{"title":"变更协议VANETs的化名","authors":"Adetundji Adigun, B. A. Bensaber, Ismaïl Biskri","doi":"10.1109/LCNW.2013.6758514","DOIUrl":null,"url":null,"abstract":"We propose in this paper a security protocol based on periodic change of pseudonyms. The idea is to avoid illegal traceability of vehicles during their communications and preserve their privacy and confidential information. Two different approaches are proposed. In the first approach, each vehicle asks the central authority a new communication pseudonym after a time t. While in the second approach, each vehicle generates itself after a time t, a new communication pseudonym. Our objective is to permit at least two vehicles to change their pseudonym in the same time interval. We evaluate in this work, the bandwidth used by considering the vehicles speed in each approach. The proposed protocol is based on equidistant distribution of the road side unit and uses the average of speed permitted on the road to evaluate lifetime t of the communication's pseudonyms and certificates. The exchange of information is based on asymmetric and symmetric cryptography scheme and it uses hash function. Our protocol provides authentication, non-repudiation and privacy.","PeriodicalId":290924,"journal":{"name":"38th Annual IEEE Conference on Local Computer Networks - Workshops","volume":"353 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"20","resultStr":"{\"title\":\"Protocol of change pseudonyms for VANETs\",\"authors\":\"Adetundji Adigun, B. A. Bensaber, Ismaïl Biskri\",\"doi\":\"10.1109/LCNW.2013.6758514\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We propose in this paper a security protocol based on periodic change of pseudonyms. The idea is to avoid illegal traceability of vehicles during their communications and preserve their privacy and confidential information. Two different approaches are proposed. In the first approach, each vehicle asks the central authority a new communication pseudonym after a time t. While in the second approach, each vehicle generates itself after a time t, a new communication pseudonym. Our objective is to permit at least two vehicles to change their pseudonym in the same time interval. We evaluate in this work, the bandwidth used by considering the vehicles speed in each approach. The proposed protocol is based on equidistant distribution of the road side unit and uses the average of speed permitted on the road to evaluate lifetime t of the communication's pseudonyms and certificates. The exchange of information is based on asymmetric and symmetric cryptography scheme and it uses hash function. Our protocol provides authentication, non-repudiation and privacy.\",\"PeriodicalId\":290924,\"journal\":{\"name\":\"38th Annual IEEE Conference on Local Computer Networks - Workshops\",\"volume\":\"353 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"20\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"38th Annual IEEE Conference on Local Computer Networks - Workshops\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/LCNW.2013.6758514\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"38th Annual IEEE Conference on Local Computer Networks - Workshops","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/LCNW.2013.6758514","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
We propose in this paper a security protocol based on periodic change of pseudonyms. The idea is to avoid illegal traceability of vehicles during their communications and preserve their privacy and confidential information. Two different approaches are proposed. In the first approach, each vehicle asks the central authority a new communication pseudonym after a time t. While in the second approach, each vehicle generates itself after a time t, a new communication pseudonym. Our objective is to permit at least two vehicles to change their pseudonym in the same time interval. We evaluate in this work, the bandwidth used by considering the vehicles speed in each approach. The proposed protocol is based on equidistant distribution of the road side unit and uses the average of speed permitted on the road to evaluate lifetime t of the communication's pseudonyms and certificates. The exchange of information is based on asymmetric and symmetric cryptography scheme and it uses hash function. Our protocol provides authentication, non-repudiation and privacy.