Privacy-preserving and Authentication in VANETs

##plugins.themes.academic_pro.article.main##

Shafika Showkat Moni
D. Manivannan

Abstract

Vehicular Ad Hoc Networks (VANETs) are likely to be deployed in the near future in some form. However, ensuring the privacy of the vehicles/drivers while at the same time authenticating vehicles/drivers are challenging issues in VANETs. Given the importance of these issues, over the last two decades, researchers have given a lot of attention to these issues. A vast number of researchers suggested assigning pseudonyms for vehicles so that the vehicles can use pseudonyms instead of their real ids in their communication, to preserve their privacy. However, assigning a single pseudonym throughout the lifetime of a vehicle is not sufficient to ensure privacy. Moreover, to prevent malicious nodes from participating in VANETs, they should be tracked and punished by authorities. In this paper, we present a critical survey of various solutions addressing privacy-preserving authentication in VANETs. Our survey also throws light on some open issues that need to be addressed.

##plugins.themes.academic_pro.article.details##

How to Cite
Shafika Showkat Moni, & D. Manivannan. (2020). Privacy-preserving and Authentication in VANETs. International Journal of Next-Generation Computing, 11(2), 98–124. https://doi.org/10.47164/ijngc.v11i2.177

References

  1. Al-Sultan, S., Al-Dooriand, M. M., Al-Bayatti, A. H., and Zedan, H. 2014. A comprehensive survey on vehicular ad hoc network. Journal of network and computer applications 37, 380-392.
  2. Ararat, O., Kural, E., and Guvenc, B. A. 2006. Development of a collision warning system for adaptive cruise control vehicles using a comparison analysis of recent algorithms. In Proceedings of IEEE Intelligent Vehicles Symposium. IEEE, 194-199.
  3. Asuquo, P., Cruickshank, H., Morley, J., Ogah, C. P. A., Lei, A., Hathal, W., Bao, S., and Sun, Z. 2018. Security and privacy in location-based services for vehicular and mobile communications: An overview, challenges and countermeasures. IEEE Internet of Things Journal (Early Access ) XX.
  4. Azees, M., Vijayakumar, P., and Deborah, L. 2016. Comprehensive survey on security services in vehicular ad-hoc networks. IET Intelligent Transport Systems 10, 6 (August), 379-388.
  5. Beresford, A. R. and Stajano, F. 2004. Mix zones: User privacy in location-aware services. In Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops.
  6. Bernardini, C., Asghar, M. R., and Crispoc, B. 2017. Security and privacy in vehicular communications: Challenges and opportunities. Vehicular Communications 10, 13-28.
  7. Biswas, S. and Misic, J. 2013. A cross-layer approach to privacy-preserving authentication in WAVE-enabled VANETs. IEEE Transactions on Vehicular Technology 62, 5 (Jun.), 2182-2192.
  8. Blackman, S. and Popoli, R. 1999. Design and analysis of modern tracking systems Artech House Radar Library. Artech house.
  9. Boneh, D. and Shacham, H. 2004. Group signatures with verier-local revocation. In Proceedings of the ACM Conference on Computer and Communications Security. ACM, 168-177.
  10. Boualouache, A., Senouci, S. M., and Moussaoui, S. 2016. Towards an ecient pseudonym management and changing scheme for vehicular adhoc networks. In Proceedings of 2016 IEEE Global Communications Conference.
  11. Buttyan, L., Holczer, T., Weimerskirch, A., and Whyte, W. 2009. SLOW: A practical pseudonym changing scheme for location privacy in VANETs. In Proceedings of 2009 IEEE Vehicular Networking Conference (VNC). IEEE.
  12. Calandriello, G., Papadimitratos, P., Hubaux, J.-P., and Lioy, A. 2007. Ecient
  13. and robust pseudonymous authentication in VANET. In Proceedings of the Fourth ACM International Workshop on Vehicular Ad Hoc Networks (VANET'07), September 10, 2007, Montreal, Quebec, Canada. ACM, 19-28.
  14. Chaum, D. 1983. Blind signatures for untraceable payments. R. L. R. D. Chaum and A. T. Sherman, Eds. Advances in Cryptology. Springer, Boston, MA, 199-203.
  15. Dolev, S., Krzywiecki, L., Panwar, N., and Segal, M. 2015. Vehicle to vehicle authentication. In Proceedings of 17th International Symposium on Stabilization, Safety, and Security of Distributed Systems.
  16. Dolev, S., Krzywiecki, L., Panwar, N., and Segal, M. 2016. Optical PUF for nonforwardable vehicle authentication. Computer Communications 93, 5267.
  17. Dolev, S., Krzywiecki, L., Panwar, N., and Segal, M. 2017. Dynamic attribute based vehicle authentication. Wireless Networks 23, 4, 1045-1062.
  18. D.Reid. 1979. An algorithm for tracking multiple targets. IEEE Transactions on Automatic Control 24, 6 (December), 843-854.
  19. Eckhoff, D. and Sommer, C. 2016. Marrying safety with privacy: A holistic solution for location privacy in VANETs. In Proceedings of 8th IEEE Vehicular Networking Conference (VNC 2016). IEEE, Columbus, OH, 290-297.
  20. Eckhoff, D. and Sommer, C. 2018. Readjusting the privacy goals in vehicular ad-hoc networks: A safety-preserving solution using non-overlapping time-slotted pseudonym pools. Computer Communications 122, 118-128.
  21. Eckhoff, D., Sommer, C., Gansen, T., and Dressler, R. G. F. 2010. Strong and affordable location privacy in VANETs: identity diusion using time-slots and swapping. In Proceedings of Vehicular Networking Conference (VNC). IEEE, 174-181.
  22. Eckhoff, D., Sommer, C., Gansen, T., and Dressler, R. G. F. 2011. SlotSwap: Strong and acordable location privacy in intelligent transportation systems. IEEE Communications Magazine 49, 11, 126-133.
  23. Emara, K. 2017. Safety-aware location privacy in VANET: Evaluation and comparison. IEEE Transactions on Vehicular Technology 66, 12, 10718-10731.
  24. Emara, K.,Woerndl, W., and Schlichter, J. 2013. Vehicle tracking using vehicular network beacons. In Proceedings of 14th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM). IEEE.
  25. Emara, K., Woerndl, W., and Schlichter, J. 2015a. CAPS: Context-aware privacy scheme for VANET safety applications. In Proceedings of 8th ACM Conference on Security and Privacy in Wireless Mobile Networks. ACM.
  26. Emara, K., Woerndl, W., and Schlichter, J. 2015b. On evaluation of location privacy preserving schemes for VANET safety applications. Computer Communications 63, 11-23.
  27. Eze, E. C., Zhang, S., and Liu, E. 2014. Vehicular ad hoc networks (VANETs): Current state, challenges, potentials and way forward. In Proceedings of 20th International Conference on Automation and Computing. Craneld University, Bedfordshire, UK, 176-181.
  28. Ferrag, M. A., Maglaras, L., and Ahmim, A. 2017. Privacy-preserving schemes for ad hoc social networks: A survey. IEEE Communications Surveys and Tutorials 19, 4 (Fourth Quarter), 3015-3045.
  29. Forster, D., Lohr, H., Gratz, A., Petit, J., and Kargl, F. 2017. An evaluation of pseudonym changes for vehicular networks in large-scale, realistic trac scenarios. IEEE Transactions on Intelligent Transportation Systems ( Early Access ) X, 1-6.
  30. Freudiger, J., Raya, M., Felegyhazi, M., Papadimitratos, P., and Hubaux, J.-P. 2007. Mix-zones for location privacy in vehicular networks. In Proceedings of the First International Workshop on Wireless Networking for Intelligent Transportation Systems (Win-ITS),Vancouver, BC, Canada, Aug. 2007.
  31. Gerla, M., Wu, C., Pau, G., and Zhu, X. 2014. Content distribution in VANETs. Vehicular Communications 1, 1 (January), 3-12.
  32. Gmbh, R. B. 2012. Can with
  33. exible data-rate. Vector CANtech, Inc., Novi, MI, USA, Specification Version 1.0, 2012.
  34. Hao, Y., Tang, J., Cheng, Y., and Zhou, C. 2010. Secure data downloading with privacy preservation in vehicular ad hoc networks. In Proceedings of IEEE International Conference on Communications. IEEE.
  35. Hartenstein, H. and Laberteaux, L. P. 2008. A tutorial survey on vehicular ad hoc networks. IEEE Communications Magazine 46, 164-171.
  36. Hasrouny, H., Samhat, A. E., Bassil, C., and Laouiti, A. 2017. VANET security challenges and solutions: a survey. Vehicular Communications 7, 7-20.
  37. He, D., Zeadally, S., Xu, B., and Huang, X. 2015. An ecient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Transactions on Information Forensics and Security 10, 12, 2681-2691.
  38. Huang, L., Matsuura, K., Yamane, H., and Sezaki, K. 2005. Enhancing wireless location privacy using silent period. In IEEE Wireless Communications and Networking Conference, 2005. Vol. 2. IEEE, IEEE, 1187-1192.
  39. Jo, H. J., Kim, I. S., and Lee, D. H. 2018. Reliable cooperative authentication for vehicular networks. IEEE Transactions on Intelligent Transportation Systems 19, 4, 1065 - 1079.
  40. k. Emara, Woerndl, W., and Schlichter, J. 2016. Context-based pseudonym changing
  41. scheme for vehicular adhoc networks. arXiv preprint arXiv:1607.07656 .
  42. Kaliski, B. 2000. PKCS #5: Password-based cryptography specication version 2.0.
  43. Kalman and Rudolph, E. 1960. A new approach to linear ltering and prediction problems. Journal of basic Engineering 82, 1 (March), 35-45.
  44. Karagiannis, G., Altintas, O., Ekici, E., Heijenk, G., Jarupan, B., Lin, K., and Weil, T. 2011. Vehicular Networking: A survey and tutorial on requirements, architectures, challenges, standards and solutions. IEEE Communications Surveys and Tutorials 13, 4,584-616.
  45. Kato, R., Iwata, M., Hara, T., Suzuki, A., Xie, X., Arase, Y., and Nishio, S. 2012. A dummy-based anonymization method based on user trajectory with pauses. In Proceedings of the 20th International Conference on Advances in Geographic Information Systems (SIGSPATIAL 2012). ACM, New York, NY, USA, 249-258.
  46. Lamport, L. 1981. Password authentication with insecure communication. Communications of the ACM 24, 11 (November), 770-772.
  47. Li, J., Lu, H., and Guizani, M. 2015. ACPN: A novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs. IEEE Transactions on Parallel and Distributed Systems 26, 4, 938-948.
  48. Liao, J. and Li, J. 2009. Eectively changing pseudonyms for privacy protection in VANETs. In Proceedings of 10th International Symposium on Pervasive Systems, Algorithms, and Networks. IEEE, IEEE, 648-652.
  49. Liu, X., Zhao, H., Pan, M., Yue, H., Li, X., and Fang, Y. 2012. Trac-aware multiple mix zone placement for protecting location privacy. In Proceedings of IEEE INFOCOM, Orlando, FL, USA, 2012. IEEE, 972-980.
  50. Lu, H. and Li, J. 2016. Privacy-preserving authentication schemes for vehicular ad hoc networks: a survey. Wireless Communication and Mobile Computing 16, 6 (April), 643-655.
  51. Lu, R., Lin, X., Luan, H., Liang, X., and Shen, X. 2012. Pseudonym changing at social spots: An eective strategy for location privacy in VANETs. IEEE Transactions on Vehicular Technology 61, 1 (Jan.), 86-96.
  52. Lu, R., Lin, X., Luan, T. H., Liang, X., and Shen, X. 2011. Anonymity analysis on social spot based pseudonym changing for location privacy in VANETs. In in Proceedings of IEEE International Conference on Communications, 2011.
  53. Ma, Z., Kargl, F., and Weber, M. 2010. Measuring long-term location privacy in vehicular communication systems. Computer Communications 33, 12 (Jul.), 1414-1427.
  54. Manvi, S. S. and Tangade, S. 2017. A survey on authentication schemes in VANETs for secured communication. Vehicular Communications 9, 19-30.
  55. Mershad, K. and Artail, H. 2013. A framework for secure and ecient data acquisition in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology 62, 2 (Feb.), 536-551.
  56. Mokhtar, B. and Azab, M. 2015. Survey on security issues in vehicular ad hoc networks. Alexandria Engineering Journal 54, 1115-1126.
  57. Offor, P. 2012. Vehicle ad hoc network VANET: Safety benets and security challenges. Palanisamy, B. and Liu, L. 2011. Mobimix: Protecting location privacy with mix-zones over road networks. In Proceedings of IEEE 27th International Conference on Data Engineering, April 2011 Hanover, Germany. IEEE, 494-505.
  58. Pan, Y. and Li, J. 2013. Cooperative pseudonym change scheme based on the number of neighbors in vanets. Journal of Network and Computer Applications 36, 6 (November), 1599-1609.
  59. Pappu, R. S. 2000. Physical one-way functions. Ph.D. thesis, Massachusetts Institute of Technology. Pappu, R. S., Recht, B., Taylor, J., and Gershenfeld, N. 2002. Physical one-way functions. Science 297, 5589 (Sep.), 2026-2030.
  60. Peng, H., Liang, L., Shen, X., and Li, G. Y. 2018. Vehicular communications: A network layer perspective. IEEE Transactions on Vehicular Technology.
  61. Petit, J., Bosch, C., Feiri, M., and Kargl, F. 2012. On the potential of PUF for pseudonym generation in vehicular networks. In Proceedings of IEEE Vehicular Networking Conference (VNC). IEEE, IEEE, 94-100.
  62. Petit, J., Schaub, F., Feiri, M., and Kargl, F. 2015. Pseudonym schemes in vehicular networks: A survey. IEEE Communications Surveys and Tutorials 17, 1, 228-255. Qu, F., Wu, Z., Wang, F. Y., and Cho, W. 2015. A security and privacy review of vanets. IEEE Transactions on Intelligent Transportation Systems 16, 6 (December), 2985-2996.
  63. Rafaeli, S. and Hutchison, D. 2003. A survey of key management for secure group communication. ACM Computing Surveys 35, 3 (September), 309-329.
  64. Raya, M. and Hubaux, J. P. 2007. Securing vehicular ad hoc networks. Journal of Computer Security 15, 1, 39-68.
  65. Ren, K., Lou, W., Kim, K., and Deng, R. 2006. A novel privacy preserving authentication and access control scheme for pervasive computing environments. IEEE Transactions on Vehicular Technology 55, 4 (July), 1373-1384.
  66. Riley, M., Akkaya, K., and Fong, K. 2011. A survey of authentication schemes for vehicular ad hoc networks. Security and Communication Networks 4, 10, 1137-1152.
  67. Sakiz, F. and Sen, S. 2017. A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV. Ad Hoc Networks 61, 1 (June), 33-50.
  68. Sampigethaya, K., Huang, L., M. Li, R. P., Matsuura, K., and Sezaki, K. 2005. CARAVAN: Providing location privacy for VANET. In Proceedings of Embedded Security in Cars (ESCAR), 2005.
  69. Sampigethaya, K., Li, M., Huang, L., and Poovendran, R. 2007. AMOEBA: Robust location privacy scheme for VANET. IEEE Journal On Selected Areas In Communications 25, 8(Oct.), 1569-1589.
  70. Shamir, A. and Tauman, Y. 2001. Improved online/oine signature schemes. In Lecture Notes in Computer Science (including subseries Lecture Notes in Articial Intelligence and Lecture Notes in Bioinformatics), 2001, Vol.2139. Springer-Verlag, New York, Inc., 355-367.
  71. Shokri, R., Theodorakopoulos, G., Boudec, J.-Y. L., and Hubaux, J.-P. 2011. Quantifying location privacy. In Proceedings of IEEE Symposium on Security and Privacy. IEEE, 247-262.
  72. Shokri, R., Theodorakopoulos, G., Papadimitratos, P., Kazemi, E., and Hubaux, J. P. 2014. Hiding in the mobile crowd: Location privacy through collaboration. IEEE Transactions on Dependable and Secure Computing 11, 3, 266-279.
  73. Studer, A., Bai, F., Bellur, B., and Perrig, A. 2009. A Flexible, extensible, and efficient VANET authentication. Journal of Communications and Networks, Special Issue on Secure Wireless Networks 11, 6 (Dec.), 574-588.
  74. Studer, A., Shi, E., Bai, F., and Perrig, A. 2009. TACKing together effcient authentication, revocation, and privacy in VANETs. In Proceedings of IEEE CS Sixth Annual Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON 09). IEEE.
  75. Taimur, K., Naveed, A., Yue, C., Jalal, S. A., Muhammad, A., ul Haq, S., and
  76. Haitham, C. 2017. Certicate revocation in vehicular ad hoc networks techniques and protocols: a survey. SCIENCE CHINA Information Sciences 60, 10.
  77. Teixeira, F. A., e Silva, V. F., Leoni, J. L., Macedo, D. F., and Nogueira, J. M. S. 2014. Vehicular networks using the IEEE 802.11p standard: An experimental analysis. Vehicular Communications 1, 2 (April), 91-96.
  78. Tomandl, A., Scheuer, F., and Federrath, H. 2012. Simulation-based evaluation of techniques for privacy protection in VANETs. In Proceedings of IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communication. IEEE, 165-172.
  79. T.Willke, Tientrakool, P., and Maxemchuk, N. 2009. A survey of inter-vehicle communication protocols and their applications. IEEE Communication Surveys and Tutorials 11, 2, 3-20.
  80. Vijayakumar, P., Azees, M., Kannan, A., and Lazarus, J. D. 2016. Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems 17, 4 (Apr.), 1015-1028.
  81. Vijayakumar, P., Chang, V., Deborah, J., Balusamy, B., and Shynu, P. G. 2018. Computationally ecient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks. Future Generation Computer Systems 78, 3 (January), 943-955.
  82. Wasef, A. and Shen, X. 2013. EMAP: Expedite message authentication protocol for vehicular ad hoc networks. IEEE Transactions on Mobile Computing 12, 1, 78-89.
  83. Wei, Y.-C. and Chen, Y.-M. 2010. Safe distance based location privacy in vehicular networks. In Proceedings of IEEE 71st Vehicular Technology Conference, May 2010. IEEE.
  84. Whaiduzzaman, M., Sookhak, M., Gani, A., and Buyya, R. 2014. A survey on vehicular cloud computing. Journal of Network and Computer Applications 40, 325-344.
  85. Wiedersheim, B., Ma, Z., Kargl, F., and Papadimitratos, P. 2010. Privacy in intervehicular networks: why simple pseudonym change is not enough. In Proceedings of 2010 Seventh International Conference on Wireless On-demand Network Systems and Services (WONS). IEEE.
  86. Woo, S., Jo, H. J., Kim, I. S., and Dong, H. L. 2016. A practical security architecture for in-vehicle CAN-FD. IEEE Transactions on Intelligent Transportation Systems 17, 8 (Aug.), 2248-2261.
  87. Yan, G., Olariu, S., Wang, J., and Arif, S. 2014. Towards providing scalable and robust privacy in vehicular networks. IEEE Transactions on Parallel and Distributed Systems 15, 7,1896-1906.
  88. Ying, B. and Makrakis, D. 2015. Pseudonym changes scheme based on candidate-location-list in vehicular networks. In Proceedings of IEEE International Conference on Communications (ICC), 2015. IEEE, 7292-7297.
  89. Ying, B., Makrakis, D., and Mouftah, H. T. 2013. Dynamic mix-zone for location privacy in vehicular networks. IEEE Communications Letters 17, 8 (August), 1524-1527.
  90. Ying, B. and Nayak, A. 2017. Anonymous and lightweight authentication for secure vehicular networks. IEEE Transactions on Vehicular Technology 66, 12, 10626-10636.
  91. Yu, R., Kang, J., Huang, X., Xie, S., Zhang, Y., and Gjessing, S. 2016. Mix-Group: Accumulative pseudonym exchanging for location privacy enhancement in vehicular social networks. IEEE Transactions on Dependable and Secure Computing 13, 1 (Jan.-Feb.), 93-105.
  92. Zeadally, S., Hunt, R., Chen, Y.-S., Irwin, A., and Hassan, A. 2012. Vehicular ad hoc networks (VANETs): Status, results, and challenges. Telecommunication Systems 50, 4, 217-241.