skip to main content
10.1145/1089761.1089775acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
Article

Balancing auditability and privacy in vehicular networks

Published: 13 October 2005 Publication History

Abstract

We investigate how to obtain a balance between privacy and audit requirements in vehicular networks. Challenging the current trend of relying on asymmetric primitives within VANETs, our investigation is a feasibility study of the use of symmetric primitives, resulting in some efficiency improvements of potential value. More specifically, we develop a realistic trust model, and an architecture that supports our solution. In order to ascertain that most users will not find it meaningful to disconnect or disable transponders, we design our solution with several types of user incentives as part of the structure. Examples of resulting features include anonymous toll collection; improved emergency response; and personalized and route-dependent traffic information.

References

[1]
N. Ben Salem, J.-P. Hubaux, and M. Jakobsson. Reputation-based WiFi Deployment Protocols and Security Analysis. In Proceedings of the 2nd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, 2004.
[2]
S. Buchegger and J.-Y. Boudec. Performance Analysis of the CONFIDANT Protocol: Cooperation of Nodes - Fairness in Distributed Ad Hoc Networks. In Proceedings of MobiHOC, 2002.
[3]
J. Blum and A. Eskandarian. The Threat of Intelligent Collisions. In IT Professional, 6(1):24-29, Jan.-Feb. 2004.
[4]
D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, volume 24, pp. 84--88, Feb. 1981.
[5]
Z. Desptovic and K. Aberer. Trust and Reputation in P2P Networks. In 1st Interdisciplinary Symposium on Online Reputation Mechanisms, 2003.
[6]
G. Danezis, R. Dingledine, and N. Mathewson. Mixminion: Design of a Type III Anonymous Remailer Protocol. In Proceedings of the 2003 IEEE Symposium on Security and Privacy, pp. 2--15, May 2003.
[7]
S. Duri, M. Gruteser, X. Liu, P. Moskowitz, R. Perez, M. Singh, and J. Tang. Framework for Security and Privacy in Automotive Telematics. In Proceedings of the 2nd International Workshop on Mobile Commerce, Atlanta, Georgia, USA, pp. 25--32, 2002.
[8]
Federal Communications Commission. FCC 99-305. FCC Report and Order, October 1999.
[9]
P. Golle, D. Greene, and J. Staddon. Detecting and Correcting Malicious Data in VANETs. In Proceedings of the First ACM Workshop on Vehicular Ad Hoc Networks, pp. 29--37, 2004.
[10]
D. Goldschlag, M. Reed, and P. Syverson. Onion routing. Commun. ACM, 42(2):39--41, ACM press, New York, February 1999.
[11]
A. Herzberg, M. Jakobsson, S. Jarecki, H. Krawczyk and M. Yung, Proactive Public Key and Signature Systems. In ACM Conference on Computer and Communications Security, pp. 100--110, 1997.
[12]
J.-P. Hubaux, S. Capkun, and J. Luo. The Security and Privacy of Smart Vehicles. In IEEE SECURITY \& PRIVACY, Vol. 2, No. 3, pp. 49--55, 2004.
[13]
D. Houser and J. Wooders. Reputation in Auctions: Theory and Evidence from eBay. Working Paper 00-01, University of Arizona, 2001.
[14]
M. Jakobsson, S. Capkun, and J. P. Hubaux. Secure and Privacy-Preserving Communication in Hybrid Ad hoc Networks. Technical Report IC/2004/10, EPFL-DI-ICA, January 2004.
[15]
M. Jakobsson and M. Yung. Distributed Magic Ink DSS Signatures. In Proceeding of Eurocrypt '97, 1997.
[16]
J. Kong and X. Hong. Andor: Anonymous on Demand Routing with Untraceable Routes for Mobile Ad-Hoc Networks. In Fourth ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc'03), pp. 291--302, 2003.
[17]
P. Karger and F. Yair. Security and Privacy Threats to ITS. In The Second World Congress on Intelligent Transport Systems, pp. 2452--2458, November 1995.
[18]
S. Micali. Fair Cryptosystems. In Proceedings of Crypto, 1992.
[19]
P. Michiardi and R. Molva. Core: A Collaborative Reputation Mechanism to Enforce Node cooperation in Mobile Ad Hoc Networks. In Proceedings of the 6th IFIP Communications and Multimedia Security Conference, 2002.
[20]
A. Perrig, R. Canetti, J. D. Tygar, and D. Song. The TESLA Broadcast Authentication Protocol. RSA CryptoBytes, 5:(2):2--13, 2002.
[21]
M. Raya and J.-P. Hubaux. The Security of Vehicular Networks. In EPFL Technical Report IC/2005/009, 2005.
[22]
M. Raya and J.-P. Hubaux. Security Aspects of Inter-Vehicle Communications. In Swiss Transport Research Conference(STRC) 2005, March 2005.
[23]
ZMT02 M. Zarki, S. Mehrotra, G. Tsudik, and N. Venkatasubramanian. Security Issues in a Future Vehicular Network. In European Wireless, 2002.

Cited By

View all

Index Terms

  1. Balancing auditability and privacy in vehicular networks

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      Q2SWinet '05: Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
      October 2005
      158 pages
      ISBN:1595932410
      DOI:10.1145/1089761
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 13 October 2005

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. audit
      2. incentive
      3. light-weight
      4. privacy
      5. symmetric

      Qualifiers

      • Article

      Conference

      MSWiM05
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 46 of 131 submissions, 35%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)13
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 17 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)A Comprehensive Study on VANET SecurityAdvancements in Smart Computing and Information Security10.1007/978-3-031-59100-6_25(363-382)Online publication date: 2-May-2024
      • (2023)Review and Perspectives on the Audit of Vehicle-to-Everything CommunicationsIEEE Access10.1109/ACCESS.2023.330118211(81623-81645)Online publication date: 2023
      • (2023)BEPHAPJournal of Systems Architecture: the EUROMICRO Journal10.1016/j.sysarc.2023.102869138:COnline publication date: 1-May-2023
      • (2022)PAS: Privacy-Preserving Authentication Scheme Based on SDN for VANETsApplied Sciences10.3390/app1209479112:9(4791)Online publication date: 9-May-2022
      • (2022)A Review on Cybersecurity of Cloud Computing for Supporting Connected Vehicle ApplicationsIEEE Internet of Things Journal10.1109/JIOT.2022.31524779:11(8250-8268)Online publication date: 1-Jun-2022
      • (2022)A practical privacy-preserving communication scheme for CAMs in C-ITSJournal of Information Security and Applications10.1016/j.jisa.2021.10310365(103103)Online publication date: Mar-2022
      • (2022)An improved proxy-vehicle based authentication scheme for vehicular ad-hoc networksInternational Journal of Information Technology10.1007/s41870-022-00938-514:5(2441-2449)Online publication date: 17-May-2022
      • (2022)A Privacy Enhancement Scheme Based on Blockchain and Blind Signature for Internet of VehiclesBlockchain and Trustworthy Systems10.1007/978-981-16-7993-3_28(368-387)Online publication date: 1-Jan-2022
      • (2021)Authentication strategies in vehicular communications: a taxonomy and frameworkEURASIP Journal on Wireless Communications and Networking10.1186/s13638-021-01968-62021:1Online publication date: 21-May-2021
      • (2021)A Model to Evaluate Reliability of Authentication Protocols in C-ITS Safety-Critical ApplicationsIEEE Transactions on Vehicular Technology10.1109/TVT.2021.309708870:9(9306-9319)Online publication date: Sep-2021
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media