ABSTRACT
We present a security framework for Vehicular Ad hoc Networks (VANETs), using identity-based cryptography, to provide authentication, confidentiality, non-repudiation and message integrity. Additionally it provides scalable security and privacy using short-lived, authenticated and unforgeable, pseudonyms. This feature can be used by VANET applications that require quantifiable trust and privacy to provide differentiated service based on various levels of trust and privacy thresholds.
- D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing. Lecture Notes in Computer Science, 2001.Google Scholar
- L. Chen and J. Malone-Lee. Improved identity-based signcryption. Cryptology ePrint Archive, 2004.Google Scholar
- J. Y. Choi, M. Jakobsson, and S. Wetzel. Balancing auditability and privacy in vehicular networks. In Q2SWinet, 2005. Google ScholarDigital Library
- B. Parno and A. Perrig. Challenges in securing vehicular networks. In HotNets-IV, 2005.Google Scholar
- M. Raya and J.-P. Hubaux. The security of vehicular ad hoc networks. In SASN, 2005. Google ScholarDigital Library
- A. Shamir. Identity-based cryptosystems and signature schemes. In Proceedings of CRYPTO 84 on Advances in cryptology, 1985. Google ScholarDigital Library
Index Terms
- An identity-based security framework For VANETs
Recommendations
A security framework with strong non-repudiation and privacy in VANETs
CCNC'09: Proceedings of the 6th IEEE Conference on Consumer Communications and Networking ConferenceThis paper proposes a security framework with strong non-repudiation and privacy using new approach of ID-based cryptosystem in VANETs. To remove the overheads of certificate management in PKI, security frameworks using an ID-based cryptosystem are ...
A Framework for Identity-Based Encryption with Almost Tight Security
Proceedings, Part I, of the 21st International Conference on Advances in Cryptology -- ASIACRYPT 2015 - Volume 9452We show a framework for constructing identity-based encryption IBE schemes that are almost tightly secure in the multi-challenge and multi-instance setting. In particular, we formalize a new notion called broadcast encoding, analogously to encoding ...
Identity-Based signcryption from identity-based cryptography
WISA'11: Proceedings of the 12th international conference on Information Security ApplicationsA signcryption scheme encrypts and signs data in a single operation which is more efficient than using an encryption scheme combined with a signature scheme. Identity-based cryptography (IBC) does not require users to pre-compute key pairs and obtain ...
Comments