Auditable and privacy-preserving authentication in vehicular networks

Hoon Kim Sung, Han Kim Bum, Ki Kim Young, Dong Hoon Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

Abstract

In vehicular networks, vehicles should be able to authenticate each other to securely communicate with networkbased infrastructure, and their locations and identifiers should not be exposed from the communication messages. However, when an accident occurs, the investigating authorities have to trace down its origin. As vehicles communicate not only with RSUs(Road Side Units) but also with other vehicles, it is important to minimize the number of communication flows among the vehicles while the communication satisfies several security properties such as anonymity, authenticity, and traceability. In our paper, when the mutual authentication protocol is working between vehicles and RSUs, the protocol offers the traceability with privacy protection using pseudonyms and MAC (Message Authentication Code) chain. And by using MAC-chain as one-time pseudonyms, our protocol does not need a separate way to manage pseudonyms.

Original languageEnglish
Title of host publicationProceedings - The 2nd International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, UBICOMM 2008
Pages19-24
Number of pages6
DOIs
Publication statusPublished - 2008 Dec 1
Event2nd International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, UBICOMM 2008 - Valencia, Spain
Duration: 2008 Sep 292008 Oct 4

Other

Other2nd International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, UBICOMM 2008
CountrySpain
CityValencia
Period08/9/2908/10/4

Fingerprint

Authentication
Communication
Accidents

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Software
  • Electrical and Electronic Engineering

Cite this

Sung, H. K., Bum, H. K., Young, K. K., & Lee, D. H. (2008). Auditable and privacy-preserving authentication in vehicular networks. In Proceedings - The 2nd International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, UBICOMM 2008 (pp. 19-24). [4641307] https://doi.org/10.1109/UBICOMM.2008.39

Auditable and privacy-preserving authentication in vehicular networks. / Sung, Hoon Kim; Bum, Han Kim; Young, Ki Kim; Lee, Dong Hoon.

Proceedings - The 2nd International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, UBICOMM 2008. 2008. p. 19-24 4641307.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sung, HK, Bum, HK, Young, KK & Lee, DH 2008, Auditable and privacy-preserving authentication in vehicular networks. in Proceedings - The 2nd International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, UBICOMM 2008., 4641307, pp. 19-24, 2nd International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, UBICOMM 2008, Valencia, Spain, 08/9/29. https://doi.org/10.1109/UBICOMM.2008.39
Sung HK, Bum HK, Young KK, Lee DH. Auditable and privacy-preserving authentication in vehicular networks. In Proceedings - The 2nd International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, UBICOMM 2008. 2008. p. 19-24. 4641307 https://doi.org/10.1109/UBICOMM.2008.39
Sung, Hoon Kim ; Bum, Han Kim ; Young, Ki Kim ; Lee, Dong Hoon. / Auditable and privacy-preserving authentication in vehicular networks. Proceedings - The 2nd International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, UBICOMM 2008. 2008. pp. 19-24
@inproceedings{eade9ce3f2544d49a8bc9f2e362a2ae6,
title = "Auditable and privacy-preserving authentication in vehicular networks",
abstract = "In vehicular networks, vehicles should be able to authenticate each other to securely communicate with networkbased infrastructure, and their locations and identifiers should not be exposed from the communication messages. However, when an accident occurs, the investigating authorities have to trace down its origin. As vehicles communicate not only with RSUs(Road Side Units) but also with other vehicles, it is important to minimize the number of communication flows among the vehicles while the communication satisfies several security properties such as anonymity, authenticity, and traceability. In our paper, when the mutual authentication protocol is working between vehicles and RSUs, the protocol offers the traceability with privacy protection using pseudonyms and MAC (Message Authentication Code) chain. And by using MAC-chain as one-time pseudonyms, our protocol does not need a separate way to manage pseudonyms.",
author = "Sung, {Hoon Kim} and Bum, {Han Kim} and Young, {Ki Kim} and Lee, {Dong Hoon}",
year = "2008",
month = "12",
day = "1",
doi = "10.1109/UBICOMM.2008.39",
language = "English",
isbn = "9780769533674",
pages = "19--24",
booktitle = "Proceedings - The 2nd International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, UBICOMM 2008",

}

TY - GEN

T1 - Auditable and privacy-preserving authentication in vehicular networks

AU - Sung, Hoon Kim

AU - Bum, Han Kim

AU - Young, Ki Kim

AU - Lee, Dong Hoon

PY - 2008/12/1

Y1 - 2008/12/1

N2 - In vehicular networks, vehicles should be able to authenticate each other to securely communicate with networkbased infrastructure, and their locations and identifiers should not be exposed from the communication messages. However, when an accident occurs, the investigating authorities have to trace down its origin. As vehicles communicate not only with RSUs(Road Side Units) but also with other vehicles, it is important to minimize the number of communication flows among the vehicles while the communication satisfies several security properties such as anonymity, authenticity, and traceability. In our paper, when the mutual authentication protocol is working between vehicles and RSUs, the protocol offers the traceability with privacy protection using pseudonyms and MAC (Message Authentication Code) chain. And by using MAC-chain as one-time pseudonyms, our protocol does not need a separate way to manage pseudonyms.

AB - In vehicular networks, vehicles should be able to authenticate each other to securely communicate with networkbased infrastructure, and their locations and identifiers should not be exposed from the communication messages. However, when an accident occurs, the investigating authorities have to trace down its origin. As vehicles communicate not only with RSUs(Road Side Units) but also with other vehicles, it is important to minimize the number of communication flows among the vehicles while the communication satisfies several security properties such as anonymity, authenticity, and traceability. In our paper, when the mutual authentication protocol is working between vehicles and RSUs, the protocol offers the traceability with privacy protection using pseudonyms and MAC (Message Authentication Code) chain. And by using MAC-chain as one-time pseudonyms, our protocol does not need a separate way to manage pseudonyms.

UR - http://www.scopus.com/inward/record.url?scp=67650077502&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=67650077502&partnerID=8YFLogxK

U2 - 10.1109/UBICOMM.2008.39

DO - 10.1109/UBICOMM.2008.39

M3 - Conference contribution

SN - 9780769533674

SP - 19

EP - 24

BT - Proceedings - The 2nd International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, UBICOMM 2008

ER -