Auditable and privacy-preserving authentication in vehicular networks

Hoon Kim Sung, Han Kim Bum, Ki Kim Young, Hoon Lee Dong

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

Abstract

In vehicular networks, vehicles should be able to authenticate each other to securely communicate with networkbased infrastructure, and their locations and identifiers should not be exposed from the communication messages. However, when an accident occurs, the investigating authorities have to trace down its origin. As vehicles communicate not only with RSUs(Road Side Units) but also with other vehicles, it is important to minimize the number of communication flows among the vehicles while the communication satisfies several security properties such as anonymity, authenticity, and traceability. In our paper, when the mutual authentication protocol is working between vehicles and RSUs, the protocol offers the traceability with privacy protection using pseudonyms and MAC (Message Authentication Code) chain. And by using MAC-chain as one-time pseudonyms, our protocol does not need a separate way to manage pseudonyms.

Original languageEnglish
Title of host publicationProceedings - The 2nd International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, UBICOMM 2008
Pages19-24
Number of pages6
DOIs
Publication statusPublished - 2008
Event2nd International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, UBICOMM 2008 - Valencia, Spain
Duration: 2008 Sep 292008 Oct 4

Publication series

NameProceedings - The 2nd International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, UBICOMM 2008

Other

Other2nd International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, UBICOMM 2008
CountrySpain
CityValencia
Period08/9/2908/10/4

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Software
  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'Auditable and privacy-preserving authentication in vehicular networks'. Together they form a unique fingerprint.

  • Cite this

    Sung, H. K., Bum, H. K., Young, K. K., & Dong, H. L. (2008). Auditable and privacy-preserving authentication in vehicular networks. In Proceedings - The 2nd International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, UBICOMM 2008 (pp. 19-24). [4641307] (Proceedings - The 2nd International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, UBICOMM 2008). https://doi.org/10.1109/UBICOMM.2008.39