks (pp. 67–75). Los Angeles, California, USA, September 2006.

    Chapter  Google Scholar 

  24. Raya, M., Jungels, D., Papadimitratos, P., Aad, I., & Hubaux, J. P. (2006). Certificate revocation in vehicular ad hoc networks (LCA-Report-2006-006). School of Computer and Communication Sciences, EPFL, Switzerland, 2006.

  25. Raya, M., & Hubaux, J. P. (2007). Securing vehicular ad hoc networks. Journal of Computer Security, 15(1), 39–68.

    Google Scholar 

  26. Teo, J. C. M., Ngoh, L. H., & Guo, H. (2009). An anonymous DoS-resistant password-based authentication, key exchange and pseudonym delivery protocol for vehicular networks. In Proceedings of the IEEE 23rd international conference on advanced information networking and applications (pp. 675–682). Bradford, United Kingdom, May 2009.

    Chapter  Google Scholar 

  27. Wang, N. W., Huang, Y. M., & Chen, W. M. (2008). A novel secure communication scheme in vehicular ad hoc networks. Computer Communications, 31(12), 2827–2837.

    Article  Google Scholar 

  28. Wasef, A., & Shen, X. (2008). PPGCV: privacy preserving group communications protocol for vehicular ad hoc networks. In Proceedings of 2008 IEEE international conference on communications (pp. 1458–1463). Beijing, China, May 2008.

    Chapter  Google Scholar 

  29. Xu, Q., Mak, T., Ko, J., & Sengupta, R. (2004). Vehicle-to-vehicle safety messaging in DSRC. In Proceedings of the 1st ACM international workshop on vehicular ad hoc networks (pp. 19–28). Philadelphia, Pennsylvania, USA, October 2004.

    Chapter  Google Scholar 

  30. Yang, X., Liu, J., Zhao, F., & Vaidya, N. H. (2004). A vehicle-to-vehicle communication protocol for cooperative collision warning. In Proceedings of the 1st annual international conference on mobile and ubiquitous systems: networking and services (pp. 114–123). Boston, Massachusetts, USA, August 2004.

    Chapter  Google Scholar 

  31. Zarki, M. E., Mehrotra, S., Tsudik, G., & Venkatasubramanian, N. (2002). Security issues in a future vehicular network. In Proceedings of European wireless (pp. 270–274). Florence, Italy, February 2002.

    Google Scholar 

  32. Zeadally, S., Hunt, R., Chen, Y. S., Irwin, A., & Hassan, A. (2010). Vehicular ad hoc networks (VANETs): status, results, and challenges. Telecommunication Systems. doi:10.1007/s11235-010-9400-5.

  33. Zhang, C., Lin, X., Lu, R., & Ho, P. H. (2008). RAISE: an efficient RSU-aided message authentication scheme in vehicular communication networks. In Proceedings of the 2008 IEEE international conference on communications (pp. 1415–1457). Beijing, China, May 2008.

    Google Scholar 

  34. Zhang, C., Liu, R., Ho, P. H., & Chen, A. (2008). A location privacy preserving authentication scheme in vehicular networks. In Proceedings of IEEE wireless communications and networking conference (pp. 2543–2548). Las Vegas, Nevada, USA, March 2008.

    Chapter  Google Scholar 

  35. Zhu, S., Xu, S., Setia, S., & Jajodia, S. (2003). Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach. In Proceedings of the 11th IEEE international conference on network protocols (pp. 326–335). Atlanta, Georgia, USA, November 2003.

    Google Scholar 

  36. Zhu, S., Setia, S., Xu, S., & Jajodia, S. (2006). GKMPAN: An efficient group rekeying scheme for secure multicast in ad-hoc networks. Journal of Computer Security, 14(4), 301–325.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wen-Bing Horng.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Horng, WB., Lee, CP. & Peng, JW. Privacy preservation in secure group communications for vehicular ad hoc networks. Telecommun Syst 50, 355–365 (2012). https://doi.org/10.1007/s11235-010-9409-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-010-9409-9

Keywords

Navigation