Towards privacy aware pseudonymless strategy for avoiding profile generation in VANET
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Hussain, Rasheed | - |
dc.contributor.author | Kim, Sangjin | - |
dc.contributor.author | Oh, Heekuck | - |
dc.date.accessioned | 2021-06-23T16:03:15Z | - |
dc.date.available | 2021-06-23T16:03:15Z | - |
dc.date.issued | 2009-01 | - |
dc.identifier.issn | 03029743 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/erica/handle/2021.sw.erica/41442 | - |
dc.description.abstract | Inspiring from MANET (Mobile Ad hoc NETworks), VANET (Vehicular Ad hoc NETworks) employing vehicles as nodes, provide a wide range of applications in transportation system. The security of VANET has been a hot topic among the research community. VANETs must meet the basic security requirements such as authentication, integrity, confidentiality and privacy. In VANET, vehicles send beacon messages periodically every 100-300ms which carry speed and position information used for safe driving. The privacy of user is abused by profile generation where the adversary makes movement profiles against the vehicle using the identity information in the beacon. We outline the strategies using pseudonyms to provide privacy of user. After finding out deficiencies in pseudonym-based schemes, we propose a pseudonymless strategy to avoid profilation. In our scheme, we assume that each car is equipped with TRH (Tamper-Resistant Hardware) carrying out secure operations. Our proposed scheme assures the avoidance of profile generation without using mix zones and silent periods. We show that our proposed scheme is computationally efficient and less bandwidth consuming than other systems. © 2009 Springer-Verlag Berlin Heidelberg. | - |
dc.format.extent | 13 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | Springer Verlag | - |
dc.title | Towards privacy aware pseudonymless strategy for avoiding profile generation in VANET | - |
dc.type | Article | - |
dc.publisher.location | 독일 | - |
dc.identifier.doi | 10.1007/978-3-642-10838-9_20 | - |
dc.identifier.scopusid | 2-s2.0-76649136148 | - |
dc.identifier.bibliographicCitation | LECTURE NOTES IN COMPUTER SCIENCE, v.5932, pp 268 - 280 | - |
dc.citation.title | LECTURE NOTES IN COMPUTER SCIENCE | - |
dc.citation.volume | 5932 | - |
dc.citation.startPage | 268 | - |
dc.citation.endPage | 280 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | other | - |
dc.subject.keywordAuthor | Research communities | - |
dc.subject.keywordAuthor | Tamper-resistant | - |
dc.subject.keywordAuthor | Transportation system | - |
dc.subject.keywordAuthor | Identity information | - |
dc.subject.keywordAuthor | Network security | - |
dc.subject.keywordAuthor | Ad hoc networks | - |
dc.subject.keywordAuthor | Safe driving | - |
dc.subject.keywordAuthor | Mobile ad hoc networks | - |
dc.subject.keywordAuthor | Position information | - |
dc.subject.keywordAuthor | Vehicular ad hoc networks | - |
dc.subject.keywordAuthor | Computationally efficient | - |
dc.subject.keywordAuthor | Security requirements | - |
dc.identifier.url | https://link.springer.com/chapter/10.1007/978-3-642-10838-9_20 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
55 Hanyangdeahak-ro, Sangnok-gu, Ansan, Gyeonggi-do, 15588, Korea+82-31-400-4269 sweetbrain@hanyang.ac.kr
COPYRIGHT © 2021 HANYANG UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.