Loading…
Non-interactive Authentication Scheme Providing Privacy among Drivers in Vehicle-to-Vehicle Networks
In this paper, we present a non-interactive authentication scheme providing privacy among drivers in vehicle-to-vehicle (V2V) communication networks. Where the drivers, who are members of V2V networks, are organized into groups. Each group has a shared public key between members. Additionally, each...
Saved in:
Main Authors: | , , |
---|---|
Format: | Conference Proceeding |
Language: | eng ; jpn |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 161 |
container_issue | |
container_start_page | 156 |
container_title | |
container_volume | |
creator | Salem, Fatty M Ibrahim, Maged H Ibrahim, I I |
description | In this paper, we present a non-interactive authentication scheme providing privacy among drivers in vehicle-to-vehicle (V2V) communication networks. Where the drivers, who are members of V2V networks, are organized into groups. Each group has a shared public key between members. Additionally, each member has a private key provided by the Third Trusted Party (TTP). In our proposed scheme, we ensure driver's privacy by allowing members to change their own set of public keys frequently using the Digital Signature Algorithm (DSA). The TTP sends to each member a token of his original set of public keys. This member can find non-interactively a new token corresponding to the new set of public keys, and hence vehicles can exchange the safety critical information without requiring a control from the TTP. In case of a malicious behavior, the identity of the signer can be revealed only by the TTP. |
doi_str_mv | 10.1109/ICNS.2010.28 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5460654</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5460654</ieee_id><sourcerecordid>5460654</sourcerecordid><originalsourceid>FETCH-LOGICAL-i156t-a5bcb9085aff9349d1178f70990bb60fdb0032e2ad3252715c5a309c84ff13203</originalsourceid><addsrcrecordid>eNotzMtOwzAUBFAjhAQq2bFj4x9IuX4l9rIKr0pVQCqwrRznmhiaBCUmqH9PBJ3NzNkMIVcMloyBuVkX5XbJYSbXJyQxuYY8M0qYzMDpn5nkUirDc31OknH8gDlSMa31BanLvktDF3GwLoYJ6eo7NtjF4GwMfUe3rsEW6fPQT6EO3fu8wmTdgdq2n3U7C4eRho6-YRPcHtPYp8dJS4w__fA5XpIzb_cjJsdekNf7u5fiMd08PayL1SYNTGUxtapylQGtrPdGSFMzlmufgzFQVRn4ugIQHLmtBVc8Z8opK8A4Lb1ngoNYkOv_34CIu68htHY47JTMIFNS_ALvUVdT</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Non-interactive Authentication Scheme Providing Privacy among Drivers in Vehicle-to-Vehicle Networks</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Salem, Fatty M ; Ibrahim, Maged H ; Ibrahim, I I</creator><creatorcontrib>Salem, Fatty M ; Ibrahim, Maged H ; Ibrahim, I I</creatorcontrib><description>In this paper, we present a non-interactive authentication scheme providing privacy among drivers in vehicle-to-vehicle (V2V) communication networks. Where the drivers, who are members of V2V networks, are organized into groups. Each group has a shared public key between members. Additionally, each member has a private key provided by the Third Trusted Party (TTP). In our proposed scheme, we ensure driver's privacy by allowing members to change their own set of public keys frequently using the Digital Signature Algorithm (DSA). The TTP sends to each member a token of his original set of public keys. This member can find non-interactively a new token corresponding to the new set of public keys, and hence vehicles can exchange the safety critical information without requiring a control from the TTP. In case of a malicious behavior, the identity of the signer can be revealed only by the TTP.</description><identifier>ISBN: 9781424459278</identifier><identifier>ISBN: 1424459273</identifier><identifier>EISBN: 9780769539690</identifier><identifier>EISBN: 9781424459285</identifier><identifier>EISBN: 1424459281</identifier><identifier>EISBN: 0769539696</identifier><identifier>DOI: 10.1109/ICNS.2010.28</identifier><language>eng ; jpn</language><publisher>IEEE</publisher><subject>Authentication ; Communication system security ; Driver circuits ; Mobile ad hoc networks ; Privacy ; Protocols ; Public key ; Road vehicles ; V2V communication ; Vehicle driving ; Vehicle safety</subject><ispartof>2010 Sixth International Conference on Networking and Services, 2010, p.156-161</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5460654$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5460654$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Salem, Fatty M</creatorcontrib><creatorcontrib>Ibrahim, Maged H</creatorcontrib><creatorcontrib>Ibrahim, I I</creatorcontrib><title>Non-interactive Authentication Scheme Providing Privacy among Drivers in Vehicle-to-Vehicle Networks</title><title>2010 Sixth International Conference on Networking and Services</title><addtitle>ICNS</addtitle><description>In this paper, we present a non-interactive authentication scheme providing privacy among drivers in vehicle-to-vehicle (V2V) communication networks. Where the drivers, who are members of V2V networks, are organized into groups. Each group has a shared public key between members. Additionally, each member has a private key provided by the Third Trusted Party (TTP). In our proposed scheme, we ensure driver's privacy by allowing members to change their own set of public keys frequently using the Digital Signature Algorithm (DSA). The TTP sends to each member a token of his original set of public keys. This member can find non-interactively a new token corresponding to the new set of public keys, and hence vehicles can exchange the safety critical information without requiring a control from the TTP. In case of a malicious behavior, the identity of the signer can be revealed only by the TTP.</description><subject>Authentication</subject><subject>Communication system security</subject><subject>Driver circuits</subject><subject>Mobile ad hoc networks</subject><subject>Privacy</subject><subject>Protocols</subject><subject>Public key</subject><subject>Road vehicles</subject><subject>V2V communication</subject><subject>Vehicle driving</subject><subject>Vehicle safety</subject><isbn>9781424459278</isbn><isbn>1424459273</isbn><isbn>9780769539690</isbn><isbn>9781424459285</isbn><isbn>1424459281</isbn><isbn>0769539696</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2010</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotzMtOwzAUBFAjhAQq2bFj4x9IuX4l9rIKr0pVQCqwrRznmhiaBCUmqH9PBJ3NzNkMIVcMloyBuVkX5XbJYSbXJyQxuYY8M0qYzMDpn5nkUirDc31OknH8gDlSMa31BanLvktDF3GwLoYJ6eo7NtjF4GwMfUe3rsEW6fPQT6EO3fu8wmTdgdq2n3U7C4eRho6-YRPcHtPYp8dJS4w__fA5XpIzb_cjJsdekNf7u5fiMd08PayL1SYNTGUxtapylQGtrPdGSFMzlmufgzFQVRn4ugIQHLmtBVc8Z8opK8A4Lb1ngoNYkOv_34CIu68htHY47JTMIFNS_ALvUVdT</recordid><startdate>201003</startdate><enddate>201003</enddate><creator>Salem, Fatty M</creator><creator>Ibrahim, Maged H</creator><creator>Ibrahim, I I</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201003</creationdate><title>Non-interactive Authentication Scheme Providing Privacy among Drivers in Vehicle-to-Vehicle Networks</title><author>Salem, Fatty M ; Ibrahim, Maged H ; Ibrahim, I I</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i156t-a5bcb9085aff9349d1178f70990bb60fdb0032e2ad3252715c5a309c84ff13203</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng ; jpn</language><creationdate>2010</creationdate><topic>Authentication</topic><topic>Communication system security</topic><topic>Driver circuits</topic><topic>Mobile ad hoc networks</topic><topic>Privacy</topic><topic>Protocols</topic><topic>Public key</topic><topic>Road vehicles</topic><topic>V2V communication</topic><topic>Vehicle driving</topic><topic>Vehicle safety</topic><toplevel>online_resources</toplevel><creatorcontrib>Salem, Fatty M</creatorcontrib><creatorcontrib>Ibrahim, Maged H</creatorcontrib><creatorcontrib>Ibrahim, I I</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE/IET Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Salem, Fatty M</au><au>Ibrahim, Maged H</au><au>Ibrahim, I I</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Non-interactive Authentication Scheme Providing Privacy among Drivers in Vehicle-to-Vehicle Networks</atitle><btitle>2010 Sixth International Conference on Networking and Services</btitle><stitle>ICNS</stitle><date>2010-03</date><risdate>2010</risdate><spage>156</spage><epage>161</epage><pages>156-161</pages><isbn>9781424459278</isbn><isbn>1424459273</isbn><eisbn>9780769539690</eisbn><eisbn>9781424459285</eisbn><eisbn>1424459281</eisbn><eisbn>0769539696</eisbn><abstract>In this paper, we present a non-interactive authentication scheme providing privacy among drivers in vehicle-to-vehicle (V2V) communication networks. Where the drivers, who are members of V2V networks, are organized into groups. Each group has a shared public key between members. Additionally, each member has a private key provided by the Third Trusted Party (TTP). In our proposed scheme, we ensure driver's privacy by allowing members to change their own set of public keys frequently using the Digital Signature Algorithm (DSA). The TTP sends to each member a token of his original set of public keys. This member can find non-interactively a new token corresponding to the new set of public keys, and hence vehicles can exchange the safety critical information without requiring a control from the TTP. In case of a malicious behavior, the identity of the signer can be revealed only by the TTP.</abstract><pub>IEEE</pub><doi>10.1109/ICNS.2010.28</doi><tpages>6</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9781424459278 |
ispartof | 2010 Sixth International Conference on Networking and Services, 2010, p.156-161 |
issn | |
language | eng ; jpn |
recordid | cdi_ieee_primary_5460654 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Authentication Communication system security Driver circuits Mobile ad hoc networks Privacy Protocols Public key Road vehicles V2V communication Vehicle driving Vehicle safety |
title | Non-interactive Authentication Scheme Providing Privacy among Drivers in Vehicle-to-Vehicle Networks |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T11%3A26%3A46IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Non-interactive%20Authentication%20Scheme%20Providing%20Privacy%20among%20Drivers%20in%20Vehicle-to-Vehicle%20Networks&rft.btitle=2010%20Sixth%20International%20Conference%20on%20Networking%20and%20Services&rft.au=Salem,%20Fatty%20M&rft.date=2010-03&rft.spage=156&rft.epage=161&rft.pages=156-161&rft.isbn=9781424459278&rft.isbn_list=1424459273&rft_id=info:doi/10.1109/ICNS.2010.28&rft.eisbn=9780769539690&rft.eisbn_list=9781424459285&rft.eisbn_list=1424459281&rft.eisbn_list=0769539696&rft_dat=%3Cieee_6IE%3E5460654%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i156t-a5bcb9085aff9349d1178f70990bb60fdb0032e2ad3252715c5a309c84ff13203%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5460654&rfr_iscdi=true |