Privacy-Preserving Real-Time Navigation System Using Vehicular Crowdsourcing

Size: px
Start display at page:

Download "Privacy-Preserving Real-Time Navigation System Using Vehicular Crowdsourcing"

Transcription

1 Privacy-Preserving Real-Time Navigation System Using Vehicular Crowdsourcing (Invited Paper) Jianbing Ni, Xiaodong Lin, Kuan Zhang, and Xuemin (Sherman) Shen Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Ontario, Canada N2L 3G1, {j25ni, k52zhang, Faculty of Business and Information Technology, University of Ontario Institute of Technology, Oshawa, Ontario, Canada L1H 7K4, Abstract Traffic congestions cause not only the timeconsuming and frustrating experiences to drivers, but also other critical problems, such as fuel waste, air pollution and accidents. Real-time traffic information exchange can avoid vehicles being congested on roads. However, when the drivers are acquiring the traffic information, their privacy is inevitable to be disclosed. To preserve the driver s privacy, in this paper, we propose a privacypreserving real-time navigation system (PRIN) using vehicular crowdsourcing. In PRIN, the RSUs cooperatively find an optimal path for the querying vehicle to the destination according to the real-time traffic information crowdsourced by the vehicles in their coverage areas. The querying vehicle retrieves the navigation result from each RSU successively when entering its coverage area, and follows the proper driving route to the next RSU, until reaching its destination. During these querying, crowdsourcing and retrieving processes, the driver s personal information, such as location, identity, is protected from being disclosed to attackers. In addition, a trusted authority can trace the drivers identities if they upload false traffic information. Finally, we discuss the properties of conditional privacy preservation and demonstrate the efficiency of PRIN. I. INTRODUCTION Traffic congestions, especially in urban areas, have negative social and economic impact on the society, leading to economic cost of lost hours and delayed appointments. In the ten most-congested cities in USA, drivers spent around 42 hours during traffic jams in 2014, wasting about $121 billion in fuel [1]. Traffic jams are not only frustrating for drivers, but also a major source of air pollution, causing more than 5 million premature deaths in 2015 worldwide [2]. Real-time traffic information plays an essential role to monitor congestion and predict the optimal driving paths for drivers. Currently, traffic-aware automotive navigation systems and traffic-based navigation mobile applications [3] can provide drivers with up-to-date routing information to avoid road congestions. Both of them need the traffic information to generate the optimal driving routes. Since the traffic information on roads change with time, how to collect the real-time road conditions and find the proper paths for drivers promptly is an essential problem in navigation systems. Recently, vehicular ad hoc networks (VANETs) become increasingly popular in both industry and academia [4]. The vehicles, installed with onboard unit (OBU) devices [5], are able to communicate with other nearby vehicles, (i.e., vehicleto-vehicle (V2V) communications), and with roadside units (RSUs), (i.e., vehicle-to-roadside (V2R) communications). Having V2V and V2R communications, a variety of promising applications have been developed to improve safety and enrich driving experience for drivers. VANET-based navigation systems [6], [7] emerge to provide real-time navigation services for drivers on roads. By means of the widely deployed vehicular communication infrastructure, the vehicles do not need any extra device but the OBUs to enjoy the navigation services. Specifically, a vehicle on road can query the driving route to the destination to the nearby RSUs, and the RSUs cooperatively find the fastest route for the driver by utilizing the traffic information. Finally, the querying vehicle follows the route to reach the destination. The navigation system has the advantage that the RSUs collect, analyze the traffic information locally utilizing vehicular crowdsourcing and return the navigation routes to drivers with low latency. However, security and privacy [8], [9], [10], [11] are primary concerns for drivers in VANET-based navigation systems. There have been numerous controversies due to the track exposure [12]. For instance, Google and Apple have built real-time navigation applications for drivers based on up-to-date traffic information, but collected drivers location and destination in return [3], which may reveal sensitive information about the drivers personal lives. In VANET-based navigation systems, the vehicles frequently communicate with the RSUs to query the driving routes, retrieve the navigation results on behalf of a querier, or provide traffic information to help other vehicles to find proper paths. Since the vehicle s location is tightly related to the driver, an attacker can learn the travelling route of the vehicle and predict the location of the driver at a specific time, or even identify some personal information about the driver, such as habits, references, religious belief, health condition, political affiliations, according to the visiting frequency of some particular places. Therefore, it is necessary to preserve the drivers privacy for the wide acceptance of VANET-based navigation services. Several VANET-based vehicle navigation systems [13], [14], [15] have been proposed to achieve drivers privacy preservation. Chim et al. [13] proposed a secure and privacy-preserving navigation system, in which RSUs use traffic information

2 to guide drivers to their destinations in a distributed way. Nevertheless, this system is vulnerable to insider attacks since a master key is shared among all vehicles. Cho et al. [14] introduced a security-enhanced navigation system to eliminate the master key distribution and simplify the anonymous credential acquisition. However, they does not investigate the approach to collecting traffic information securely and distributively. Sur et al. [15] proposed a secure navigation system based on vehicular cloud from trapdoor hash function and zero-knowledge proof. The anonymous credentials in this system can be only used once. In this paper, we propose a Privacy-preserving Real-tIme Navigation system (PRIN) using vehicular crowdsourcing to collect real-time traffic information and prevent the privacy disclosure for drivers. The main contributions of this paper are three folds. We propose PRIN to achieve the traffic-aware navigation for drivers by utilizing vehicular crowdsourcing. With the traffic information crowdsourced from vehicles, the RSUs can collaboratively find a proper driving route to the destination for the querying driver. Finally, the driver reaches the destination following the proper path with shorter time and lower fuel consumption. PRIN preserves the drivers privacy by utilizing the randomization technique. Specifically, a vehicle sends the navigation query to a nearby RSU anonymously. The vehicles who participate in the crowdsourcing tasks submit the traffic information to the RSUs without exposing their real identities through the randomizable signature [16]. Meanwhile, a trusted authority can trace the vehicle s identity if the vehicle uploads forged traffic information. We discuss the security properties of conditional privacy preservation in PRIN and demonstrate the efficiency of PRIN in terms of computational and communication overhead. The remainder of this paper is organized as follows. We introduce system model, threat model and security goals in section II. In section III, we propose the PRIN system, followed by security discussion in section IV, and performance evaluation in section V, respectively. We conclude our paper in section VI. II. PROBLEM STATEMENT In this section, we state the problem by formalizing system and threat models, and identify security goals. A. System Model The real-time navigation system consists of a trusted authority (TA), a cloud, vehicles and RSUs. The responsibilities of TA are to issue anonymous credentials and trace the vehicle identity. The cloud provides centralized navigation service for drivers, e.g., Google Map. Each vehicle is equipped with an irreplaceable and temper-proof OBU device, which enables to perform some simple computations, communicate with other vehicles and RSUs, and has a small amount of readonly memory. RSUs communicate with each other and with vehicles that are driving through. Each RSU has rich resource, Fig. 1. System Model. in the sense that it has enough storage space to maintain traffic information and computational capacity to compute proper paths for drivers. Fig. 1 shows the system model of real-time navigation system. Firstly, each vehicle applies to the TA for an anonymous credential. Then, a vehicle using the navigation service, acts as a querier to send a navigation query to the nearby RSU, including the current location, desired destination and expired time. The RSU forwards this query to the last RSU that covers the destination through the relaying RSUs hop by hop. Upon receiving the navigation query, each RSU sends a crowdsourcing task to the vehicles in its coverage area, and the vehicles who perform the task report the location, speed and traffic information to the RSU. After that, RSUs find a proper driving route for the querying vehicle in its area according to the map of coverage area and the traffic information received from vehicles. The RSUs also analyze and further forward the traffic information to cloud for supporting cloud-based navigation service. Finally, the querying vehicle successively retrieves the navigation results from the RSUs when they enter the coverage regions of RSUs until it reaches the destination. B. Threat Model The security threats come from external and internal attackers. An external attacker may compromise RSUs to learn some personal information about drivers. An eavesdropper listens on the wireless communication channels to capture the transmitting messages and strive to obtain drivers privacy. Internal attackers, e.g., the honest-but-curious RSUs, may learn the position of a specific driver, and further obtain some sensitive information, e.g., habits, references, religious belief, political affiliation, by analyzing the forwarding messages, including navigation queries and results. The vehicles may try to obtain the navigation results queried by other vehicles to enjoy free navigation services if they happen to have the same destinations. In addition, some vehicles may report the forged traffic information to enjoy a pleasant and uncongested driving experience. C. Security Goals We aim to construct a real-time navigation system with the following security goals.

3 Querier Privacy. The identity of the querying driver should be preserved against the attackers. Although the vehicle s location and destination would be exposed to RSUs, the attacker cannot link a navigation query to a specific vehicle. Moreover, no attacker should be able to identify whether two navigation queries are sent by the same vehicle. Driver Privacy. The identity of a driver who performs the crowdsourcing task should not be disclosed to others. In this way, the attackers are unable to identify the source of a specific crowdsourcing response and distinguish whether two responses are uploaded by the same vehicle. Traceability. The TA can trace the real identities of the querying vehicles who sent the parking navigation queries or the vehicles that participated in the crowdsourcing tasks released by RSUs in the event of a dispute occurred. III. THE PRIN SYSTEM In this section, we propose the overview of PRIN system and its construction in details. The PRIN consists of five phases: system initialization, navigation querying, vehicular crowdsourcing, result retrieving and identity tracing. A. Overview of PRIN Since the transmission of a vehicle s navigation query follows the shortest path from the first RSU who receives the query from the vehicle to the last RSU that covers the desired destination, the querying vehicle will successively go through the coverage areas of these RSUs. Inspired by the optimality principle [17], we divide the driving route from the source to the destination into several segments based on the coverage areas of the relaying RSUs as shown in Fig. 2. Since each segment is optimal substructure [17], the optimal sub-route in each coverage area of RSU can constitute an optimal policy of the global path from the source to the destination. Therefore, we can successively find the optimal route for the querying vehicle in each coverage area of the passing RSU until the querying vehicle reaches the destination. Nevertheless, the shortest path in each coverage area may not be the optimal route due to the traffic congestion and car accidents. Hence, we utilize the vehicular crowdsourcing to collect real-time traffic information and thereby find a proper route in the coverage area of each RSU on the path from source to destination. Finally, the querying vehicle successively retrieves the navigation result from each RSU when entering its coverage area. This framework is superior to existing solutions [13] that mainly depend on the assumption that a moving vehicle has to obtain the results from the first RSU, which is quite challenging in reality, when the vehicle moves at a pretty high speed. B. System Initialization Let G 1, G 2 and G T be three cyclic groups of the same large prime order p. A bilinear map ê : G 1 G 2 G T is defined as type 3 pairing, in which G 1 G 2 and there is no efficiently computable homomorphism between G 1 and G 2 in either direction. g is a generator of G 1 with g 1 G1, and ĝ Fig. 2. Example of Roads from Source to Destination. is a generator of G 2 with ĝ 1 G2. Let H : {0, 1} Z p be a cryptographic hash function. The TA randomly chooses (x 0, x 1 ) Z 2 p as its secret key and computes ( X 0, X 1 ) = (ĝ x0, ĝ x1 ) as its public key. Each RSU has a unique identifier R to identify its location and a map of its coverage area to mark the traffic condition. R also maintains a routing table to determine where data packets should be directed. R randomly chooses y Z p as its secret key and computes Y = g y as its public key. Each vehicle has a unique identifier V, which can be the vehicle licence. The vehicle randomly picks (v, v 1 ) Z 2 p to compute (V, V 1, V 2 ) (g v, X 1 v v1 X 0, ). ĝv1 and sends (V, V, V 1, V 2 ) to the TA, along with the zeroknowledge proof: PK = {(v, v 1 ) : V = g v V 1 = X 1 v v1 X 0 V 2 = ĝ v1 }. The TA firstly computes V = V x0 1 / V 2. Then, the TA verifies the validity of PK and checks the equation ê(v, X? 1 ) = ê(g, V ). If either is invalid, the TA returns failure and aborts. Otherwise, the TA randomly picks u Z p to calculate (A 1, A 2, A 3 ) (g u, (g x0 V x1 ) u, ê(a 1, X 1 )). Finally, the TA sends (A 1, A 2, A 3 ) to V through a secure channel, and stores (V, V, V ) in a secure database. V sets its secret key as skv = (v, A 1, A 2, A 3 ) and the corresponding public key as pkv = V, and stores skv in the read-only memory of the OBU. C. Navigation Querying When a vehicle V with (skv, pkv ) drives on the road, it can send a navigation query to the nearby RSU, denoted as R 1. Specifically, the querier utilizes the OBU to generate the basic navigation information, including current location CL, desired destination DEST, current time t 1, expired time t 2, etc., and performs the following steps to generate a navigation query: Randomly choose w Z p to generate a temporary public key U = ĝ w and pick a random N Z p as the sequence number of the query. Utilize Y 1 to encrypt (U, CL, DEST ) by randomly choosing r 1 Z p, r 2 G 1 and computing C 1 = g r1, C 2 = r 2 Y r1 1, C 3 = AES ENC (r 2, U CL DEST ). Randomize (A 1, A 2, A 3) by selecting two random (k 1, k 2) Z 2 p to calculate (B 1, B 2, B 3) ((A 1) k 1, (A 2 ) k 1, (A 3 ) k 1 k 2 ), c = H(B 1, B 2, B 3, N, t 1, t 2, U, CL, DEST ), τ = k 2 + c v, and output (B 1, B 2, c, τ ).

4 Finally, the querier V stores (U, w) on the OBU and sends the navigation query Q = (N, t 1, t 2, C 1, C 2, C 3, B1, B2, c, τ ) to R 1, when V is in the coverage area of R 1. Upon receiving the navigation query Q, R 1 firstly decrypts r 2 = C 2 C y1 1 and recovers U CL DEST = AES DEC (r 2, C 3 ). Then, R 1 verifies the validity of the signature (B1, B2, c, τ ) by computing B = ê(b1, c X 0 )ê(b2, ĝ c )ê(b1, X τ 1 ) and checking whether c =? H(B1, B2, B, N, t 1, t 2, U, CL, DEST ). If not, R 1 returns failure and aborts; otherwise, it checks the routing table to find the next RSU R 2 according to the destination DEST. Then, R 1 randomly picks r 1 Z p, r 2 G 1 to compute C 1 = g r 1, C 2 = r 2Y r 1 2, C 3 = AES ENC (r 2, U CL DEST ). Finally, R 1 forwards the query Q = (N, t 1, t 2, C 1, C 2, C 3, B1, B2, c, τ ) to R 2. When having the navigation query Q, R 2 performs the same operations as R 1, and checks the routing table to forward the query to the next RSU until the navigation query reaches the last RSU R n, which covers the destination of the querying vehicle V. R n checks the validity of the signature (B1, B2, c, τ ) and obtains (N, t 1, t 2, U, CL, DEST ). D. Vehicular Crowdsourcing After receiving the navigation query, all RSUs {R 1,, R n } try to find an optimal path in their coverage areas by utilizing crowdsourcing individually. Every RSU R j {R 1,, R n } releases a crowdsourcing task of traffic information collection to all the vehicles in its coverage area. If a vehicle V i with (skv i, pkv i ) decides to perform this task. It firstly generates a traffic information report P i, which includes the current location, time, driving speed and road conditions (e.g., hazard, accidents, traffic jam, road closure). Then, V i randomizes (A 1i, A 2i, A 3i ) by choosing two random values (k 1i, k 2i ) Z 2 p to compute (B 1i, B 2i, B 3i ) (A k1i 1i, Ak1i 2i, Ak1ik2i 3i ). V i calculates c i = H(N, P i, B 1i, B 2i, B 3i ), τ i = k 2i +c i v i and outputs (B 1i, B 2i, c i, τ i ). Finally, V i returns the crowdsourcing response R i = (N, P i, B 1i, B 2i, c i, τ i ) to the R j. Upon receiving R i, R j verifies the signature by computing ci B i = ê(b 1i, X 0 )ê(b 2i, ĝ ci τi )ê(b 1i, X 1 )? and checking whether c i = H(N, Pi, B 1i, B 2i, B i ). If not, R j returns failure; otherwise, R j keeps R i on its database temporarily. Then, according to the real-time traffic information collected through vehicular crowdsourcing, R j generates the weight of every edge on the map of coverage area as shown in Fig. 3. Each weight denotes the time cost for a vehicle driving from an intersection to the nearby intersections. After that, R j utilizes the Dijkstra s algorithm [18] to find the optimal path SP j in its coverage area. Finally, R j randomly picks r 1i Z p, r 2i G 2 to compute (e 1i, e 2i, e 3i ) = (ĝ r1i, r 2i U r1i, AES ENC (r 2i, SP j )), K j = U yj and keeps the navigation result (N, K j, e 1i, e 2i, e 3i ). In addition, R j uploads the traffic information report P i to the cloud for supporting cloud-based navigation service. Fig. 3. E. Result Retrieving Example of Finding Optimal Path. When the querying vehicle V enters the coverage area of R j, it reads (U, w) on the OBU and calculates Kj = Y j w. Then, V randomly chooses (u 1, u 2) Z 2 p to compute ( B 1, B 2, B 3) ((A 1) u 1, (A 2 ) u 1, (A 3 ) u 1 u 2 ). V calculates ĉ = H(t 3, Kj, B 1, B 2, B 3), ˆτ = u 2 + ĉ v, and outputs ( B 1, B 2, ĉ, ˆτ ), where t 3 is the current time used to prevent replay attacks. Finally, V sends the retrieving query RQ = (t 3, Kj, B 1, B 2, ĉ, ˆτ ) to R j. Upon receiving RQ from V, R j computes B = ê( B 1, Xĉ 0 )ê( B 2, ĝ ĉ )ê( B 1, ˆτ X 1 ) and checks whether ĉ? = H(t3, Kj, B 1, B 2, B ). If not, R j returns failure and aborts. Otherwise, R j finds the corresponding navigation result (N, K j, e 1i, e 2i, e 3i ) based on Kj. R j randomly picks r j Z p to calculate σ 1j = g rj, σ 2j = H(N, R j, e 1i, e 2i, e 3i, σ 1j ) and σ 3j = r j + y j σ 2j, and returns the result NR j = (N, R j, e 1i, e 2i, e 3i, σ 1j, σ 3j ) to V. Upon obtaining NR j, V verifies the signature by computing σ 4j = H(N, R j, e 1i, e 2i, e 3i, σ 1j ) and checking whether? = g σ3j. If not, V aborts and returns failure; 1i, SP j = σ 1j Y σ4j j otherwise, it recovers SP j as r 2i = e 2i e w AES DEC (r 2i, e 3i ). According to SP j, V follows the optimal path to enter the coverage area of R j+1, and then retrieves the navigation result from R j+1 until reaching the destination. F. Identity Tracing The TA can use the vehicle s signature (B 1, B 2, c, τ) to trace the identity of the driver. It checks whether ê(b 2, ĝ)? = ê(b 1, X 0 )ê(b 1, V ) holds or not, until it gets a match. IV. SECURITY DISCUSSION In this section, we demonstrate the achievement of security and privacy goals mentioned in II-C for our PRIN. Querier Privacy. We utilize the Elgamal scheme and the AES scheme to encrypt the vehicle s location and destination in each hop from the vehicle to the last RSU. Thus, only the RSUs that the vehicle drives through can obtain the source and the destination. To prevent the RSUs from linking the navigation query or the retrieving query to a specific vehicle, V randomizes the credential (A 1, A 2, A 3) as (B 1, B 2, c, τ ), which is a group signature [16]. Therefore, if the underlying group signature can guarantee the anonymity of the signer, the identity of the querier is well preserved. Driver Privacy. Having the randomization technique, the drivers generate (B 1i, B 2i, c i, τ i ) to protect the identities and prevent attackers from corrupting the crowdsourcing responses R i. As the group signature [16] is secure, it is impossible for an attacker to learn the identities of the drivers.

5 TABLE I COMPUTATIONAL BURDEN OF VEHICLES Phases PRIN VSPN Initialization 8T SM 3T SM +T p+t AES Registration 0 6T SM + T AES Querying 6T SM +T AES T SM +T AES Crowdsourcing 3T SM 0 Retrieving 7νT SM +νt AES 4νT p * ν is the number of RSUs that relay the navigation query. Traceability. By using the signature (B 1, B 2, c, τ), the TA can check whether the equation ê(b 2, ĝ) = ê(b 1, X 0 ) ê(b 1, V ) holds or not to determine the identity of the driver. V. PERFORMANCE EVALUATION Firstly, to analyze the computational overhead of the vehicles, we count the number of scalar multiplication in G 1 /G 2, AES encryption/decryption, and bilinear pairing required in PRIN. Let T SM, T AES, T p denote the executing time of the above operations for vehicles, respectively. The number of the operations required in each phase of PRIN are shown in Table I, as well as the operations in VSPN [13]. In PRIN, there is no bilinear pairing computation for vehicles. Although PRIN is less efficient than VSPN in the navigation querying phase, it costs much less time to retrieve the navigation results, as shown in Fig 4 (a). In addition, VSPN does not consider traffic information collection in generating the navigation results. We simulate PRIN on HUAWEI MT2-L01 smartphone with Kirin 910 CPU and 1250M memory. The operation system is Android and the toolset is Android NDK r8d with MIRACL library. The parameter p is approximately 160 bits and the elliptic curve is defined as y = x over F q, where q is 512 bits. The scalar multiplication and AES encryption/decryption take ms and ms, respectively. The executing time of bilinear pairing is ms. Thus, the rough running time of vehicles in system initialization is ms. A vehicle needs to run approximately ms to generate a navigation query and ms to retrieve the navigation result from an RSU. Besides, a vehicle who participates in the crowdsourcing task needs ms to generate a crowdsourcing response. In terms of the communication overhead, our PRIN does not require the RSUs to return the navigation results to the first RSU. Instead, the querying vehicle can retrieve the navigation result from every RSU, and use it to find a proper route to the coverage area of the next RSU. In this way, the communication overhead among RSUs is significantly reduced. Fig 4 (b) shows the comparison results of PRIN and VSPN with respect to the average communication burden between two RSUs. VI. CONCLUSIONS In this paper, we have proposed a privacy-preserving realtime navigation system from vehicular crowdsourcing. Specifically, the RSUs utilize the up-to-date traffic information provided by the vehicles to cooperatively navigate the querying vehicles to the destinations in a distributed manner, without Time Cost (MS) PRIN VSPN Numbers of RSUs Number of RSUs (a) Computational Overhead Fig. 4. Communication Overhead (Bits) PRIN VSPN (b) Communication Overhead Performance Comparison of PRIN and VSPN sacrificing the privacy of the drivers. Besides, the TA can trace the identity of the driver who reports false traffic information. We have demonstrated that our system achieves conditional privacy preservation and is efficient in terms of computational and communication overhead. For the future work, we will develop a privacy-preserving on-street parking sharing system based on vehicular crowdsourcing. REFERENCES [1] K. Moskvitch, Can a city every be traffic jam-free? BBC News, [2] J. Worland, Air pollution kills more than 5 million people around the world every year, Time, [3] D.J. Wu, J. Zimmerman, J. Planul, and J.C. Mitchell, Privacypreserving shortest path computation, in Proc. of NDSS, San Diego, California, USA, [4] Y. Poor, P. Muhletheler, and A. Laouiti, Vehicle ad hoc networks: Applications and related technical issues, IEEE Commun. Surv. Tutor., vol. 10, no. 3, pp , [5] T. Kumrai, K. Ota, M. Dong, and P. Champrasert, RSU placement optimization in vehicular participatory sensing networks, in Proc. of INFOCOM Workshops, 2014, pp [6] C.-G. Liu, I-H. Liu, T.-T. Yang, and J.-S. Li, Navigation-aware association control in vehicular wireless networks, J. High Speed Networks, vol. 19, no. 4, pp , [7] P.-Y. Chen, Y.-M. Guo, and W.-T. Chen, Fuel-saving navigation system in VANETs, in Proc. of IEEE VTC Fall, 2010, pp [8] R. Lu, X. Lin, H. Zhu, and X. Shen, An intelligent secure and privacypreserving parking scheme through vehicular communicatons, IEEE Trans. Veh. Technol., vol. 59, no. 6, pp , [9] X. Lin, X. Sun, P.-H. Ho, and X. Shen, Gsis: A secure and privacypreserving protocol for vehicular communications, IEEE Trans. Veh. Technol., vol. 56, no. 6, pp , [10] L. Zhang, C. Hu, Q. Wu, J. Domingo-Ferrer, and B. Qin, Privacypreserving vehicular communication authentication with hierarchical aggregation and fast response, IEEE Trans. Comput., to appear. [11] J. Ni, K. Zhang, X. Lin, H. Yang, and X. Shen, AMA: Anonymous mutual authentication with traceability in carpooling systems, in Proc. of ICC, Kuala Lumpur, Malaysia, [12] J. Angwin and J. Valentino-Devries, Apple, Google collcet user data, The Wall Streat Journal, [13] T. Chim, S. Yiu, L.C. Hui, and V.O. Li, Vspn: Vanet-based secure and privacy-preserving navigation, IEEE Trans. Comput., vol. 63, no. 2, pp , [14] W. Cho, Y. Park, C. Sur, and K. H. Rhee, An improved privacypreserving navigation protocol in vanets, J. Wire. M. Net., U. Comp., and Dep. Appl., vol. 4, no. 4, pp , [15] C. Sur, Y. Park, and K. H. Rhee, An efficient and secure navigation protocol based on vehicular cloud, Int. J. Comput. Math., to appear. [16] D. Pointcheval and O. Sanders, Short randomizable signatures, in Proc. of CT-RSA, vol of LNCS, 2016, pp [17] M. Sniedovich, Dynamic programming and principles of optimality, J. Math. Anal. Appl., vol. 65, no. 3, pp , [18] D.B. Johnson, A note on Dijkstra s shortest path algorithm, J. ACM, vol. 20, no. 3, pp , 1973.

6 Revision 1: Move the relation works from section VI to the introduction. Revision 2: To make our motivation stronger, we add the cloud into the system model and revise the presentation at the corresponding position of the scheme. The traffic information crowdsourced from vehicles can not only be used for distributively navigation, but also store on the cloud and support centralized navigation, such as google map. Revision 3: We correct some typos and polish some awkward sentences. Revision 4: We add some related references in the paper, such as [5][8][11].

Privacy-Preserving Data Forwarding in VANETs: A Personal-Social Behavior Based Approach

Privacy-Preserving Data Forwarding in VANETs: A Personal-Social Behavior Based Approach Privacy-Preserving Data Forwarding in VANETs: A Personal-Social Behavior Based Approach Jianbing Ni, Xiaodong Lin, and Xuemin (Sherman) Shen Department of Electrical and Computer Engineering, University

More information

Short-term Linkable Group Signatures with Categorized Batch Verification

Short-term Linkable Group Signatures with Categorized Batch Verification Short-term Linkable Group Signatures with Categorized Batch Verification Lukas Malina 1, Jordi Castella-Rocà 2, Arnau Vives-Guasch 2, Jan Hajny 1 1 Department of Telecommunications Faculty of Electrical

More information

Efficient Authentication and Congestion Control for Vehicular Ad Hoc Network

Efficient Authentication and Congestion Control for Vehicular Ad Hoc Network Efficient Authentication and Congestion Control for Vehicular Ad Hoc Network Deivanai.P 1, K.Sudha 2, K.Radha 3 Department of CSE, Muthayammal Engineering College, Rasipuram, India 1 Assistant Professor,

More information

Improving Energy Efficiency of VANET based Secure and Privacy Preserving Navigation Scheme using LTE

Improving Energy Efficiency of VANET based Secure and Privacy Preserving Navigation Scheme using LTE IJIRST International Journal for Innovative Research in Science & Technology Volume 2 Issue 02 July 2015 ISSN (online): 2349-6010 Improving Energy Efficiency of VANET based Secure and Privacy Preserving

More information

Sybil Attack Detection with Reduced Bandwidth overhead in Urban Vehicular Networks

Sybil Attack Detection with Reduced Bandwidth overhead in Urban Vehicular Networks Sybil Attack Detection with Reduced Bandwidth overhead in Urban Vehicular Networks D.Balamahalakshmi Department of Computer Science and Engineering, V.S.B Engineering College, Karur, Tamilnadu, India 1

More information

COOPERATIVE DATA SHARING WITH SECURITY IN VEHICULAR AD-HOC NETWORKS

COOPERATIVE DATA SHARING WITH SECURITY IN VEHICULAR AD-HOC NETWORKS COOPERATIVE DATA SHARING WITH SECURITY IN VEHICULAR AD-HOC NETWORKS Deepa B 1 and Dr. S A Kulkarni 2 1 IV Sem M. Tech, Dept of CSE, KLS Gogte Institute of Technology, Belagavi deepa.bangarshetru@gmail.com

More information

Introduction to VANET

Introduction to VANET VANET Introduction to VANET -Vehicles connected to each others through an ad hoc formation form a wireless network called Vehicular Ad Hoc Network. -Vehicular ad hoc networks (VANETs) are a subgroup of

More information

ATCS: A Novel Anonymous and Traceable Communication Scheme for Vehicular Ad Hoc Networks

ATCS: A Novel Anonymous and Traceable Communication Scheme for Vehicular Ad Hoc Networks International Journal of Network Security, Vol.13, No.2, PP.71 78, Sept. 2011 71 ATCS: A Novel Anonymous and Traceable Communication Scheme for Vehicular Ad Hoc Networks Wei Hu, Kaiping Xue, Peilin Hong,

More information

Ad-hoc Trusted Information Exchange Scheme for Location Privacy in VANET

Ad-hoc Trusted Information Exchange Scheme for Location Privacy in VANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 1, January 2015,

More information

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack J.Anbu selvan 1, P.Bharat 2, S.Mathiyalagan 3 J.Anand 4 1, 2, 3, 4 PG Scholar, BIT, Sathyamangalam ABSTRACT:

More information

A Scalable and Secure Key Distribution Scheme for Group Signature based Authentication in VANET. Kiho Lim, Kastuv M. Tuladhar, Xiwei Wang, Weihua Liu

A Scalable and Secure Key Distribution Scheme for Group Signature based Authentication in VANET. Kiho Lim, Kastuv M. Tuladhar, Xiwei Wang, Weihua Liu A Scalable and Secure Key Distribution Scheme for Group Signature based Authentication in VANET Kiho Lim, Kastuv M. Tuladhar, Xiwei Wang, Weihua Liu Outline Introduction to Vehicular Networks Motivation

More information

MLAS: Multiple level authentication scheme for VANETs

MLAS: Multiple level authentication scheme for VANETs Title MLAS: Multiple level authentication scheme for VANETs Author(s) Chim, TW; Yiu, SM; Hui, LCK; Li, VOK Citation The 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011),

More information

Sacrificing the Plum Tree for the Peach Tree: A Socialspot Tactic for Protecting Receiver-location Privacy in VANET

Sacrificing the Plum Tree for the Peach Tree: A Socialspot Tactic for Protecting Receiver-location Privacy in VANET Sacrificing the Plum Tree for the Peach Tree: A Socialspot Tactic for Protecting Receiver-location Privacy in VANET Rongxing Lu, Xiaodong Lin, Xiaohui Liang, and Xuemin (Sherman) Shen Department of Electrical

More information

Scalable privacy-enhanced traffic monitoring in vehicular ad hoc networks

Scalable privacy-enhanced traffic monitoring in vehicular ad hoc networks Scalable privacy-enhanced traffic monitoring in vehicular ad hoc networks Yi Liu1,2,3 Jie Ling 1 Qianhong Wu4,6 Bo Qin5 Presented By Khaled Rabieh Introduction & Problem Statement In traffic monitoring

More information

IEEE networking projects

IEEE networking projects IEEE 2018-18 networking projects An Enhanced Available Bandwidth Estimation technique for an End-to-End Network Path. This paper presents a unique probing scheme, a rate adjustment algorithm, and a modified

More information

Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network

Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network 1 Ms.Anisha Viswan, 2 Ms.T.Poongodi, 3 Ms.Ranjima P, 4 Ms.Minimol Mathew 1,3,4 PG Scholar, 2 Assistant Professor,

More information

Message Authentication Scheme for Vehicular Ad-Hoc Wireless Networks without RSU

Message Authentication Scheme for Vehicular Ad-Hoc Wireless Networks without RSU Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 1, January 2015 Message Authentication Scheme for Vehicular Ad-Hoc Wireless

More information

Privacy in VANET using Shared Key Management

Privacy in VANET using Shared Key Management Privacy in VANET using Shared Key Management Jessy Paul 1, Elizabeth Saju 2, Mercy Joseph Poweth 3 Professor, Dept. of Civil Engineering, MACE, Kothamangalam, Kerala, India P.G Student, Dept. of Computer

More information

International Journal of Computer Science Trends and Technology (IJCS T) Volume 4 Issue 3, May - Jun 2016

International Journal of Computer Science Trends and Technology (IJCS T) Volume 4 Issue 3, May - Jun 2016 RESEARCH ARTICLE OPEN ACCESS Proxy Based Batch Authentication Scheme for Vehicular Ad Hoc Network Godavari H. Kudlikar [1], Sunita S. Barve [2] Department of Computer Science and Engineering Savitribai

More information

An Efficient Data Transmission in VANET Using Clustering Method

An Efficient Data Transmission in VANET Using Clustering Method INTL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2017, VOL. 63, NO. 3, PP. 309-313 Manuscript received April 29, 2016; revised July, 2017. DOI: 10.1515/eletel-2017-0045 An Efficient Data Transmission

More information

AMA: Anonymous Mutual Authentication with Traceability in Carpooling Systems

AMA: Anonymous Mutual Authentication with Traceability in Carpooling Systems 1 AMA: Anonymous Mutual Authentication with Traceability in Carpooling Systems Jianbing Ni, Kuan Zhang, Xiaodong Lin, Haomiao Yang and Xuemin (Sherman) Shen Department of Electrical and Computer Engineering,

More information

SOCIAL-BASED TRUSTWORTHY DATA FORWARDING IN VEHICULAR DELAY TOLERANT NETWORKS

SOCIAL-BASED TRUSTWORTHY DATA FORWARDING IN VEHICULAR DELAY TOLERANT NETWORKS SOCIAL-BASED TRUSTWORTHY DATA FORWARDING IN VEHICULAR DELAY TOLERANT NETWORKS by Abdulelah Alganas A Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of Master of Applied Science

More information

COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY

COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY CONTENT Introduction Problem statements Literature Review Existing system Proposed system Application Conclusion Future work MOTIVATIONS

More information

EXPEDITE MESSAGE AUTHENTICATION PROTOCOL FOR VANETs USING DATA AGGREGATION

EXPEDITE MESSAGE AUTHENTICATION PROTOCOL FOR VANETs USING DATA AGGREGATION EXPEDITE MESSAGE AUTHENTICATION PROTOCOL FOR VANETs USING DATA AGGREGATION Shaiba Wahab Dept. Of Computer Science and Engineering M.E.A. Engineering College Perinthalmanna, Kerala Jemsheer Ahmed P Dept.

More information

Overview of Challenges in VANET

Overview of Challenges in VANET Overview of Challenges in VANET Er.Gurpreet Singh Department of Computer Science, Baba Farid College, Bathinda(Punjab), India ABSTRACT VANET are becoming active area of research and development because

More information

Privacy-preserving Communication for VANETs with Conditionally Anonymous Ring Signature

Privacy-preserving Communication for VANETs with Conditionally Anonymous Ring Signature International Journal of Network Security, Vol.17, No.2, PP.135-141, Mar. 2015 135 Privacy-preserving Communication for VANETs with Conditionally Anonymous Ring Signature Shengke Zeng, Yuan Huang, and

More information

An Effective Strategy for Trusted Information Scheme for Location Privacy in VANETs

An Effective Strategy for Trusted Information Scheme for Location Privacy in VANETs An Effective Strategy for Trusted Information Scheme for Location Privacy in VANETs Rakesh Kumar ER Asst. Prof. & Head (CSE), SAMS College of Engineering and Technology, Chennai rakeshkumarer@gmail.com,

More information

A Secure and Efficient Authentication Technique for Vehicular Ad-Hoc Networks

A Secure and Efficient Authentication Technique for Vehicular Ad-Hoc Networks 1 A Secure and Efficient Authentication Technique for Vehicular Ad-Hoc Networks Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo, Senior Member, IEEE, Akbar Majidi Abstract Vehicular ad-hoc

More information

Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks

Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks 1 S.Nandhini, 2 Mr.S.Franson Varun Richo, 1 PG Student, 2 Assistant professor, Francis Xavier Engineering college,

More information

Securable Message Authentication System in Vehicular Ad Hoc Networks by using Trusted Authority

Securable Message Authentication System in Vehicular Ad Hoc Networks by using Trusted Authority Securable Message Authentication System in Vehicular Ad Hoc Networks by using Trusted Authority Ranjitha. P Final Year M.Tech CSE, Vedavyasa Institute of Technology,Calicut Abstract The number of automobiles

More information

Enhancing Security on Vehicular Adhoc Networks using EMAP-HMAC

Enhancing Security on Vehicular Adhoc Networks using EMAP-HMAC www.ijemr.net ISSN (ONLINE): 2250-0758, ISSN (PRINT): 2394-6962 Page No.: 704-711 Volume-5, Issue-2, April-2015 International Journal of Engineering and Management Research Enhancing Security on Vehicular

More information

Mitigating the Effects of Position-Based Routing Attacks in Vehicular Ad Hoc Networks

Mitigating the Effects of Position-Based Routing Attacks in Vehicular Ad Hoc Networks Mitigating the Effects of Position-Based Routing Attacks in Vehicular Ad Hoc Networks Nizar Alsharif, Albert Wasef, and Xuemin (Sherman) Shen Department of Electrical and Computer Engineering, University

More information

An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings

An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings Debasis Giri and P. D. Srivastava Department of Mathematics Indian Institute of Technology, Kharagpur 721 302, India

More information

Design of Lightweight Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks using Identity-Based Signature Scheme

Design of Lightweight Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks using Identity-Based Signature Scheme Design of Lightweight Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks using Identity-Based Signature Scheme Pooja Motwani *, Purnima Soni #, Priyanka Fulare # # Computer Science

More information

Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization

Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization Dhanveer Kaur 1, Harwant Singh Arri 2 1 M.Tech, Department of Computer Science and Engineering, Lovely

More information

Enhanced Management of Certificate Caching and Revocation Lists in VANET

Enhanced Management of Certificate Caching and Revocation Lists in VANET Enhanced Management of Certificate Caching and Revocation Lists in VANET Sadiq H. Abdulhussain Computer Engineering Department College of Engineering University of Baghdad ABSTRACT Vehicular network security

More information

Design and Implementation of Privacy-Preserving Surveillance. Aaron Segal

Design and Implementation of Privacy-Preserving Surveillance. Aaron Segal 1 Design and Implementation of Privacy-Preserving Surveillance Aaron Segal Yale University May 11, 2016 Advisor: Joan Feigenbaum 2 Overview Introduction Surveillance and Privacy Privacy Principles for

More information

Efficient Privacy-Preserving Chatting Scheme with Degree of Interest Verification for Vehicular Social Networks

Efficient Privacy-Preserving Chatting Scheme with Degree of Interest Verification for Vehicular Social Networks Efficient Privacy-Preserving Chatting Scheme with Degree of Interest Verification for Vehicular Social Networks Khaled Rabieh 1, Mohamed Mahmoud 1, Ambareen Siraj 2, and Jelena Misic 3 1 Department of

More information

Conditional privacy-preserving authentication using registration list in vehicular ad hoc networks.

Conditional privacy-preserving authentication using registration list in vehicular ad hoc networks. Conditional privacy-preserving authentication using registration list in vehicular ad hoc networks. Item type Authors Citation DOI Publisher Journal Rights Article Zhong, Hong; Huang, Bo; Cui, Jie; Xu,

More information

SURVEY: Reputation and Trust Management in VANETs

SURVEY: Reputation and Trust Management in VANETs , pp. 301-306 http://dx.doi.org/10.14257/ijgdc.2015.8.4.29 SURVEY: Reputation and Trust Management in VANETs Jitendra Singh Sengar BVM College of Technology & Management, Gwalior, MP, India jitendrasinghsengar@gmail.com

More information

Understanding Vehicular Ad-hoc Networks and Use of Greedy Routing Protocol

Understanding Vehicular Ad-hoc Networks and Use of Greedy Routing Protocol IJSRD - International Journal for Scientific Research & Development Vol. 1, Issue 7, 2013 ISSN (online): 2321-0613 Understanding Vehicular Ad-hoc Networks and Use of Greedy Routing Protocol Stavan Karia

More information

Intelligent Transportation System For Vehicular Ad-Hoc Networks

Intelligent Transportation System For Vehicular Ad-Hoc Networks INTERNATIONAL JOURNAL OF TECHNOLOGY ENHANCEMENTS AND EMERGING ENGINEERING RESEARCH, VOL 2, ISSUE 6 69 Intelligent Transportation System For Vehicular Ad-Hoc Networks T. Sujitha, S. Punitha Devi Department

More information

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS S. P. Manikandan 1, R. Manimegalai 2 and S. Kalimuthu 3 1 Department of Computer Science and Engineering, Sri Venkateshwara

More information

CrowdPath: A Framework for Next Generation Routing Services using Volunteered Geographic Information

CrowdPath: A Framework for Next Generation Routing Services using Volunteered Geographic Information CrowdPath: A Framework for Next Generation Routing Services using Volunteered Geographic Information Abdeltawab M. Hendawi, Eugene Sturm, Dev Oliver, Shashi Shekhar hendawi@cs.umn.edu, sturm049@umn.edu,

More information

ISSN Vol.03,Issue.36 November-2014, Pages:

ISSN Vol.03,Issue.36 November-2014, Pages: ISSN 2319-8885 Vol.03,Issue.36 November-2014, Pages:7151-7157 www.ijsetr.com Implementation of Expedite Message Authentication Protocol for Vehicular Ad-Hoc Networks SHAIK PATTA ABDUL KHAYUM 1, C. MD GULZAR

More information

Pseudonym Based Security Architecture for Wireless Mesh Network

Pseudonym Based Security Architecture for Wireless Mesh Network IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 4, Ver. VII (Jul Aug. 2014), PP 01-05 Pseudonym Based Security Architecture for Wireless Mesh Network

More information

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 57, NO. 6, NOVEMBER /$ IEEE

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 57, NO. 6, NOVEMBER /$ IEEE IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 57, NO. 6, NOVEMBER 2008 3357 An Efficient Message Authentication Scheme for Vehicular Communications Chenxi Zhang, Student Member, IEEE, Xiaodong Lin, Rongxing

More information

On the security of a certificateless signature scheme in the standard model

On the security of a certificateless signature scheme in the standard model On the security of a certificateless signature scheme in the standard model Lin Cheng, Qiaoyan Wen, Zhengping Jin, Hua Zhang State Key Laboratory of Networking and Switch Technology, Beijing University

More information

Accepted Manuscript. An efficient protocol for authenticated and secure message delivery in vehicular ad hoc networks. Kiho Lim, D.

Accepted Manuscript. An efficient protocol for authenticated and secure message delivery in vehicular ad hoc networks. Kiho Lim, D. Accepted Manuscript An efficient protocol for authenticated and secure message delivery in vehicular ad hoc networks Kiho Lim, D. Manivannan PII: S2214-2096(16)00011-5 DOI: http://dx.doi.org/10.1016/j.vehcom.2016.03.001

More information

A robust smart card-based anonymous user authentication protocol for wireless communications

A robust smart card-based anonymous user authentication protocol for wireless communications University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers: Part A Faculty of Engineering and Information Sciences 2014 A robust smart card-based anonymous user authentication

More information

Mobile-Gateway Routing for Vehicular Networks 1

Mobile-Gateway Routing for Vehicular Networks 1 Mobile-Gateway Routing for Vehicular Networks 1 Hsin-Ya Pan, Rong-Hong Jan 2, Andy An-Kai Jeng, and Chien Chen Department of Computer Science National Chiao Tung University Hsinchu, 30010, Taiwan {hypan,

More information

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Aye Zarchi Minn 1, May Zin Oo 2, Mazliza Othman 3 1,2 Department of Information Technology, Mandalay Technological University, Myanmar

More information

EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks

EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks IEEE TRANSACTIONS ON MOBILE COMPUTING VOL.12 NO.1 YEAR 2013 EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks 1 Albert Wasef and Xuemin (Sherman) Shen, IEEE Fellow Department

More information

WeVe: When Smart Wearables Meet Intelligent Vehicles

WeVe: When Smart Wearables Meet Intelligent Vehicles WeVe: When Smart Wearables Meet Intelligent Vehicles Jiajia Liu School of Cyber Engineering, Xidian University, Xi an, China Smart wearables and intelligent vehicles constitute indispensable parts of Internet

More information

BUSNet: Model and Usage of Regular Traffic Patterns in Mobile Ad Hoc Networks for Inter-Vehicular Communications

BUSNet: Model and Usage of Regular Traffic Patterns in Mobile Ad Hoc Networks for Inter-Vehicular Communications BUSNet: Model and Usage of Regular Traffic Patterns in Mobile Ad Hoc Networks for Inter-Vehicular Communications Kai-Juan Wong, Bu-Sung Lee, Boon-Chong Seet, Genping Liu, Lijuan Zhu School of Computer

More information

Online Incremental Rough Set Learning in Intelligent Traffic System

Online Incremental Rough Set Learning in Intelligent Traffic System Online Incremental Rough Set Learning in Intelligent Traffic System Amal Bentaher 1,2, Yasser Fouad 2, Khaled Mahar 3 1 Faculty of Science, Hadhramout University., Hadhramout, Yemen 2 Computer Science

More information

On the Security of a Lightweight Cloud Data Auditing Scheme

On the Security of a Lightweight Cloud Data Auditing Scheme On the Security of a Lightweight Cloud Data Auditing Scheme Reyhaneh Rabaninead a, Maryam Raabzadeh Asaar b, Mahmoud Ahmadian Attari a, Mohammad Reza Aref c a Department of Electrical Engineering, K. N.

More information

Efficient password authenticated key agreement using bilinear pairings

Efficient password authenticated key agreement using bilinear pairings Mathematical and Computer Modelling ( ) www.elsevier.com/locate/mcm Efficient password authenticated key agreement using bilinear pairings Wen-Shenq Juang, Wei-Ken Nien Department of Information Management,

More information

EFFICIENT TRAJECTORY PROTOCOL FOR MULTICASTING IN VEHICULAR AD HOC NETWORKS

EFFICIENT TRAJECTORY PROTOCOL FOR MULTICASTING IN VEHICULAR AD HOC NETWORKS EFFICIENT TRAJECTORY PROTOCOL FOR MULTICASTING IN VEHICULAR AD HOC NETWORKS Nandhini P. 1 and Ravi G. 2 1 Department of Electronics and Communication Engineering, Communication Systems, Sona College of

More information

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 6, Number 3 (2013), pp. 205-210 International Research Publication House http://www.irphouse.com Literature Review

More information

LESSONS LEARNED: SECURITY AND PRIVACY IN SAFETY PILOT MODEL DEPLOYMENT

LESSONS LEARNED: SECURITY AND PRIVACY IN SAFETY PILOT MODEL DEPLOYMENT LESSONS LEARNED: SECURITY AND PRIVACY IN SAFETY PILOT MODEL DEPLOYMENT André Weimerskirch, Scott Bogard, Debby Bezzina University of Michigan Transportation Research Institute 2901 Baxter Road Ann Arbor,

More information

Securing Distributed Computation via Trusted Quorums. Yan Michalevsky, Valeria Nikolaenko, Dan Boneh

Securing Distributed Computation via Trusted Quorums. Yan Michalevsky, Valeria Nikolaenko, Dan Boneh Securing Distributed Computation via Trusted Quorums Yan Michalevsky, Valeria Nikolaenko, Dan Boneh Setting Distributed computation over data contributed by users Communication through a central party

More information

A STUDY ON CURRENT TRENDS IN VEHICULAR AD HOC NETWORKS

A STUDY ON CURRENT TRENDS IN VEHICULAR AD HOC NETWORKS 953 A STUDY ON CURRENT TRENDS IN VEHICULAR AD HOC NETWORKS K.Prasuna 1, Chilakalapudi Meher Babu 2,K.Ram Kumar 3 1 Asst.Professor, Vijaya Institute of Technology for Women, Enikepadu, INDIA. 2 Ph.D., Scholar,

More information

PMAP: Precipitate Message Authentication Protocol for Vehicular Ad Hoc Networks

PMAP: Precipitate Message Authentication Protocol for Vehicular Ad Hoc Networks PMAP: Precipitate Message Authentication Protocol for Vehicular Ad Hoc Networks J.Sahana, PG Scholar Department of Computer Science and Engineering Sree Sowdambika College of Engineering Aruppukottai,

More information

Analyzing Routing Protocols Performance in VANET Using p and g

Analyzing Routing Protocols Performance in VANET Using p and g Analyzing Routing Protocols Performance in VANET Using 802.11p and 802.11g Rasha Kaiss Aswed and Mohammed Ahmed Abdala Network Engineering Department, College of Information Engineering, Al-Nahrain University

More information

A Priority based Congestion Prevention Technique for Vehicular Ad-Hoc Networks

A Priority based Congestion Prevention Technique for Vehicular Ad-Hoc Networks Computing For Nation Development, March 10 11, 2011 Bharati Vidyapeeth s Institute of Computer Applications and Management, New Delhi A Priority based Congestion Prevention Technique for Vehicular Ad-Hoc

More information

Security for V2X Communications

Security for V2X Communications Security for V2X Communications ITS Canada Annual General Meeting May 1-4, 2016 Brian Romansky VP Strategic Technology Your Connected Car Your Connected Car Security Security Partner Partner TrustPoint

More information

Secure Role-Based Access Control on Encrypted Data in Cloud Storage using ARM

Secure Role-Based Access Control on Encrypted Data in Cloud Storage using ARM Secure Role-Based Access Control on Encrypted Data in Cloud Storage using ARM Rohini Vidhate, V. D. Shinde Abstract With the rapid developments occurring in cloud computing and services, there has been

More information

VeMAC: A Novel Multichannel MAC Protocol for Vehicular Ad Hoc Networks

VeMAC: A Novel Multichannel MAC Protocol for Vehicular Ad Hoc Networks This paper was presented as part of the Mobility Management in the Networks of the Future World (MobiWorld) Workshop at VeMAC: A Novel Multichannel MAC Protocol for Vehicular Ad Hoc Networks Hassan Aboubakr

More information

Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms

Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms A.Sarika*1, Smt.J.Raghaveni*2 M.Tech Student, Dept of CSE, S.R.K.R Engineering college, Bhimavaram, AP,

More information

Wireless Network Security Spring 2013

Wireless Network Security Spring 2013 Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #19 Location Privacy & Tracking Agenda Location privacy and tracking Implications / risks of location information Location privacy and anonymity

More information

ENCRYPTED KEY SEARCHING FOR DATA SHARING OVER GROUPS IN THE CLOUD STORAGE THEJA #1, GARREPALLI PRASAD #2,

ENCRYPTED KEY SEARCHING FOR DATA SHARING OVER GROUPS IN THE CLOUD STORAGE THEJA #1, GARREPALLI PRASAD #2, ENCRYPTED KEY SEARCHING FOR DATA SHARING OVER GROUPS IN THE CLOUD STORAGE THEJA #1, GARREPALLI PRASAD #2, DEPARTMENT OF CSE SAHAJA INSTITUTE OF TECHNOLOGY & SCIENCES FOR WOMEN, KARIMNAGAR ABSTRACT: The

More information

Privacy in Vehicular Ad-hoc Networks. Nikolaos Alexiou, LCN, EE KTH

Privacy in Vehicular Ad-hoc Networks. Nikolaos Alexiou, LCN, EE KTH Privacy in Vehicular Ad-hoc Networks Nikolaos Alexiou, LCN, EE KTH alexiou@kth.se 2/10/2012 Outline Introduction VANETs: an overview VANET privacy - Anonymity - Location Privacy - VPKI Privacy Attacks

More information

Reliable Broadcast Message Authentication in Wireless Sensor Networks

Reliable Broadcast Message Authentication in Wireless Sensor Networks Reliable Broadcast Message Authentication in Wireless Sensor Networks Taketsugu Yao, Shigeru Fukunaga, and Toshihisa Nakai Ubiquitous System Laboratories, Corporate Research & Development Center, Oki Electric

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

A Smart Card Based Authentication Protocol for Strong Passwords

A Smart Card Based Authentication Protocol for Strong Passwords A Smart Card Based Authentication Protocol for Strong Passwords Chin-Chen Chang 1,2 and Hao-Chuan Tsai 2 1 Department of Computer Science and Information Engineering, Feng Chia University, Taichung, Taiwan,

More information

MULTI - KEYWORD RANKED SEARCH OVER ENCRYPTED DATA SUPPORTING SYNONYM QUERY

MULTI - KEYWORD RANKED SEARCH OVER ENCRYPTED DATA SUPPORTING SYNONYM QUERY ISSN: 0976-3104 SPECIAL ISSUE Jayanthi and Prabadevi RESEARCH OPEN ACCESS MULTI - KEYWORD RANKED SEARCH OVER ENCRYPTED DATA SUPPORTING SYNONYM QUERY Jayanthi M.* and Prabadevi School of Information Technology

More information

Performance Comparison of Mobility Generator C4R and MOVE using Optimized Link State Routing (OLSR)

Performance Comparison of Mobility Generator C4R and MOVE using Optimized Link State Routing (OLSR) IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 06, Issue 11 (November. 2016), V1 PP 25-29 www.iosrjen.org Performance Comparison of Mobility Generator and MOVE using

More information

A Receiver-Based Forwarding Scheme to Minimize Multipath Formation in VANET

A Receiver-Based Forwarding Scheme to Minimize Multipath Formation in VANET A Receiver-Based Forwarding Scheme to Minimize Multipath Formation in VANET Khaleel Husain and Azlan Awang Abstract Receiver-based data forwarding schemes are well suited for vehicular environment due

More information

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI

More information

Mobile Health Monitoring Based On New Power Management Approach

Mobile Health Monitoring Based On New Power Management Approach Mobile Health Monitoring Based On New Power Management Approach R.Kanimozhi 1, M.Suguna 2 Department of Information Technology, SNS College of Technology, Coimbatore, Tamilnadu, India 1, 2 ABSTRACT- Mobile

More information

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT Lecture 6: Vehicular Computing and Networking Cristian Borcea Department of Computer Science NJIT GPS & navigation system On-Board Diagnostic (OBD) systems DVD player Satellite communication 2 Internet

More information

Improvements on an authentication scheme for vehicular sensor networks

Improvements on an authentication scheme for vehicular sensor networks University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers: Part A Faculty of Engineering and Information Sciences 2014 Improvements on an authentication scheme for

More information

Wireless Network Security Spring 2014

Wireless Network Security Spring 2014 Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #16 Network Privacy & Anonymity 2014 Patrick Tague 1 Network Privacy Issues Network layer interactions in wireless networks often expose

More information

Location Privacy Protection in Contention Based Forwarding for VANETs

Location Privacy Protection in Contention Based Forwarding for VANETs Location Privacy Protection in Contention Based Forwarding for VANETs Qing Yang Alvin Lim Xiaojun Ruan and Xiao Qin Computer Science and Software Engineering Auburn University, Auburn, AL, USA 36849 Email:

More information

Location Traceability of Users in Location-based Services

Location Traceability of Users in Location-based Services Location Traceability of Users in Location-based Services Yutaka Yanagisawa Hidetoshi Kido Tetsuji Satoh, NTT Communication Science Laboratories, NTT Corporation Graduate School of Information Science

More information

WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks

WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks Tzu-Chieh Tsai, Ting-Shen Liu, and Chien-Chun Han Department of Computer Science, National Chengchi University, Taipei,

More information

International Journal of Information Movement. Website: ISSN: (online) Pages

International Journal of Information Movement. Website:   ISSN: (online) Pages REVIEW: VANET ARCHITECTURES AND DESIGN Chetna Research Scholar Department Of Electronic & Communication Engg. Galaxy Global Group of Institutions, Dinarpur Saranjeet Singh Faculty Department of Electronic

More information

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM R.Bhuvaneswari 1, V.Vijayalakshmi 2 1 M.Phil., Scholar, Bharathiyar Arts And Science College For Women, India 2 HOD

More information

Vehicular Cloud Computing: A Survey. Lin Gu, Deze Zeng and Song Guo School of Computer Science and Engineering, The University of Aizu, Japan

Vehicular Cloud Computing: A Survey. Lin Gu, Deze Zeng and Song Guo School of Computer Science and Engineering, The University of Aizu, Japan Vehicular Cloud Computing: A Survey Lin Gu, Deze Zeng and Song Guo School of Computer Science and Engineering, The University of Aizu, Japan OUTLINE OF TOPICS INTRODUCETION AND MOTIVATION TWO-TIER VEHICULAR

More information

Proxy Signature-based RSU Message Broadcasting in VANETs

Proxy Signature-based RSU Message Broadcasting in VANETs Proxy Signature-based RSU Message Broadcasting in VANETs Subir Biswas Dept. of Computer Science University of Manitoba Winnipeg MB, Canada R3T 2N2 Email: bigstan@cs.umanitoba.ca Jelena Mišić Dept. of Computer

More information

An Energy-Balanced Cooperative MAC Protocol in MANETs

An Energy-Balanced Cooperative MAC Protocol in MANETs 2011 International Conference on Advancements in Information Technology With workshop of ICBMG 2011 IPCSIT vol.20 (2011) (2011) IACSIT Press, Singapore An Energy-Balanced Cooperative MAC Protocol in MANETs

More information

A Simplified Privacy Preserving Message Delivery Protocol in VDTNs

A Simplified Privacy Preserving Message Delivery Protocol in VDTNs A Simplified Privacy Preserving Message Delivery Protocol in VDTNs Youngho Park, Chul Sur, Kyung-Hyune Rhee To cite this version: Youngho Park, Chul Sur, Kyung-Hyune Rhee. A Simplified Privacy Preserving

More information

Enhanced Delegation Based Authentication Protocol for Secure Roaming Service with Synchronization

Enhanced Delegation Based Authentication Protocol for Secure Roaming Service with Synchronization JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 9, NO. 4, DECEMBER 2011 345 Enhanced Delegation Based Authentication Protocol for Secure Roaming Service with Synchronization Hsing-Bai Chen, Yung-Hsiang

More information

A Procedural Based Encryption Technique for Accessing Data on Cloud

A Procedural Based Encryption Technique for Accessing Data on Cloud A Procedural Based Encryption Technique for Accessing Data on Cloud Avinash N 1, Divya C 2 P.G. Student, Department of Computer Science and Engineering, SVIT, Bangalore, Karnataka, India 1 Assistant Professor,

More information

icarii: Intersection-based Connectivity Aware Routing in Vehicular Networks

icarii: Intersection-based Connectivity Aware Routing in Vehicular Networks icarii: Intersection-based Connectivity Aware Routing in Vehicular Networks Nizar Alsharif* and Xuemin (Sherman) Shen* *Department of Electrical and Computer Engineering University of Waterloo Waterloo

More information

HMEP: Hasten Message Endorsement Protocol for Vehicular Ad hoc Networks

HMEP: Hasten Message Endorsement Protocol for Vehicular Ad hoc Networks HMEP: Hasten Message Endorsement Protocol for Vehicular Ad hoc Networks D.Thriveni 1, G.T.Prasanna Kumari 2 1 M.Tech Student, S.V.Engineering College for Women, Tirupati, India 2 Associate Professor, Dept.

More information

V2X: Beyond the Horizon. IBTTA AET Meeting July 18, 2017

V2X: Beyond the Horizon. IBTTA AET Meeting July 18, 2017 V2X: Beyond the Horizon IBTTA AET Meeting July 18, 2017 Battle over V2X Technology: DSRC vs 5G 18 July 2017 www.kapsch.net 2 Dedicated Short Range Communication (DSRC) Bi-directional wireless communications

More information

D.David Neels Ponkumar 1, Janeshwari.S 2, Gomathi Sankari.A 3

D.David Neels Ponkumar 1, Janeshwari.S 2, Gomathi Sankari.A 3 Fast and Secure Countermand Verification Process Using MAP in VANET D.David Neels Ponkumar 1, Janeshwari.S 2, Gomathi Sankari.A 3 1 Profeesor, Einstein College of Engineering, david26571@gmail.com 2 PG

More information

Mobile Millennium Using Smartphones as Traffic Sensors

Mobile Millennium Using Smartphones as Traffic Sensors Mobile Millennium Using Smartphones as Traffic Sensors Dan Work and Alex Bayen Systems Engineering, Civil and Environmental Engineering, UC Berkeley Intelligent Infrastructure, Center for Information Technology

More information