{"title":"基于vanet的通信假名生命周期的安全概念证明","authors":"Adetundji Adigun, B. A. Bensaber, Ismaïl Biskri","doi":"10.1145/2386958.2386975","DOIUrl":null,"url":null,"abstract":"To make Vehicular Ad Hoc Network (VANET) applications useful to the users, the security problem must be solved. Recent researches have suggested the use of a set of anonymous keys certified by the issuing CA (Central authority) to preserve privacy, authentication, and confidentiality of the communicating entities. But how to determine the right time for the vehicles to exchange their communication pseudonyms and what would be the impacts on the network resources such as time processing and memory. In this paper, we propose a protocol that preserves authentication, non repudiation, and location privacy and helps vehicles to exchange their pseudonyms at roughly the same time. It is based on calculating the Euclidean distance and the average of the speed permitted on the path to evaluate the lifetime of the communication's pseudonyms. The exchange of the information is based on asymmetric and symmetric cryptography scheme and it uses hash function. The protocol permits to determine the expiration time of pseudonyms and how to make the distribution of all the road side units along the road in order to establish a good communication between them and the vehicles.","PeriodicalId":254708,"journal":{"name":"Proceedings of the second ACM international symposium on Design and analysis of intelligent vehicular networks and applications","volume":"45 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Proof of concept of a security based on lifetime of communication's pseudonyms for the VANETs\",\"authors\":\"Adetundji Adigun, B. A. Bensaber, Ismaïl Biskri\",\"doi\":\"10.1145/2386958.2386975\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"To make Vehicular Ad Hoc Network (VANET) applications useful to the users, the security problem must be solved. Recent researches have suggested the use of a set of anonymous keys certified by the issuing CA (Central authority) to preserve privacy, authentication, and confidentiality of the communicating entities. But how to determine the right time for the vehicles to exchange their communication pseudonyms and what would be the impacts on the network resources such as time processing and memory. In this paper, we propose a protocol that preserves authentication, non repudiation, and location privacy and helps vehicles to exchange their pseudonyms at roughly the same time. It is based on calculating the Euclidean distance and the average of the speed permitted on the path to evaluate the lifetime of the communication's pseudonyms. The exchange of the information is based on asymmetric and symmetric cryptography scheme and it uses hash function. The protocol permits to determine the expiration time of pseudonyms and how to make the distribution of all the road side units along the road in order to establish a good communication between them and the vehicles.\",\"PeriodicalId\":254708,\"journal\":{\"name\":\"Proceedings of the second ACM international symposium on Design and analysis of intelligent vehicular networks and applications\",\"volume\":\"45 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-10-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the second ACM international symposium on Design and analysis of intelligent vehicular networks and applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/2386958.2386975\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the second ACM international symposium on Design and analysis of intelligent vehicular networks and applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2386958.2386975","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Proof of concept of a security based on lifetime of communication's pseudonyms for the VANETs
To make Vehicular Ad Hoc Network (VANET) applications useful to the users, the security problem must be solved. Recent researches have suggested the use of a set of anonymous keys certified by the issuing CA (Central authority) to preserve privacy, authentication, and confidentiality of the communicating entities. But how to determine the right time for the vehicles to exchange their communication pseudonyms and what would be the impacts on the network resources such as time processing and memory. In this paper, we propose a protocol that preserves authentication, non repudiation, and location privacy and helps vehicles to exchange their pseudonyms at roughly the same time. It is based on calculating the Euclidean distance and the average of the speed permitted on the path to evaluate the lifetime of the communication's pseudonyms. The exchange of the information is based on asymmetric and symmetric cryptography scheme and it uses hash function. The protocol permits to determine the expiration time of pseudonyms and how to make the distribution of all the road side units along the road in order to establish a good communication between them and the vehicles.