Skip to main content
Log in

Pseudonymous authentication for secure V2I services in cloud-based vehicular networks

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Vehicular cloud computing is a technological paradigm shifting which takes advantage of cloud computing to provide vehicles with useful computing resources and services on the roads. The advancement in smart vehicles and information technologies motivate researchers and industries to pay attention to the combination of vehicular network with cloud computing in recent. In order to make the emerging vehicular cloud computing viable, security issues must be considered. Especially, privacy is one of the critical security issues in vehicular cloud services as well as vehicular communications since a third-party entity may be involved in cloud management and operations. In this paper, we propose an anonymous vehicle-to-infrastructure cloud access management system in which identity and location privacy of service requesting vehicles are prevented from not only a global eavesdropper but also any single system management entity. We devise pseudonymous service access tokens for vehicles and RSU-local revocation mechanism to reduce the size of revocation list containing revoked pseudonyms in the proposed system.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Notes

  1. We assume that the selection of RSUs would be possible because modern smart vehicles can equip a navigation system with digital maps.

References

  • Abid H, Phuong LTT, Wang J, Lee S, Qaisar S (2011) V-cloud: vehicular cyber-physical systems and cloud computing. In: Proc. of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies (ISABEL’11). ACM, Barcelona, Spain, pp 165:1–165:5

  • Abuelela M, Olariu S (2010) Taking vanet to the clouds. In: Proc. of the 8th International Conference on Advances in Mobile Computing and Multimedia (MoMM’10). ACM, Paris, pp 6–13

  • Boneh D, Franklin M (2001) Identity-based encryption from the weil pairing. In: Advances in Cryptology–CRYPTO, LNCS, vol. 2139. Springer, pp 213–229

  • Boneh D, Lynn B, Shacham H (2001) Short signatures from the weil pairing. In: Advances in Cryptology–ASIACRYPT, LNCS, vol. 2248. Springer, pp 514–532

  • Calandriello G, Papadimitratos P, Hubaux JP, Lioy A (2007) Efficient and robust pseudonymous authentication in vanet. In: Proc. of the 4th ACM International Workshop on Vehicular Ad Hoc Networks (VANET’07). ACM, Montreal, Quebec, pp 19–28

  • Cha JC, Cheon JH (2003) An identity-based signature from gap diffie-hellman groups. In: International Conference on Theory and Practice in Public Key Cryptography—PKC, LNCS, vol 2567. Springer, pp 18–30

  • Gentry C, Silverberg A (2002) Hierarchical id-based cryptography. In: Advances in Cryptology—ASIACRYPT, LNCS, vol. 2501. Springer, pp 548–566

  • Gu L, Zeng D, Guo S, (2013) Vehicular cloud computing: a survey. In: Proc. of 2013 IEEE Globecom Workshops. IEEE, Atlanta, pp 403–407

  • Kim JY, Choi HK, Copeland JA (2010) An efficient authentication scheme for security and privacy perservation in v2i communications. In: Proc. of the (2010) IEEE vehicular technology conference fall (VTC 2010-fall). IEEE, Ottawa, pp 1–6

  • Lee E, Lee EK, Gerla M, Oh SY (2013) Vehicular cloud networking: architecture and design principles. IEEE Commun Mag 52(2):148–155

    Article  Google Scholar 

  • Li J, Zhang F, Wang Y (2006) A new hierarchical id-based cryptosystem and cca-secure pke. Emergind Directions in Embedded and Ubiquitous Computing, LNCS, vol. 4907. Springer, pp 362–371

  • Li J, Chen X, Li M, Li J, Lee PP, Lou W (2014) Secure deduplication with efficient and reliable convergent key management. IEEE Trans Parallel Distrib Syst 25(6):1615–1625

    Article  Google Scholar 

  • Libert B, Quisquater JJ (2002) On constructing certificateless cryptosystems from identity based encryption. In: Public key cryptography—PKC, LNCS. vol. 2567. Springer, pp 18–30

  • Lin X, Sun X, Ho PH, Shen X (2007) Gsis: a secure and privacy preserving protocol for vehicular communications. IEEE Trans Veh Technol 56(6):3442–3456

    Article  Google Scholar 

  • Lu R, Lin X, Zhu H, Ho PH, Shen X (2008) Ecpp: efficient conditional privacy preservation protocol for secure vehicular communications. In: Proc. of the 28th IEEE International Conference on Computer Communications (INFOCOM’08). IEEE, Phoenix, pp 1229–1237

  • Lu R, Lin X, Shi Z, Shen XS (2009) A novel anonymous mutual authentication protocol with provable link-layer location privacy. IEEE Trans Veh Technol 58(3):1454–1466

    Article  Google Scholar 

  • Olariu S, Hristov T, Yan G (2013) The next paradigm shift: From vehicular networks to vehicular clouds. In: The cutting edge directions, mobile ad hoc networking, pp 645–700

  • Park Y, Sur C, Jung CD, Rhee KH (2010) An efficient anonymous authentication protocol for secure vehicular communications. J Inf Sci Eng 26(3):785–800

    Google Scholar 

  • Park Y, Sur C, Rhee KH (2014) A privacy preserving v2i service access management system for vehicular clouds. In: Proc. of the 6th International Workshop on Managing Insider Security Threaths (MIST 2014)

  • Raya M, Hubaux JP (2007) Securing vehicular ad hoc networks. J Comput Secur 15(1):39–68

    Article  Google Scholar 

  • Sampigethaya K, Li M, Huang L, Poovendran R (2007) Amoeba: robust location privacy scheme for vanet. IEEE J Sel Areas Commun 25(8):1569–1589

    Article  Google Scholar 

  • Sun Y, Lu R, Lin X, Shen X (2010) An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. IEEE Trans Veh Technol 59(7):3589–3603

    Article  Google Scholar 

  • Sur C, Park Y, Rhee KH (2014) An efficient and secure navigation protocol based on vehicular cloud. Int J Comput Math. doi:10.1080/00207160.2014.934685

  • Whaiduzzaman M, Sookhak M, Gani A, Buyya R (2014) A survey on vehicular cloud computing. J Netw Comput Appl 40:325–344

    Article  Google Scholar 

  • Whyte W, Weimerskirch A, Kumar V, Hehn T (2013) A security credential management system for v2v communications. In: Proc. of the IEEE Vehicular Networking Conference (VNC’13). IEEE, Boston, pp 1–8

  • Yu R, Zhang Y, Gjessing S, Xia W, Yang K (2013) Toward cloud-based vehicular networks with efficient resource management. IEEE Netw 27(5):48–55

    Article  Google Scholar 

  • Zhang C, Lu R, Ho PH, Chen A (2008) A location privacy preserving authentication scheme in vehicular networks. In: Proc. of the IEEE Wireless Communications and Networking Conference (WCNC’08). IEEE, Las Vegas, pp 2543–2548

  • Zhu X, Jiang S, Wang L, Li H (2014) Efficient privacy-preserving authentication for vehicular ad hoc networks. IEEE Trans Veh Technol 63(2):907–919

    Article  Google Scholar 

Download references

Acknowledgments

This research was supported by the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT and Future Planning (MSIP) (No. NRF-2014R1A2A1A11052981), and partially supported by Next-Generation Information Computing Development Program funded by the MSIP (No. 2011-0029927).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kyung-Hyune Rhee.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Park, Y., Sur, C. & Rhee, KH. Pseudonymous authentication for secure V2I services in cloud-based vehicular networks. J Ambient Intell Human Comput 7, 661–671 (2016). https://doi.org/10.1007/s12652-015-0309-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-015-0309-4

Keywords

Navigation